基于MDI-QKD协议的国际业务数据传输方案研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:International business data transmission scheme based on MDI-QKD protocol
  • 作者:高中玲 ; 赵生妹 ; 马媛媛 ; 曾荣 ; 黄秀丽
  • 英文作者:GAO Zhongling;ZHAO Shengmei;MA Yuanyuan;ZENG Rong;HUANG Xiuli;Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications;Global Energy Interconnection Research Institute,State Grid;
  • 关键词:量子通信 ; 国际业务数据传输 ; 即插即用 ; 测量设备无关量子密钥分配协议
  • 英文关键词:quantum communication;;international business data transmission;;plug-and-play;;measurement-device-independent quantum key distribution protocol
  • 中文刊名:LDXU
  • 英文刊名:Chinese Journal of Quantum Electronics
  • 机构:南京邮电大学信号处理与传输研究院;全球能源互联网研究院有限公司;
  • 出版日期:2019-01-15
  • 出版单位:量子电子学报
  • 年:2019
  • 期:v.36;No.186
  • 基金:国家自然科学基金,61475075,61871234;; 国家电网科技项目,SGRIXTKJ[2017]459号~~
  • 语种:中文;
  • 页:LDXU201901006
  • 页数:6
  • CN:01
  • ISSN:34-1163/TN
  • 分类号:36-41
摘要
电力信息系统数据(尤其是国际业务数据)的安全传输关系着整个电网的安全运行.无条件安全的量子通信技术可大幅提高系统数据传输的安全级别,并提供对窃听者的可检测性.基于与测量设备无关量子密钥分配(MDI-QKD)协议,针对国际电力业务数据传输的特殊性,提出将MDI-QKD协议应用到传统的电力系统国际业务数据传输的即插即用MDI-QKD方案,此方案包括测量控制中心、外网国际业务专区和海外传输前置区.测量控制中心负责光脉冲的产生和贝尔态测量,外网国际业务专区和海外传输前置区通过密钥管理端口与量子虚拟专用网(VPN)相连,实施数据加密,理论分析验证了所提方案的可行性.
        The secure transmission of power information data, especially the international business data,determines the safety of the entire grid network. The unconditional security of quantum communication technology can greatly improve the security of system data transmission and provide the detectability of eavesdropping. A scheme is proposed for the international business data transmission in the international grid network based on measurement-device-independent quantum key distribution(MDI-QKD) protocol,where a plug and play structure is adopted due to the characteristics of the international business data transmisssion. The scheme includes the control and measure center, extranet international business zone and overseas transmission front area. The control and measure center is in charge of the generation of light pulse and Bell measurements. The extranet international business zone and overseas transmission front area are connected with virtual private network(VPN) via key management ports to encryt data. The feasibility of the proposed scheme is verified by theoretical analysis.
引文
[1] Zhang R N,Zhou J,Chen X. Application prospect of optical fiber quantum key distribution technology in power grid[J]. Telecommunicatons for Electric Power System(电力系统通信),2012, 33(240):1-4(in Chinese).
    [2] Liu D,Wang S,Zhou J. Application of quantum key in power network SSL VPN[J]. Power Grid Technology(电网技术),2014, 38(2):544-548(in Chinese).
    [3] Jiang Y H, Zhang S B, et al. Quantum key distribution protocol with two-way identity authentication[J]. Chinese Journal of Quantum Electronics(量子电子学报),2018, 35(1):49-53(in Chinese).
    [4] Xiao L, Zhang Q, et al. Design and application of practical optical fiber quantum secure communication system[C]. Selected papers on the annual conference of power industry information in 2016, 2016:345-348(in Chinese).
    [5] Wu X. The application of quantum communication technology in power communication[J]. China Computer and Communication(信息与电脑),2017, 17:169-171(in Chinese).
    [6] Ye Z Y, Chen H Z, Wang W Q. Discussion on power application of quantum key distribution secret communication system[J].Engineering Construction and Deign(工程建设与设计),2016, 7:238-239(in Chinese).
    [7] Yan X L, Jiang D N. Quantum communication technology and its application in power system[J]. Telecom World(通讯世界),2015, 21:8-9(in Chinese).
    [8] Liu J W, Zhao Z Y, Xu H M,et al. Application of quantum communication technology in confidential transmission of power information system[C]. Selected Papers on the Annual Conference of Power Industry Information in2016, 2016:295-298(in Chinese).
    [9] Sinha R K, Mishra M, Sahu S S. Quantum key distribution:Simulation of BB84 protocol in C[J]. International Journal of Electrical, Electronics and Computer Systems, 2017, 64:57-60.
    [10] Kour J,Koul S,Zahid P. A survey on quantum key distribution protocols[J]. International Journal of Computer Science and Applications, 2017, 7:19-27.
    [11] Xu F H. Measurement-device-independent quantum communication with an untrusted'source[J]. Physical Review A, 2015, 92:012333.
    [12] Wang L,Zhao S M,Gong L Y, et al. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum[J]. Chinese Physics B, 2015, 24(12):120307.
    [13] Yin H L, Chen T Y, et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber[J]. Physical Review Letters, 2016, 117(19):190501.
    [14] Choi Y, Kwon O, Woo M. Plug-and-play measurement-device-independent quantum key distribution[J]. Physical Review A, 2016, 93:032319.
    [15] Tang G Z, Sun S H, Xu F H, et al. Experimental asymmetric plug-and-play measurement-device-independent quantum key distribution[J]. Physical Review A, 2016, 94:032326.
    [16] Tamaki K,Lo H K,Fung C H F,et al. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw[J]. Physical Review A, 2012, 85(4):042307.
    [17] Zhang Z Y, Wang Y B, et al. Intercept-resent eavesdropping in polarization-drift quantum cryptography[J].Chinese Journal of Quantum Electronics(量子电子学报),2016, 33(1):44-50(in Chinese).
    [18] Chen R K, Bao W S, Wang Y, et al. Measurement-device-independent quantum cryptographic conferencing with an untrusted source[J]. Chinese Physics B, 2017, 26(1):010302.
    [19] Zhu F, Zhang C H, Liu A P, et al. Enhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sources[J]. Physics Letters A, 2016, 16(20):1-6.
    [20] Wu C F, Du Y N, Wang J D, et al. Performance optimization analysis of measurement device independent quantum key distribution system with weak coherent light source[J]. Acta Physica Sinica(物理学报),2016, 65(10):100302(in Chinese).
    [21] Er P K, Er G K. Review of role of SSL in cyber security[J]. International Journal of Advanced Research in Computer Science, 2017, 8(4):187-190.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700