吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (2): 535-541.doi: 10.13229/j.cnki.jdxbgxb201602031

• Orginal Article • Previous Articles     Next Articles

Quantum key management algorithm based on sliding window

HAN Jia-wei1, 2, LIU Yan-heng1, SUN Xin3, SONG Li-jun2   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130012,China;
    2. Quantum Cryptography Laboratory, Changchun University, Changchun 130022,China;
    3.Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun 130012,China
  • Received:2014-07-06 Online:2016-02-20 Published:2016-02-20

Abstract:

A Random Sliding Quantum Key Window (RSQKW) management algorithm is proposed in order to handle the problem of applying Quantum Key Distribution (QKD) in classical network encryption. First, a sliding window mechanism is introduced to control quantum key consumption. Then, the algorithm negotiates the control parameters of the sliding window by detecting the status of the quantum communication network and the final quantum key generated rate. Finally, using the stochastic characteristics of the quantum key to calculate the sliding step width, the quantum key series in the sliding window can be used as a new secret key for classical encryption algorithm. Comparing with traditional method, the RSQKW algorithm can better dynamically manage the quantum key and enhance the efficiency and effectiveness of quantum key distribution and management. Experimental results in a real quantum key distribution network demonstrate the feasibility and effectiveness of the proposed algorithm.

Key words: computer application, quantum key distribution, sliding window, key management, QKD protocol

CLC Number: 

  • TP393
[1] 吴华,赵于康,赵勇,等. 实用化光纤量子加密电话网络和高速数据传输系统 现场应用与安全管理[J]. 中国科学:信息科学,2014,44(3): 312-321.
Wu Hua,Zhao Yu-kang,Zhao Yong,et al. Field application and security management of a telephone network and a high speed data transmission system with practical fiber quantum cryptography[J]. Scien-tia Sinica Informationis,2014,44(3):312-321.
[2] Fröhlich B,Dynes J F,Lucamarini M,et al. A quantum access network[J]. Nature,2013,501 (7465):69-72.
[3] 刘晓慧,裴昌幸,聂敏. 量子无线通信网络构建及性能分析[J]. 吉林大学学报:工学版,2014,44(4):1177-1181.
Liu Xiao-hui,Pei Chang-xing,Nie Min. Quantum wireless communication network model and performance analysis[J]. Journal of Jilin University (Eng-ineering and Technology Edition),2014,44(4):1177-1181.
[4] Wang Qing-le,Gao Fei,Liu Bin,et al. Anonymous quantum communications using the quantum one-time pad[J]. Physica Scripta,2015,90(0151021): 1-6.
[5] Peev M,Dynes J F,Fasel S,et al. The SECOQC quantum key distribution network in Vienna[J]. New Journal of Physics,2009,11(7): 75001-75037.
[6] Stucki D,Legre M,Buntschu F,et al. Long-term performance of the Swiss quantum quantum key distribution network in a field environment[J]. New Journal of Physics,2011,13:123001-123018.
[7] Sasaki M,Fujiwara M,Ishizuka H,et al. Field test of quantum key distribution in the Tokyo QKD Net-work[J]. Optics Express,2011,19(11): 10387-10409.
[8] 吴华,王向斌,潘建伟. 量子通信现状与展望[J].中国科学:信息科学,2014,44(3):296-311.
Wu Hua,Wang Xiang-bin,Pan Jian-wei. Quantum communication: status and prospects[J]. Scientia Sinica Informationis 2014,44(3): 296-311.
[9] Neppach A,Pfaffel-Janser C,Wimberger I,et al. Key management of quantum generated keys in IPsec[C]//Proceedings of the International Conference on Security and Cryptography,Porto,Portugal,2008: 177-183.
[10] Alléaume R,Branciard C,Bouda J,et al. Using quantum key distribution for cryptographic purposes: A survey[J]. Theoretical Computer Science,2014,560: 62-81.
[11] Fujiwara M,Domeki T,Moriai S,et al. Highly secure network switches with quantum key distribution systems[J]. International Journal of Network Security,2015,17(1): 34-39.
[12] Gottesman D,Lo H K,Lutkenhaus N,et al. Security of quantum key distribution with imperfect devices[J]. Quantum Information & Computation,2004,4(5):325-360.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!