首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
孙伟  尹华磊  孙祥祥  陈腾云 《物理学报》2016,65(8):80301-080301
非正交编码协议和诱骗态方法可以有效地抵御光子数分离攻击. 由于相干叠加态中单光子成分高达90%, 常作为单光子量子比特的替代出现, 用于量子信息过程处理和计算. 本文结合非正交编码协议和诱骗态方法提出一种新的量子密钥分发方案, 光源采用相干叠加态, 推导了单光子的密钥生成速率、计数率下限和误码率的上限, 利用Matlab 模拟了无限多诱骗态情况下和有限多诱骗态情况下密钥生成速率和传输距离的关系, 得出该方案可以提升密钥生成速率并且提高安全传输距离, 验证了该方案可以进一步提高量子密钥分发系统的性能.  相似文献   

2.
相比于离散变量量子密钥分发,连续变量量子密钥分发虽然具备更高的安全码率等优势,但是在安全传输距离上却略有不足.尽管量子催化的运用对高斯调制连续变量量子密钥分发协议的性能,尤其在安全传输距离方面有着显著的提升,然而能否用来改善离散调制协议的性能却仍然未知.鉴于上述分析,本文提出了一种基于量子催化的离散调制协议的方案,试图在安全密钥率、安全传输距离和最大可容忍过噪声方面进一步提升协议性能.研究结果表明,在相同参数下,当优化量子催化引入的透射率T,相比于原始四态调制协议,所提方案能够有效地提升量子密钥分发的性能.特别是,对于可容忍过噪声为0.002,量子催化可将安全通信距离突破300 km,密钥率为10^-8bits/pulse,而过大的可容忍噪声会抑制量子催化对协议性能的改善效果.此外,为了彰显量子催化的优势,本文给出了点对点量子通信的最终极限Pirandola-Laurenza-Ottaviani-Banchi边界,仿真结果表明,虽然原始方案与所提方案都未能突破这种边界,但是相比于前者,后者能够在远距离通信上逼近于这种边界,这为实现全球量子安全通信的最终目标提供理论依据.  相似文献   

3.
孙颖  赵尚弘  东晨 《物理学报》2015,64(14):140304-140304
针对量子中继器短时间内难以应用于长距离量子密钥分配系统的问题, 提出了基于量子存储的长距离测量设备无关量子密钥分配协议, 分析了其密钥生成率与存储效率、信道传输效率和安全传输距离等参数间的关系, 研究了该协议中量子存储单元的退相干效应对最终密钥生成率的影响, 比较了经典测量设备无关量子密钥分配协议和基于量子存储的测量设备无关量子密钥分配协议的密钥生成率与安全传输距离的关系. 仿真结果表明, 添加量子存储单元后, 协议的安全传输距离由无量子存储的216 km增加至500 km, 且量子存储退相干效应带来的误码对最终的密钥生成率影响较小. 实验中可以采取调节信号光强度的方式提高测量设备无关量子密钥分配系统的密钥生成率, 为实用量子密钥分配实验提供了重要的理论参数.  相似文献   

4.
魏正军  万伟  王金东  廖常俊  刘颂豪 《物理学报》2011,60(9):94216-094216
基于相位编码的量子密钥分发系统需要对信息加载的相位调制器的半波电压进行精确的测定以减小量子密钥的误码率,相位调制器半波电压的测量精度直接影响到了量子密钥分发系统的最终误码.本文提出了一种基于确定性量子密钥分发误码率判据的相位调制器半波电压的精确测定方法,所采用相位调制器的半波电压的测量精度达到了2 mV,实验结果表明这种方法可以用于量子密钥分发实际应用系统中实时获得不同条件下的行波相位调制器的半波电压以最大程度地减小由于相位信息不准确加载而带来的系统误码. 关键词: 量子保密通信 相位编码 半波电压 误码率  相似文献   

5.
We present a three-party reference frame independent quantum key distribution protocol which can be implemented without any alignment of reference frames between the sender and the receiver. The protocol exploits entangled states to establish a secret key among three communicating parties. We derive the asymptotic key rate for the proposed protocol against collective attacks and perform a finite-size key security analysis against general attacks in the presence of statistical fluctuations. We investigate the impact of reference frame misalignment on the stability of our protocol, and we obtain a transmission distance of 180 km, 200 km, and 230 km for rotation of reference frames β=π/6, β=π/8 and β=0, respectively. Remarkably, our results demonstrate that our proposed protocol is not heavily affected by an increase in misalignment of reference frames as the achievable transmission distances are still comparable to the case where there is no misalignment in reference frames (when β=0). We also simulate the performance of our protocol for a fixed number of signals. Our results demonstrate that the protocol can achieve an effective key generation rate over a transmission distance of about 120 km with realistic 107 finite data signals and approximately achieve 195 km with 109 signals. Moreover, our proposed protocol is robust against noise in the quantum channel and achieves a threshold error rate of 22.7%.  相似文献   

6.
徐兵杰  唐春明  陈晖  张文政  朱甫臣 《物理学报》2013,62(7):70301-070301
如何提高实际量子密钥分发系统的安全码率和最远传输距离是量子密码学领域重要的研究课题. 本文采用量子无噪线性光放大器放大量子信号, 以改进连续变量量子密钥分发系统实际性能. 经仔细研究, 本文发现增益系数为g的线性无噪放大器可将连续变量量子密钥分发系统的最远安全传输距离提高20 log10(g)/a km (a=0.2 dB/km为光纤信道的损耗系数), 并改善系统的安全码率和噪声抗性. 关键词: 量子密钥分发 连续变量 最远传输距离 线性无噪放大器  相似文献   

7.
焦荣珍  丁天  王文集  马海强 《物理学报》2013,62(18):180302-180302
通过比较被动系统与主动系统的特性, 得出可信光源、不可信光源主动系统和不可信光源被动系统的密钥生成率随距离的变化关系; 采用标准误差分析法, 得到相应变量的偏离量; 基于诱骗态方案分析不可信光源被动系统暗计数率和光源强度参数波动对系统安全特性的影响, 得出在1310 nm 和1550 nm通信窗口下, 系统最大安全通信距离范围分别为[73.2 km, 96.5 km] 和[104.5 km, 137.9 km]. 这可为实用量子通信实验提供重要的理论参数. 关键词: 量子密钥分配 不可信光源 被动系统 统计波动  相似文献   

8.
Qingquan Peng 《中国物理 B》2022,31(6):60306-060306
The trans-media transmission of quantum pulse is one of means of free-space transmission which can be applied in continuous-variable quantum key distribution (CVQKD) system. In traditional implementations for atmospheric channels, the 1500-to-1600-nm pulse is regarded as an ideal quantum pulse carrier. However, the underwater transmission of this pulses tends to suffer from severe attenuation, which inevitably deteriorates the security of the whole CVQKD system. In this paper, we propose an alternative scheme for implementations of CVQKD over satellite-to-submarine channels. We estimate the parameters of the trans-media channels, involving atmosphere, sea surface and seawater and find that the short-wave infrared performs well in the above channels. The 450-nm pulse is used for generations of quantum signal carriers to accomplish quantum communications through atmosphere, sea surface and seawater channels. Numerical simulations show that the proposed scheme can achieve the transmission distance of 600 km. In addition, we demonstrate that non-Gaussian operations can further lengthen its maximal transmission distance, which contributes to the establishment of practical global quantum networks.  相似文献   

9.
Quantum cryptography is a new secure communication protocol with the combina- tion of quantum mechanics and information theory[1]. Its security depends on the laws of physics and has been proved strictly[2,3]. Quantum communication is the art of generat- ing and transmitting the keys through a quantum channel between two parties, usually called Alice and Bob. Unlike the classical key distribution, the quantum keys are gener- ated in the process of transmission instantaneously. The keys can be…  相似文献   

10.
诱惑态量子密钥分配系统中统计涨落的研究   总被引:1,自引:0,他引:1       下载免费PDF全文
焦荣珍  唐少杰  张弨 《物理学报》2012,61(5):50302-050302
针对实用的量子密钥分配(QKD)系统是基于强衰减的弱激光脉冲作为单光子源, 光子数分束攻击极大限制了通信双方在非理想条件下QKD的传输距离和密钥生成率,采用大数定律对诱惑态协议中单光子的计数率、单光子增益和误码率分别进行统计涨落分析, 利用双诱惑态比较了1310 nm和1550 nm条件下,编码脉冲的长度为(N = 106-N = 1012)实际QKD协议中密钥的生成率与安全传输距离之间的关系、安全传输距离随编码长度的变化的关系, 得出脉冲编码长度增大到N = 1012时,密钥的最大安全传输距离为135 km.  相似文献   

11.
Upper bounds for the security of coherent-one-way (COW) quantum key distribution protocols have been analyzed by considering the one-pulse-attack [Branciard C, Gisin N and Scarani V (BGS) New J.Phys. (2008) 10 013031]. However, their security analysis was based on long distance case, and the typical value of the transmission distance is larger than 50 km. Applying the sharp continuity for the von Neumann entropy and some basic inequalities, we provide lower bounds for the security of modified coherent-one-way quantum key distribution protocol against the most general one-pulse-attack by only considering photon number resolved detectors that will be used in the receiver's side. Comparing with BGS's security analysis, our security analysis can be satisfied with arbitrary distance case.  相似文献   

12.
虞味  周媛媛 《光学学报》2021,41(2):157-164
基于预报单光子源,提出了一种相位匹配被动诱骗态量子密钥分配方案。在此方案中,通信双方仅需各产生单个强度的信号。根据通信双方本地探测器的响应情况,第三方的探测结果被分为四个集合,既起到信号态和诱骗态的作用,又共同参与参数估计和密钥生成,降低了系统实现的难度并改善了方案性能。仿真结果表明:相位匹配被动诱骗态方案的最大安全传输距离可达到552 km,性能趋近于现有的相位匹配主动诱骗态方案,且无需主动产生诱骗态;在一定程度上克服了相位匹配主动诱骗态方案严重依赖探测器探测效率的缺陷,性能更为稳定;随着数据长度的下降,方案的传输性能有所下降,但数据长度即使下降至10~7,方案的最大安全传输距离依然可以达到507 km。  相似文献   

13.
In this paper, we consider the controllably secure quantum key distribution (QKD) with coherent source, i.e., the practical decoy state QKD with finite resource is studied within the scope of some controllable security parameters. Our simulation shows the controllably secure QKD is more resource-consuming compared with the practical decoy QKD with relatively statistical fluctuation. However, further numerically solutions show that both protocols agree well with each other in the asymptotic limit, where the resource is large enough but not infinite. Our work shows the dark counts will contribute apparently to the transmission distance when communication distance approaches to the asymptotic limit. It also shows that both the secure transmission distance and the rate of the secure final key can be increased apparently when the security estimation parameters are not fixed but numerically optimized.  相似文献   

14.
Zhao Y  Qi B  Ma X  Lo HK  Qian L 《Physical review letters》2006,96(7):070502
To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys--signals of different intensities--has recently been proposed. Here, we present the first experimental implementation of decoy state QKD. By making simple modifications to a commercial quantum key distribution system, we show that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber. We also show that with the same experimental parameters, not even a single bit of secure key can be extracted with a non-decoy-state protocol. Compared to building single photon sources, decoy state QKD is a much simpler method for increasing the distance and key generation rate of unconditionally secure QKD.  相似文献   

15.
王涵  闫连山  潘炜  罗斌  郭振  徐明峰 《物理学报》2011,60(3):30304-030304
单光子的衰减特性及其易受干扰的缺点限制了纯单光子量子系统的传输码率及距离.弱相干光脉冲(WCP)光源和准单光子源(HSPS)则具有更高的实用价值.本文将这两种光源和诱发态方案相结合并采用Lütkenhaus和Gottesman-Lo- Lütkenhaus-Preskill (GLLP)两种数据后处理方法进行性能分析.仿真结果表明:HSPS在传输距离上要优于WCP,对应相同传输距离时系统量子误码率(QBER)要小些,但相对密钥生成率低. 关键词: 量子密钥分配 诱发态 WCP光源 HSPS光源  相似文献   

16.
Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes.  相似文献   

17.
刘强  谭勇刚 《中国物理 B》2011,20(4):40303-040303
The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett. 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits,i.e.,its longer secure transmission distance and more convenient operation design. In this paper,we first improve the protocol with the aid of local operation and two-way classical communication (2-LOCC). After our modifications,the secure transmission distance is increased by about 20 km,which will make the protocol more practicable.  相似文献   

18.
Decoy state quantum key distribution (QKD), being capable of beating PNS attack and being unconditionally secure has become attractive recently. However, in many QKD systems, disturbances of transmission channel make the quantum bit error rate (QBER) increase, which limits both security distance and key bit rate of real-world decoy state QKD systems. We demonstrate the two-intensity decoy QKD with a one-way Faraday- Michelson phase modulation system, which is free of channel disturbance and keeps an interference fringe visibility (99%) long period, over a 120 km single mode optical fibre in telecom (1550nm) wavelength. This is the longest distance fibre decoy state QKD system based on the two-intensity protocol.  相似文献   

19.
陈明娟  刘翔 《中国物理 B》2011,20(10):100305-100305
The most severe problem of a two-way "plug-and-play" (p & p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an üntrusted source". This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered.  相似文献   

20.
The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, while the lack of the effective key distillation method makes it unpractical under the high loss condition. Here we present a single-bit-reverse-reconciliation protocol against Oaussian classical Eve, which can distill the secret key through practical imperfect error correction with high efficiency. The simulation results show that this protocol can distill secret keys even when the transmission fibre is longer than 150 km, which may make the continuous variable scheme to outvie the single photon one.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号