首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
为了改善BB84协议防窃听的能力,在BB84协议的基础上提出用M(M=3,4,5…)对量子态实现量子密钥分配。为了检测其安全性,用截获-重发的方式对量子密钥分配过程进行窃听,窃听者分别采用两种检测光子状态的方法:在M组基中随机选取一种基和用Breidbart基测量,并在这两种窃听方法下分别通过计算机仿真探究M值与安全性能的关系。仿真结果表明:用多对量子态实现量子密钥分配时,发现窃听者的能力与BB84协议相同,而窃听者可以获取的正确信息要比窃听BB84协议获取的正确信息少。从而提高了量子密钥分配的安全性。  相似文献   

2.
QKD扩展BB84协议的Breidbart基窃听问题   总被引:7,自引:1,他引:6       下载免费PDF全文
杨理  吴令安  刘颂豪 《物理学报》2002,51(5):961-965
给出了六态扩展BB84协议的Breidbart基窃听方案,分析并计算了各种截取重发策略下的AliceEve平均交互信息量和施行QKD标准纠错手续后的有效平均交互信息量,结果显示Breidbart基窃听Breidbart基重发策略(BB策略)最为有效.考虑到Alice和Bob可以在公开讨论阶段利用废弃数据检验是否存在BB窃听以降低秘密性增强算法的强度,减少量子密钥的损失,提出了修改BB84协议的建议.给出了可能较QKD标准纠错手续更为安全的量子密钥二次生成纠错方法 关键词: 量子密码 BB84协议 Breidbart基窃听  相似文献   

3.
基于BB84协议的实际QKD系统的窃听问题研究   总被引:6,自引:4,他引:2  
基于实际量子密钥分配系统中所使用的强衰减的激光脉冲并不是单光子,量子密钥分配的信道不是无损耗的,窃听者的技术能力也不是无限的这些具体问题,采用了分束窃听与截获重发窃听策略相结合的方案讨论了窃听问题并给出了合法用户在筛选后的密钥中所能容忍的误码率上限.  相似文献   

4.
实际量子密钥分配扩展BB84协议窃听下的安全性分析   总被引:10,自引:10,他引:0  
考虑强衰减激光脉冲技术实现的准单光子源和量子信道损耗以及窃听者Eve窃听能力有限等实际情况, 提出了一种窃听装置;同时对扩展BB84协议的各种窃听做了全面分析,计算得出发送者Alice/窃听者Eve所获得的交互信息量和发送者Alice/接收者Bob所能容忍的误码率上限,以此作为检测量子信道安全性的标准,同时得出Breidbart基/分束攻击相结合的方法是比截取/重发更为有效的窃听方案.  相似文献   

5.
杨宇光  温巧燕  朱甫臣 《物理学报》2005,54(12):5544-5548
提出了一种基于纠缠交换的多方多级量子密钥分配协议.构造了一种两方三级系统的完备正交归一化基,利用该正交归一化基和纠缠交换可以实现两方量子密钥分配.同时,三级可以推广到多级以及两方推广到多方,即可以实现基于纠缠交换的多方多级量子密钥分配.这样,利用纠缠交换和多级密钥分配可以极大地提高检测窃听的效率、密钥生成率以及信息容量. 关键词: 量子密钥分配 纠缠交换 多方 多级  相似文献   

6.
杨宇光  温巧燕  朱甫臣 《物理学报》2005,54(12):5549-5553
提出了一种新的利用33 Hilbert空间的不可扩展乘积基和严格纠缠基的量子密钥分配方案.对窃听者的窃听成功概率进行了分析.该方案具有许多诸如容量大以及效率高等独特的特点. 关键词: 量子密钥分配 不可扩展乘积基 严格纠缠基 正交完备基  相似文献   

7.
QKD系统在Breidbart基窃听下BB84协议的信息量研究   总被引:9,自引:6,他引:3  
给出了BB84协议的Breidbart基窃听的方案,分析并计算了各种截取/重发策略下施行QKD标准纠错手续后Alice/Eve的有效平均交互信息量和对Bob引起的错误率.结果显示了Breidbart基窃听/Breidbart基重发策略(B/B策略)最为有效,并提出了各种窃听方案下Alice和 Bob采取相应的反攻击策略.  相似文献   

8.
基于半波片的偏振跟踪理论分析   总被引:1,自引:0,他引:1       下载免费PDF全文
分析了卫星量子密钥分配中采用半波片进行偏振跟踪的原理,通过旋转半波片实现对偏振“零”方向的跟踪.针对BB84协议和B92协议,给出了三组共轭基六个光子偏振态的变换关系式,分析了基于偏振跟踪的量子密钥编码原理. 关键词: 量子密钥分配 偏振跟踪 半波片  相似文献   

9.
研究了适合光纤传输的量子密钥分配系统和量子密钥分配协议.通过研究适合光纤传输的量子信号的编码和解码,研究了基于光纤的量子密钥分配系统与协议,给出相位调制量子密钥系统的光路图;在计算机上编制相应的程序,验证了相位调制的量子密钥分配协议的分配过程,并就窃听对量子误码率的影响进行了分析.结果表明,仿真结果与理论分析完全一致.  相似文献   

10.
实际安全性是目前量子密钥分发系统中最大的挑战.在实际实现中,接收单元的单光子探测器在雪崩过程的二次光子发射(反向荧光)会导致信息泄露.目前,已有研究表明该反向荧光会泄露时间和偏振信息并且窃听行为不会在通信过程中产生额外误码率,在自由空间量子密钥分发系统中提出了利用反向荧光获取偏振信息的攻击方案,但是在光纤量子密钥分发系统中暂未见报道.本文提出了在光纤偏振编码量子密钥分发系统中利用反向荧光获取信息的窃听方案与减少信息泄露的解决方法,在时分复用偏振补偿的光纤偏振编码量子密钥分发系统的基础上对该方案中窃听者如何获取密钥信息进行了理论分析.实验上测量了光纤偏振编码量子密钥分发系统中反向荧光的概率为0.05,并对本文提出的窃听方案中的信息泄露进行量化,得出窃听者获取密钥信息的下限为2.5×10~(–4).  相似文献   

11.
We propose an efficient hyperconcentration protocol for distilling maximally hyperentangled state from partially entangled pure state, resorting to the projection measurement on an auxiliary photon. In our scheme, two photons simultaneously entangled in polarization states and spatial modes are considered. One party performs quantum nondemolition detections on his photon and an additional photon to produce three photon hyperentangled state, then he projects the assistant photon into an orthogonal basis composed of both the polarization and spatial degree of freedom. Then the state of the left two photons collapses into maximally hyperentangled state with a certain probability. In the rest cases, some less-entangled states are obtained, which can be used as resource for the next round concentration. By repeating the concentration process for several rounds, a higher success probability can be obtained, which makes our scheme useful in practical quantum information applications.  相似文献   

12.
Single colloidal quantum dots (QDs) are increasingly exploited as triggered sources of single photons. This review reports on recent results on single photon sources (SPS) based on colloidal quantum dots, whose size, shape and optical properties can be finely tuned by wet chemistry approach. First, we address the optical properties of different colloidal nanocrystals, such as dots, rods and dot in rods and their use as single photon sources will be discussed. Then, we describe different techniques for isolation and positioning single QDs, a major issue for fabrication of single photon sources, and various approaches for the embedding single nanocrystals inside microcavities. The insertion of single colloidal QDs in quantum confined optical systems allows one to improve their overall optical properties and performances in terms of efficiency, directionality, life time, and polarization control. Finally, electrical pumping of colloidal nanocrystals light emitting devices and of NC-based single photon sources is reviewed.  相似文献   

13.
14.
光子数分束攻击对星地量子密钥分配系统安全的影响   总被引:2,自引:1,他引:1  
由于仪器设备性能的不完美和信道传输损耗的存在,光子数分束(PNS)攻击对采用弱相干脉冲(WCP)光源的量子密钥分配(QKD)系统的安全性构成重大威胁.以基于WCP光源的星地QKD系统为研究对象,推导了在PNS攻击者采用最佳窃听策略进行窃听时,保证密钥绝对安全的最大天顶角和可采用的平均光子数之间的关系.理论分析和计算结果表明,星地QKD系统的最大安全传输天顶角和可使用的平均光子数等重要系统参数的取值上限均受PNS攻击的限制,最终系统的密钥交换速率和系统容量受到限制.对星地QKD系统的传输容量来说,天顶角和平均光子数是一对矛盾的影响因素.提供了一种对实际星地QKD系统的天顶角和平均光子数参数进行估算的方法.  相似文献   

15.
The photon-by-photon approach for single molecule spectroscopy experiments utilizes the information carried by each detected photon and allows the measurements of conformational fluctuation with time resolution on a vast range of time scales, where each photon represents a data point. Here, we theoretically simulate the photon emission dynamics of a single molecule spectroscopy using the kinetic Monte Carlo algorithm to understand the underlying complex photon dynamic process of a single molecule. In addition, by following the molecular process in real time, the mechanism of complex biochemical reactions can be revealed. We hope that this theoretical study will serve as an introduction and a guideline into this exciting new field.  相似文献   

16.
《Physics letters. A》2006,359(6):677-680
The dynamic screening effects on the low-energy electron–ion bremsstrahlung process are investigated for both the soft and hard photon radiations in nonideal plasmas. The impact-parameter analysis is employed to obtain the bremsstrahlung radiation cross section as a function of the impact parameter, projectile energy, radiation photon energy, thermal energy, and Debye length. The results show that the dynamic screening effect on the bremsstrahlung radiation is found to be more significant for distant encounters. In addition, the dynamic screening effect is found to be more important for the soft photon radiation and decreases with increasing the radiation photon energy.  相似文献   

17.
Present work is an attempt to compare quantum discord and quantum entanglement of quasi-Werner states formed with the four bipartite entangled coherent states (ECS) used recently for quantum teleportation of a qubit encoded in superposed coherent state. Out of these, the quasi-Werner states based on maximally ECS due to its invariant nature under local operation is independent of measurement basis and mean photon numbers, while for quasi-Werner states based on non-maximally ECS, it depends upon measurement basis as well as on mean photon number. However, for large mean photon numbers since non-maximally ECS becomes almost maximally entangled therefore dependence of quantum discord for non-maximally ECS based quasi-Werner states on the measurement basis disappears.  相似文献   

18.
We investigate the cold nuclear matter(CNM) effects on isolated prompt photon and isolated prompt photon associated jet productions in nuclear collisions at the NLO accuracy by using the EPS09 NLO nuclear parton distribution functions and their error sets.Nuclear modification factors of isolated prompt photon and isolated prompt photon+jet productions due to CNM effects in p+A and A+A reactions at the RHIC and the LHC are provided with varying rapidity and transverse momentum of the final state photon.It is shown that the CNM effects on isolated prompt photon and photon+jet are modest,which give a small enhancement at low pT region and a more obvious suppression at large pT at central rapidity.At forward rapidity a pronounced suppression of γ as well as γ+jet is always observed.  相似文献   

19.
We present a scheme that is capable of detecting photon numbers during the quantum key distribution (QKD) based on an improved differential phase shift (DPS) system without Trojan horse attack. A time-multiplexed detector (TMD) is set in for the photon-number resolution. Two fibre loops are used for detecting photon numbers as well as distributing keys. The long-term stabilization is guaranteed by two Faraday mirrors (FM) at Bob's site to automatically compensate for polarization defect. Our experimental study (90km QKD is completed) indicates that such a system is stable and secure which nearly reaches the performance of a single photon scheme.  相似文献   

20.
Integrated photonic devices are expected to play a promising role in the field of quantum information science. In this paper we propose two schemes for generating polarization-mode entangled photon pairs based on titanium-indiffused waveguide on periodically polled lithium niobate by using simultaneous quasi-phase-matching of Type-I and higher order Type-0 spontaneous parametric down conversion processes in one of them and Type-II in another. The photon pairs are emitted at the wavelength of 812 nm suitable for quantum computation applications within a bandwidth of 14 and 0.2 nm, and the generation rate of the degenerate sources is 44,360 and 91 pairs/(s GHz mW) respectively, in a 1-cm long waveguide. These degenerate sources can provide maximally entangled photon pairs as the Tangle of the sources is as high as 0.9999 and 1, accordingly.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号