共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
A new synchronization scheme based on time division multiplexing and wavelength division multiplexing technology for practical quantum key distribution system 下载免费PDF全文
Three clock synchronization schemes for a quantum key distribution system are compared experimentally through the outdoor fibre and the interaction physical model of the the clock signal and the the quantum signal in the quantum key distribution system is analysed to propose a new synchronization scheme based on time division multiplexing and wavelength division multiplexing technology to reduce quantum bits error rates under some transmission rate conditions.The proposed synchronization scheme can not only completely eliminate noise photons from the bright background light of the the clock signal,but also suppress the fibre nonlinear crosstalk. 相似文献
3.
Finite-key analysis of practical time-bin high-dimensional quantum key distribution with afterpulse effect 下载免费PDF全文
High-dimensional quantum resources provide the ability to encode several bits of information on a single photon, which can particularly increase the secret key rate rate of quantum key distribution (QKD) systems. Recently, a practical four-dimensional QKD scheme based on time-bin quantum photonic state, only with two single-photon avalanche detectors as measurement setup, has been proven to have a superior performance than the qubit-based one. In this paper, we extend the results to our proposed eight-dimensional scheme. Then, we consider two main practical factors to improve its secret key bound. Concretely, we take the afterpulse effect into account and apply a finite-key analysis with the intensity fluctuations. Our secret bounds give consideration to both the intensity fluctuations and the afterpulse effect for the high-dimensional QKD systems. Numerical simulations show the bound of eight-dimensional QKD scheme is more robust to the intensity fluctuations but more sensitive to the afterpulse effect than the four-dimensional one. 相似文献
4.
Reference-frame-independent quantum key distribution (RFI-QKD) has been demonstrated to be reliable and useful both in theories and experiments, which is intrinsically robust against slowly varying reference frames. In this paper, we propose an efficient scheme of passive decoy-state RFI-QKD based on the parametric down-conversion source, where a beam splitter splits the idler pulses into four local detection events to improve the performance of RFI-QKD systems. In addition, we demonstrate the worst relative rotation of reference frames in our scheme. Simulation results show that our scheme can achieve good performance even at the worst-case scenario. 相似文献
5.
Xinchao Ruan Wenhao Shi Guojun Chen Wei Zhao Hang Zhang Ying Guo 《Entropy (Basel, Switzerland)》2021,23(9)
The secret key rate is one of the main obstacles to the practical application of continuous-variable quantum key distribution (CVQKD). In this paper, we propose a multiplexing scheme to increase the secret key rate of the CVQKD system with orbital angular momentum (OAM). The propagation characteristics of a typical vortex beam, involving the Laguerre–Gaussian (LG) beam, are analyzed in an atmospheric channel for the Kolmogorov turbulence model. Discrete modulation is utilized to extend the maximal transmission distance. We show the effect of the transmittance of the beam over the turbulent channel on the secret key rate and the transmission distance. Numerical simulations indicate that the OAM multiplexing scheme can improve the performance of the CVQKD system and hence has potential use for practical high-rate quantum communications. 相似文献
6.
Finite-Key Analysis for a Practical High-Dimensional Quantum Key Distribution System Based on Time-Phase States 下载免费PDF全文
High-dimensional quantum states key distribution(HD-QKD) can enable more than one bit per photon and tolerate more noise. Recently, a practical HD-QKD system based on time-phase states has provided a secret key at Mbps over metropolitan distances. For the purposes of further improving the secret key rate of a practical HD-QKD system, we make two main contributions in this work. Firstly, we present an improved parameter estimation for this system in the finite-key scenario based on the Chernoff bound and the improved Chernoff bound. Secondly, we analyze how the dimension d affects the performance of the practical HD-QKD system.We present numerical simulations about the secret key rate of the practical HD-QKD system based on different parameter estimation methods. It is found that using the improved Chernoff bound can improve the secret key rate and maximum channel loss of the practical HD-QKD system. In addition, a mixture of the 4-level and 8-level practical HD-QKD system can provide better performance in terms of the key generation rate over metropolitan distances. 相似文献
7.
K Yoshino M Fujiwara A Tanaka S Takahashi Y Nambu A Tomita S Miki T Yamashita Z Wang M Sasaki A Tajima 《Optics letters》2012,37(2):223-225
A high-speed quantum key distribution system was developed with the wavelength-division multiplexing (WDM) technique and dedicated key distillation hardware engines. Two interferometers for encoding and decoding are shared over eight wavelengths to reduce the system's size, cost, and control complexity. The key distillation engines can process a huge amount of data from the WDM channels by using a 1 Mbit block in real time. We demonstrated a three-channel WDM system that simultaneously uses avalanche photodiodes and superconducting single-photon detectors. We achieved 12 h continuous key generation with a secure key rate of 208 kilobits per second through a 45 km field fiber with 14.5 dB loss. 相似文献
8.
9.
Parameter estimation of continuous variable quantum key distribution system via artificial neural networks 下载免费PDF全文
Continuous-variable quantum key distribution(CVQKD)allows legitimate parties to extract and exchange secret keys.However,the tradeoff between the secret key rate and the accuracy of parameter estimation still around the present CVQKD system.In this paper,we suggest an approach for parameter estimation of the CVQKD system via artificial neural networks(ANN),which can be merged in post-processing with less additional devices.The ANN-based training scheme,enables key prediction without exposing any raw key.Experimental results show that the error between the predicted values and the true ones is in a reasonable range.The CVQKD system can be improved in terms of the secret key rate and the parameter estimation,which involves less additional devices than the traditional CVQKD system. 相似文献
10.
11.
《中国物理快报》2017,(8)
Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol suggsts an important scheme for practical multiparty quantum communication. As far as we know, MDI-QCC or MDI-quantum key distribution protocols always assume that the decoy state strategies used at each user's side are the same.In this study, to mitigate the system complexity and to improve the performance of MDI-QCC protocol in the finite-key case, we propose an asymmetric decoy state method for MDI-QCC protocol, and present security analysis and numerical simulations. From numerical simulations, our protocol can achieve better performance in the finite-key case. That is, with a finite data size of 10~(11), it can achieve nonzero secret key rate over 43.6 km. 相似文献
12.
Compared with full device-independent quantum key distribution(DI-QKD), one-side device-independent QKD(1s DI-QKD) needs fewer requirements, which is much easier to meet. In this paper, by applying recently developed novel time–energy entropic uncertainty relations, we present a time–energy high-dimensional one-side device-independent quantum key distribution(HD-QKD) and provide the security proof against coherent attacks. Besides, we connect the security with the quantum steering. By numerical simulation, we obtain the secret key rate for Alice's different detection efficiencies. The results show that our protocol can performance much better than the original 1s DI-QKD. Furthermore, we clarify the relation among the secret key rate, Alice's detection efficiency, and the dispersion coefficient. Finally, we simply analyze its performance in the optical fiber channel. 相似文献
13.
Building a quantum key distribution network is crucial for practical quantum cryptography. We present a scheme to build a star topology quantum key distribution network based on wavelength division multiplexing which, with current technology, can connect at least a hundred users. With the scheme, a 4-user demonstration network was built up and key exchanges were performed. 相似文献
14.
Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum key distribution protocol was proposed based on the qubits.Later on,it was found that quantum continuous variables can also be exploited for this target.The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse.In this article,we review the current status of the continuous variable quantum key distribution research,including its basic principle,experimental implementations,security and future directions;the experimental progress in this field made by our group is also presented. 相似文献
15.
Security of a practical semi-device-independent quantum key distribution protocol against collective attacks 下载免费PDF全文
Similar to device-independent quantum key distribution(DI-QKD), semi-device-independent quantum key distribution(SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices.The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a oneway prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. 相似文献
16.
A scheme of quantum network based on multiuser differential phase shift quantum key distribution system (DPS-QKD) is proposed. In this quantum network, arbitrary two users can achieve secret bits sharing by point-to-multipoint quantum key distribution and secret bits comparison. A protocol of secret bits sharing between arbitrary two users is presented. This network can implement secret bits distribution over 200 km with higher key generation rate by today's technologies. In theory, the capacity of user numbers in this network is unlimited. Hence, our proposed quantum network can serve for a metropolitan QKD network. A wide area QKD network can be constructed with this metropolitan QKD network. 相似文献
17.
Practical security analysis of continuous-variable quantum key distribution with an unbalanced heterodyne detector 下载免费PDF全文
Lingzhi Kong 《中国物理 B》2022,31(7):70303-070303
When developing a practical continuous-variable quantum key distribution (CVQKD), the detector is necessary at the receiver's side. We investigate the practical security of the CVQKD system with an unbalanced heterodyne detector. The results show that unbalanced heterodyne detector introduces extra excess noise into the system and decreases the lower bound of the secret key rate without awareness of the legitimate communicators, which leaves loopholes for Eve to attack the system. In addition, we find that the secret key rate decreases more severely with the increase in the degree of imbalance and the excess noise induced by the imbalance is proportional to the intensity of the local oscillator (LO) under the same degree of imbalance. Finally, a countermeasure is proposed to resist these kinds of effects. 相似文献
18.
Yuan Li Peng Huang Shiyu Wang Tao Wang Dengwen Li Guihua Zeng 《Physics letters. A》2018,382(45):3253-3261
In a fiber-based continuous-variable quantum key distribution (CVQKD) system, to perform the channel estimation, the channel transmittance is usually assumed to be a constant. Subsequently, when the channel parameters are intentionally manipulated, the employed parameter estimation method will lead to deviations of channel parameters and ultimately impacting the evaluation of the secret key rate. In this paper, we propose a denial-of-service attack strategy based on Eve's manipulation of the channel parameters. In particular, we analyze in detail the impact of this attack when the channel transmittance is attacked and obeys two-point distribution and uniform distribution. The result shows that in both cases, Eve's slight manipulation on the quantum channel will lead to large underestimation of the secure transmission distance by using the previous parameter estimation, which will lead to intentional terminations of the communication. To prevent this attack, a simple data post-selection should be added before parameter estimation. 相似文献
19.
Zhao-Ying Jia Jie Gu Bing-Hong Li Hua-Lei Yin Zeng-Bing Chen 《Entropy (Basel, Switzerland)》2021,23(6)
As an essential application of quantum mechanics in classical cryptography, quantum secret sharing has become an indispensable component of quantum internet. Recently, a differential phase shift quantum secret sharing protocol using a twin field has been proposed to break the linear rate-distance boundary. However, this original protocol has a poor performance over channels with asymmetric transmittances. To make it more practical, we present a differential phase shift quantum secret sharing protocol with asymmetric source intensities and give the security proof of our protocol against individual attacks. Taking finite-key effects into account, our asymmetric protocol can theoretically obtain the key rate two orders of magnitude higher than that of the original protocol when the difference in length between Alice’s channel and Bob’s is fixed at 14 km. Moreover, our protocol can provide a high key rate even when the difference is quite large and has great robustness against finite-key effects. Therefore, our work is meaningful for the real-life applications of quantum secret sharing. 相似文献
20.
In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations. 相似文献