首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   3篇
物理学   5篇
  2022年   1篇
  2019年   1篇
  2014年   1篇
  2009年   1篇
  2008年   1篇
排序方式: 共有5条查询结果,搜索用时 15 毫秒
1
1.
We propose a decoy state quantum key distribution scheme with odd coherent state which follows sub-Poissonian distributed photon count and has low probability of the multi-photon event and vacuum event in each pulse. The numerical calculations show that our scheme can improve efficiently the key generation rate and secure communication distance. Fhrthermore, only one decoy state is necessary to approach to the perfect asymptotic limit with infinite decoy states in our scheme, but at least two decoy states are needed in other scheme.  相似文献   
2.
Measurement-device-independent quantum key distribution(MDI-QKD) offers a practical way to realize a startype quantum network. Previous experiments on MDI-QKD networks can only support the point-to-point communication. We experimentally demonstrate a plug-and-play MDI-QKD network which can support the pointto-multipoint communication among three users. Benefiting from the plug-and-play MDI-QKD architecture,the whole network is automatically stabilized in spectrum, polarization, arrival time, and phase reference. The users only need the encoding devices, which means that the hardware requirements are greatly reduced. Our experiment shows that it is feasible to establish a point-to-multipoint MDI-QKD network.  相似文献   
3.
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noneloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].  相似文献   
4.
The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical key generation rate in the presence of fluctuation of the dark count rate, and compare the result with the result of the decoy-state without fluctuation. It is found that the key generation rate and maximal secure distance will be decreased under the influence of the fluctuation of the dark count rate.  相似文献   
5.
孙仕海 《大学物理》2022,41(2):38-43
量子信息技术因其卓越的特性而受到高度重视,被认为是未来信息技术发展的必然趋势,而具备量子物理背景的专业人才培养就显得极为重要.但是,由于量子信息技术具有抽象性、交叉性、前沿性和复杂性等特点,针对本科生开展相关实验教学具有一定挑战.中山大学从2018年开始在该方面进行了初步探索,针对高年级本科生开设了量子密钥分发等实验课程.本文基于笔者的教学工作,对量子密钥分发实验课程进行了介绍,探讨了其中的难点以及解决方案,希望通过本文探讨,能够对量子信息技术的教学工作有一定帮助.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号