首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A quantum cryptosystem is proposed in which a pair of nonstationary states differing in their times of preparation is used as the information carriers. Pis’ma Zh. éksp. Teor. Fiz. 66, No. 11, 742–745 (10 December 1997)  相似文献   

2.
A quantum cryptography system based on a 4-basis protocol with geometrically uniform states is tested in a series of experiments. Quantum states of light transmitted through real fiber optic communication channels to a distance of 32 km in the presence of uncontrolled external actions are prepared, transformed, and measured. It is shown that the chosen algorithms of processing quantum information are adequate and can be used as foundations of practical devices in protected communication lines.1  相似文献   

3.
A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the protocol uses additional restrictions imposed by special relativity theory. Unlike all existing quantum key distribution protocols, this protocol ensures key secrecy for a not strictly one-photon source of quantum states and an arbitrary length of a quantum communication channel.  相似文献   

4.
《Physics letters. A》1998,241(3):135-138
A scheme of cryptographic key agreement via classical noise is introduced. The principle underlying its security is similar to that of the two-state quantum cryptosystem, but it has the advantage that signal amplification can be applied. Radio and optical implementations of the scheme are suggested.  相似文献   

5.
A novel implementation of quantum-noise optical cryptography is proposed, which is based on a simplified architecture that allows long-haul, high-speed transmission in a fiber optical network. By using a single multiport encoder/decoder and 16 phase shifters, this new approach can provide the same confidentiality as other implementations of Yuen's encryption protocol, which use a larger number of phase or polarization coherent states. Data confidentiality and error probability for authorized and unauthorized receivers are carefully analyzed.  相似文献   

6.
Towards practical quantum cryptography   总被引:5,自引:0,他引:5  
Quantum cryptography bases the security of quantum key exchange on the laws of quantum physics and is likely to become the first application employing quantum effects for communication. Here we present performance tests of a new design based on polarization encoding of attenuated, coherent light pulses. Our measurements show that this compact setup can achieve an effective key-bit rate in the kHz range with low alignment requirements and thus offers the tools for fast and user-friendly quantum key exchange. Received: 27 July 1999 / Revised version: 3 September 1999 / Published online: 10 November 1999  相似文献   

7.
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature. The single photon pulses are emitted on demand by a single nitrogen-vacancy color center in a diamond nanocrystal. The quantum bit error rate is less that 4.6% and the secure bit rate is 7700 bits/s. The overall performances of our system reaches a domain where single photons have a measurable advantage over an equivalent system based on attenuated light pulses.  相似文献   

8.
We develop a theory of quadratic quantum measurements by a mesoscopic detector. It is shown that the quadratic measurements should have nontrivial quantum information properties, providing, for instance, a simple way of entangling two noninteracting qubits. We also calculate the output spectrum of a detector with both linear and quadratic response, continuously monitoring two qubits.  相似文献   

9.
A comparison of two protocols for generating a cryptographic key composed from d-valued symbols, one using a string of independent qubits and another utilizing d-level systems prepared in states belonging to d + 1 mutually unbiased bases, is performed. The protocol based on qubits is shown to be optimal for quantum cryptography, since it provides higher security and a higher key generation rate.  相似文献   

10.
Faraday-Michelson system for quantum cryptography   总被引:9,自引:0,他引:9  
Mo XF  Zhu B  Han ZF  Gui YZ  Guo GC 《Optics letters》2005,30(19):2632-2634
Quantum key distribution provides unconditional security for communication. Unfortunately, current experimental schemes are not suitable for long-distance fiber transmission because of phase drift or Rayleigh backscattering. In this Letter we present a unidirectional intrinsically stable scheme that is based on Michelson-Faraday interferometers, in which ordinary mirrors are replaced with 90 degree Faraday mirrors. With the scheme, a demonstration setup was built and excellent stability of interference fringe visibility was achieved over a fiber length of 175 km. Through a 125 km long commercial communication fiber cable between Beijing and Tianjin, the key exchange was performed with a quantum bit-error rate of less than 6%, which is to our knowledge the longest reported quantum key distribution experiment under field conditions.  相似文献   

11.
We propose a quantum transmission based on bi-photons, which are doubly-entangled both in polarisation and phase. This scheme finds a natural application in quantum cryptography, where we show that an eventual eavesdropper is bound to introduce a larger error on the quantum communication than for a single entangled bi-photon communication, when he steels the same information. Received 23 July 2001 / Received in final form 30 November 2001 Published online 24 September 2002  相似文献   

12.
We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the "qubits" sent from the sender to the receiver. As we show, even quantum key distribution with perfect qubits might not be achievable over long distances when the other imperfections are taken into account. Furthermore, existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength. Finally we show that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart.  相似文献   

13.
S. N. Molotkov 《JETP Letters》1997,66(11):773-778
A quantum cryptosystem based on comparing an input signal from a communication channel with a reference state prepared at the receiving end is proposed. Pis’ma Zh. éksp. Teor. Fiz. 66, No. 11, 736–741 (10 December 1997)  相似文献   

14.
Experimental quantum secret sharing and third-man quantum cryptography   总被引:1,自引:0,他引:1  
Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.  相似文献   

15.
M. Shalaby 《Optik》2012,123(20):1852-1857
We present two quantum cryptography protocols. The first one generalizes the concept of the two-way deterministic protocol to work with qudits in prime d-dimensional system where d is odd. The second protocol makes use of the tomographically complete set construction for odd d-dimensional systems where d = p1p2 to modify the BB84 protocol to work with qudits of such systems. The securities of the two protocols are analyzed according to the intercept and resend attack.  相似文献   

16.
Error reconciliation is a necessary step for quantum key distribution process. In this paper, the correction ability of error reconciliation procedure which is called Winnow protocol is analyzed and estimated, moreover, it gives some expressions about it. The experiment results proved the capability of Winnow protocol are excellent. It is also indicates that the smallest N has the most correction efficiency where from the communication times between the legitimate parties and the data remaining efficiency consideration.  相似文献   

17.
The physical principles of a quantum key distribution protocol using four-level optical systems are discussed. Quantum information is encoded into polarization states created by frequency-nondegenerate spontaneous parametric down-conversion in collinear geometry. In the scheme under analysis, the required nonorthogonal states are generated in a single nonlinear crystal. All states in the selected basis are measured deterministically. The results of initial experiments on transformation of the basis polarization states of a four-level optical system are discussed.  相似文献   

18.
Quantum cryptography (secure key distribution) systems must include procedures for correcting errors in the raw key transmitted over a quantum communication channel. Several reconciliation protocols are discussed and compared in terms of efficiency.  相似文献   

19.
Relationship is established between the security of the BB84 quantum key distribution protocol and the forward and converse coding theorems for quantum communication channels. The upper bound Q c ≈ 11% on the bit error rate compatible with secure key distribution is determined by solving the transcendental equation $H(Q_c ) = \bar C(\rho )/2$ , where ρ is the density matrix of the input ensemble, $\bar C(\rho )$ is the classical capacity of a noiseless quantum channel, and H(Q) is the capacity of a classical binary symmetric channel with error rate Q.  相似文献   

20.
Phase-modulation transmission system for quantum cryptography   总被引:1,自引:0,他引:1  
We describe a new method for quantum key distribution that utilizes phase modulation of sidebands of modulation by use of integrated electro-optic modulators at the transmitting and receiving modules. The system is shown to produce constructive or destructive interference with unity visibility, which should allow quantum cryptography to be carried out with high flexibility by use of conventional devices.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号