首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Ding  Chao  Wang  Yijun  Zhang  Wei  Li  Zhou  Wu  Zijie  Zhang  Hang 《International Journal of Theoretical Physics》2021,60(4):1361-1373

We propose a novel multi-mode Gaussian modulated continuous variable measurement-device-independent quantum key distribution (MDI-CVQKD) protocol where Alice and Bob prepare independent and identically distributed Gaussian modulated coherent states in multiple independent modes respectively along with Charlie using a traditional noise homodyne detector to measure. Since it is completely handed over to an untrusted third party (Charlie) to measure, this protocol can effectively eliminate the defects of the actual detector. As well as, we also proved that the multi-mode MDI-CVQKD protocol can reduce electronic noise. The simulation results show that the multi-mode Gaussian modulated MDI-CVQKD protocol can indeed significantly improve the key rate of the original Gaussian modulated MDI-CVQKD protocol, and extend the maximum secure transmission distance of the secret key.

  相似文献   

2.
International Journal of Theoretical Physics - We propose a new scheme to strengthen the performance of the discrete-modulated continuous-variable measurement-device-independent quantum key...  相似文献   

3.
Lingzhi Kong 《中国物理 B》2022,31(7):70303-070303
When developing a practical continuous-variable quantum key distribution (CVQKD), the detector is necessary at the receiver's side. We investigate the practical security of the CVQKD system with an unbalanced heterodyne detector. The results show that unbalanced heterodyne detector introduces extra excess noise into the system and decreases the lower bound of the secret key rate without awareness of the legitimate communicators, which leaves loopholes for Eve to attack the system. In addition, we find that the secret key rate decreases more severely with the increase in the degree of imbalance and the excess noise induced by the imbalance is proportional to the intensity of the local oscillator (LO) under the same degree of imbalance. Finally, a countermeasure is proposed to resist these kinds of effects.  相似文献   

4.
We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel. Different from optical fibers, the underwater channel has more severe optical attenuation because of optical absorption and scattering, which reduces the maximum communication distance. To enhance the performance of the protocol, the photon subtraction operation is implemented at the modulator side. We carry out a performance simulation in two different kinds of seawater channel, and the result shows that the scheme with photon subtraction has a longer secure communication distance under certain conditions.  相似文献   

5.
Long block length rate-compatible low-density parity-compatible (LDPC) codes are designed to solve the problems of great variation of quantum channel noise and extremely low signal-to-noise ratio in continuous-variable quantum key distribution (CV-QKD). The existing rate-compatible methods for CV-QKD inevitably cost abundant hardware resources and waste secret key resources. In this paper, we propose a design rule of rate-compatible LDPC codes that can cover all potential SNRs with single check matrix. Based on this long block length LDPC code, we achieve high efficiency continuous-variable quantum key distribution information reconciliation with a reconciliation efficiency of 91.80% and we have higher hardware processing efficiency and lower frame error rate than other schemes. Our proposed LDPC code can obtain a high practical secret key rate and a long transmission distance in an extremely unstable channel.  相似文献   

6.
We propose a scheme to remove the demand of transmitting a high-brightness local oscillator (LO) in continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, which we call as the self-referenced (SR) CV-MDI QKD. We show that our scheme is immune to the side-channel attacks, such as the calibration attacks, the wavelength attacks and the LO fluctuation attacks, which are all exploiting the security loopholes introduced by transmitting the LO. Besides, the proposed scheme waives the necessity of complex multiplexer and demultiplexer, which can greatly simplify the QKD processes and improve the transmission efficiency. The numerical simulations under collective attacks show that all the improvements brought about by our scheme are only at the expense of slight transmission distance shortening. This scheme shows an available method to mend the security loopholes incurred by transmitting LO in CV-MDI QKD.  相似文献   

7.
Lingzhi Kong 《中国物理 B》2022,31(9):90304-090304
We propose a new scheme to enhance the performance of the Gussian-modulated coherent-state continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) system via quantum scissors (QS) operation at Bob's side. As an non-deterministic amplifying setup, we firstly introduce the QS-enhanced CV-MDI-QKD protocol and then investigate the success probability of the QS operation in accordance with the equivalent one-way scheme. Afterwards, we investigate the effect of the QS operation on the proposed scheme and analyze the performance of the QS-enhanced CV-MDI-QKD system under the extreme asymmetric circumstance. Simulation results show that the QS operation can indeed improve the performance of the CV-MDI-QKD system considerably. QS-enhanced CV-MDI-QKD protocol outperforms the original CV-MDI-QKD protocol in both the maximum transmission distance and the secret key rate. Moreover, the better the performance of QS operation, the more significant the improvement of performance of the system.  相似文献   

8.
The effects of weather conditions are ubiquitous in practical wireless quantum communication links.Here in this work,the performances of atmospheric continuous-variable measurement-device-independent quantum key distribution(CV-MDI-QKD) under diverse weather conditions are analyzed quantitatively.According to the Mie scattering theory and atmospheric CV-MDI-QKD model,we numerically simulate the relationship between performance of CV-MDI-QKD and the rainy and foggy conditions,aiming to get close to the actual combat environment in the future.The results show that both rain and fog will degrade the performance of the CV-MDI-QKD protocol.Under the rainy condition,the larger the raindrop diameter,the more obvious the extinction effect is and the lower the secret key rate accordingly.In addition,we find that the secret key rate decreases with the increase of spot deflection distance and the fluctuation of deflection.Under the foggy condition,the results illustrate that the transmittance decreases with the increase of droplet radius or deflection distance,which eventually yields the decrease in the secret key rate.Besides,in both weather conditions,the increase of transmission distance also leads the secret key rate to deteriorate.Our work can provide a foundation for evaluating the performance evaluation and successfully implementing the atmospheric CV-MDI-QKD in the future field operation environment under different weather conditions.  相似文献   

9.
The intensities of signal and local oscillator (LO) can be elegantly manipulated for the noise-based quantum system while manipulating the wavelength-dependent modulation in source to increase the performance of the continuous-variable key distribution in terms of the secret key rate and maximal transmission distance. The source-based additional noises can be tuned and stabilized to the suitable values to eliminate the effect of the LO fluctuations and defeat the potential attacks in imperfect quantum channels. It is firmly proved that the secret key rate can be manipulated in source over imperfect channels by the intensities of signal and LO with different wavelengths, which have an effect on the optimal signal-to-noise ratio of the heterodyne detectors resulting from the detection efficiency and the additional electronic noise as well. Simulation results show that there is a nice balance between the secret key rate and the maximum transmission distance.  相似文献   

10.
孙颖  赵尚弘  东晨 《物理学报》2015,64(14):140304-140304
针对量子中继器短时间内难以应用于长距离量子密钥分配系统的问题, 提出了基于量子存储的长距离测量设备无关量子密钥分配协议, 分析了其密钥生成率与存储效率、信道传输效率和安全传输距离等参数间的关系, 研究了该协议中量子存储单元的退相干效应对最终密钥生成率的影响, 比较了经典测量设备无关量子密钥分配协议和基于量子存储的测量设备无关量子密钥分配协议的密钥生成率与安全传输距离的关系. 仿真结果表明, 添加量子存储单元后, 协议的安全传输距离由无量子存储的216 km增加至500 km, 且量子存储退相干效应带来的误码对最终的密钥生成率影响较小. 实验中可以采取调节信号光强度的方式提高测量设备无关量子密钥分配系统的密钥生成率, 为实用量子密钥分配实验提供了重要的理论参数.  相似文献   

11.
Coherent source of continuous-variable quantum key distribution (CV QKD) system may become noisy in practical applications. The security of CV-QKD scheme with the noisy coherent source is investigated under realistic conditions of quantum channel and detector. In particular, two models are proposed to characterize the noisy coherent source through introducing a party (Fred) who induces the noise with an optical amplifier. When supposing the party Fred is untrusted, two lower security bounds to the noise of the coherent source are derived for reverse reconciliation and realistic homodyne and heterodyne detections. While supposing Fred is a neutral party, we derive two tight security bounds without knowing Fred’s exact state for ideal detections. Moreover, the simulation results show that the security of the reverse reconciliation CV-QKD protocols is very sensitive to the noise of coherent source for both the homodyne and heterodyne detections.  相似文献   

12.
We consider the transport and the noise characteristic in the case of a triple quantum dots T-shape system where two of the dots form a two-level system and the other works in a detector-like setup. Our theoretical results are obtained using the equation of motion method for the case of zero and finite on-site Coulomb interaction in the detector dot. We present analytic results for the electronic Green’s functions in the system’s component quantum dots, and we used numerical calculations to evaluate the system’s transport properties. The transport trough the T-shaped system can be controlled by varying the coupling between the two-level system dots or the coupling between the detector dot and the exterior electrodes. The system’s conductance presents Fano dips for both strong (fast detector) and weak coupling (slow detector) between the detector dot and the external electrodes. Due to stronger electronic correlations the noise characteristics in the case of a slow detector are much higher. This setup may be of interest for the practical realization of qubit states in quantum dots systems.  相似文献   

13.
We characterize the efficiency of the practical continuous-variable quantum key distribution (CVQKD) while inserting the heralded noiseless linear amplifier (NLA) before detectors to increase the secret key rate and the maximum transmission distance in Gaussian channels. In the heralded NLA-based CVQKD system, the entanglement source is only placed in the middle while the two participants are unnecessary to trust their source. The intensities of source noise are sensitive to the tunable NLA with the parameter g in a suitable range and can be stabilized to the suitable constant values to eliminate the impact of channel noise and defeat the potential attacks. Simulation results show that there is a well balance between the secret key rate and the maximum transmission distance with the tunable NLA.  相似文献   

14.
The state preparation operation of continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol may become imperfect in practical applications. We address the security of the CV-MDI-QKD protocol based on imperfect preparation of the coherent state under realistic conditions of lossy and noisy quantum channel. Specifically, we assume that the imperfection of Alice's and Bob's practical state preparations equal to the amplification of ideal modulators and lasers at both Alice's and Bob's sides by untrusted third-parties Fred and Gray employing phase-insensitive amplifiers (PIAs), respectively. The equivalent excess noise introduced by the imperfect state preparation is comprehensively and quantitatively calculated by adopting the gains of PIAs. Security analysis shows that CV-MDI-QKD is quite sensitive to the imperfection of practical state preparation, which inevitably deteriorates the performance and security of CV-MDI-QKD system. Moreover, a lower bound of the secret key rate is derived under arbitrary collective attacks, and the upper threshold of this imperfection tolerated by the system is obtained in the form of the specific gains of PIAs. In addition, the methods presented will improve and perfect the practical security of CV-MDI-QKD protocol.  相似文献   

15.
We characterize a modified continuous-variable quantum key distribution(CV-QKD)protocol with four states in the middle of a quantum channel.In this protocol,two noiseless linear amplifiers(NLAs) are inserted before each detector of the two parts,Alice and Bob,with the purpose of increasing the secret key rate and the maximum transmission distance.We present the performance anal.ysis of the new four-state CV-QKD protocol over a Gaussian lossy and noisy channel.The simulation results show that the NLAs with a reasonable gain g can effectively enhance the secret key rate as well as the maximum transmission distance,which is generally satisfied in practice.  相似文献   

16.
Simultaneous two-way classical and quantum (STCQ) communication combines both continuous classical coherent optical communication and continuous-variable quantum key distribution (CV-QKD), which eliminates all detection-related imperfections by being measurement-device-independent (MDI). In this paper, we propose a protocol relying on STCQ communication on the oceanic quantum channel, in which the superposition-modulation-based coherent states depend on the information bits of both the secret key and the classical communication ciphertext. We analyse the encoding combination in classical communication and consider the probability distribution transmittance under seawater turbulence with various interference factors. Our numerical simulations of various practical scenarios demonstrate that the proposed protocol can simultaneously enable two-way classical communication and CV-MDI QKD with just a slight performance degradation transmission distance compared to the original CV-MDI QKD scheme. Moreover, the asymmetric situation outperforms the symmetric case in terms of transmission distance and optical modulation variance. We further take into consideration the impact of finite-size effects to illustrate the applicability of the proposed scheme in practical scenarios. The results show the feasibility of the underwater STCQ scheme, which contributes toward developing a global quantum communication network in free space.  相似文献   

17.
In the continuous variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol, both Alice and Bob send quantum states to an untrusted third party, Charlie, for detection through the quantum channel. In this paper, we mainly study the performance of the CV-MDI-QKD system using the noiseless linear amplifier (NLA). The NLA is added to the output of the detector at Charlie’s side. The research results show that NLA can increase the communication distance and secret key rate of the CV-MDI-QKD protocol. Moreover, we find that the more powerful the improvement of the performance with the longer gain of NLA and the optimum gain is given under different conditions.  相似文献   

18.
The estimation of phase noise of continuous-variable quantum key distribution protocol with a local local oscillator (LLO CVQKD), as a major process in quantifying the secret key rate, is closely relevant to the intensity of the phase reference. However, the transmission of the phase reference through the insecure quantum channel is prone to be exploited by the eavesdropper (Eve) to mount attacks. Here, we introduce a polarization attack scheme against the phase reference. Presently, in a practical LLO CVQKD system, only part of the phase reference pulses are measured to compensate for the polarization drift of the quantum signal pulses in a compensation cycle due to the limited polarization measurement rate, while the other part of the phase reference pulses are not measured. We show that Eve can control the phase noise by manipulating the polarization direction of the unmeasured phase reference to hide her attack on the quantum signal. Simulations show that Eve can obtain partial or total key rates information shared between Alice and Bob as the transmission distance increases. Improving the polarization measurement rate to 100% or monitoring the phase reference intensity in real-time is of great importance to protect the LLO CVQKD from polarization attack.  相似文献   

19.
与单光子量子密钥分配采用单光子探测器不同,连续变量量子密钥分配采用平衡零拍测量技术.分析了由于参考光的真空噪声、分束器的透射率和反射率不相等引入的平衡零拍测量误差,以及平衡零拍测量探测器的电子噪声对连续变量量子密钥传输的最大安全距离的限制,给出了平衡零拍测量的探测噪声、电子噪声和密钥量之间的定量表达式.  相似文献   

20.
A saturation attack can be employed for compromising the practical security of continuous-variable quantum key distribution (CVQKD). In this paper, we suggest a countermeasure approach to resisting this attack by embedding an adjustable optical filter (AOF) in the CVQKD system. Numerical simulations illustrate the effects of the AOF-enabled countermeasure on the performance in terms of the secret key rate and transmission distance. The legal participants can trace back the information that has been eavesdropped by an attacker from the imperfect receiver, which indicates that this approach can be used for defeating a saturation attack in practical quantum communications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号