共查询到19条相似文献,搜索用时 62 毫秒
1.
2.
量子保密通信包括量子密钥分发、量子安全直接通信和量子秘密共享等主要形式.在量子密钥分发和秘密共享中,传输的是随机数而不是信息,要再经过一次经典通信才能完成信息的传输.在量子信道直接传输信息的量子通信形式是量子安全直接通信.基于量子隐形传态的量子通信(简称量子隐形传态通信)是否属于量子安全直接通信尚需解释.构造了一个量子隐形传态通信方案,给出了具体的操作步骤.与一般的量子隐形传态不同,量子隐形传态通信所传输的量子态是计算基矢态,大大简化了贝尔基测量和单粒子操作.分析结果表明,量子隐形传态通信等价于包含了全用型量子密钥分发和经典通信的复合过程,不是量子安全直接通信,其传输受到中间介质和距离的影响,所以不比量子密钥分发更有优势.将该方案与量子密钥分发、量子安全直接通信和经典一次性便笺密码方案进行对比,通过几个通信参数的比较给出各个方案的特点,还特别讨论了各方案在空间量子通信方面的特点. 相似文献
3.
4.
提出了一种改进的基于时间和相位混合编码的量子密钥分发方案, 并进行了实验研究.在以BB84协议为基础的相位编码量子密钥分发系统上, 利用了系统中原来舍弃的脉冲进行时间编码, 使成码率提高为原方案的二倍. 系统同时获得时间编码密钥和相位编码密钥, 现在可以将两组密钥组合成新密钥, 提高了成码率和监测窃听灵敏度. 同时在系统的接收端用双FM反射式干涉仪代替传统的光纤M-Z干涉仪,提高了系统的稳定性. 实验上已实现90km光纤量子密钥分发, 实验表明本系统具有安全性高,稳定性好,成本低的优点.
关键词:
量子保密通信
量子密钥分发
相位编码
时间编码 相似文献
5.
在差分法基础上提出了一种改进的差分相位编码量子密钥分发(QKD)方案.Alice采用脉冲激光光源,通过两个串联光纤延迟环产生四个均匀的相干脉冲,并对脉冲进行差分调制,补偿了传输过程中环境对偏振的扰动.Bob采用双FM干涉仪,在窄脉冲门控模式下进行单光子探测.单程传输避免了木马攻击,增强了方案的安全性.实验结果表明,系统可以长期稳定运转(大于24h),误码率为3%.改进的系统具有高效、稳定、低成本的优点,实施方便,有很好的实用价值.
关键词:
量子保密通信
量子密钥分发
差分相位编码 相似文献
6.
7.
量子信息技术因其卓越的特性而受到高度重视,被认为是未来信息技术发展的必然趋势,而具备量子物理背景的专业人才培养就显得极为重要.但是,由于量子信息技术具有抽象性、交叉性、前沿性和复杂性等特点,针对本科生开展相关实验教学具有一定挑战.中山大学从2018年开始在该方面进行了初步探索,针对高年级本科生开设了量子密钥分发等实验课程.本文基于笔者的教学工作,对量子密钥分发实验课程进行了介绍,探讨了其中的难点以及解决方案,希望通过本文探讨,能够对量子信息技术的教学工作有一定帮助. 相似文献
8.
对一种结合离散调制和反向协调,适用于长距离传输的连续变量量子密钥分发四态协议的安全性进行了严格证明.这种协议中Alice发送的态与高斯调制协议中的有一定差异,这种差异可以等价成信道衰减和额外噪声.另外,由于Alice不可能做到精确调制,这会导致其发送的相干态中含有噪声.把这种调制引起的噪声看作光源的噪声,并推导出了在光源噪声不能被窃听者所利用的条件下的安全码率的下界.为了避免实验上快速、随机的控制本地振荡光的相位,还将无开关协议和四态协议相结合,分析了其安全性. 相似文献
9.
10.
11.
12.
13.
14.
The way to compare the efficiencies of different detect strategies (DSs) in the “ping-pong” protocol is studied. The trade-off
between information gain and disturbance is calculated and compared for different DSs. The comparison result primely tallies
with our intuitional analysis. It is shown that the analysis of this trade-off is a feasible way to compare the performances
of different DSs in theory.
Supported by the National High Technology Research and Development Program of China (Grant No. 2006AA01Z419), the National
Natural Science Foundation of China (Grant Nos. 90604023 and 6087319), the National Laboratory for Modern Communications Science
Foundation of China (Grant No. 9140C1101010601), the Natural Science Foundation of Beijing (Grant No. 4072020), and the ISN
Open Foundation. 相似文献
15.
Jiameng Yao Yaxing Wang Qiong Li Haokun Mao Ahmed A. Abd El-Latif Nan Chen 《Entropy (Basel, Switzerland)》2022,24(7)
Quantum key distribution (QKD) can provide point-to-point information-theoretic secure key services for two connected users. In fact, the development of QKD networks needs more focus from the scientific community in order to broaden the service scale of QKD technology to deliver end-to-end secure key services. Of course, some recent efforts have been made to develop secure communication protocols based on QKD. However, due to the limited key generation capability of QKD devices, high quantum secure key utilization is the major concern for QKD networks. Since traditional routing techniques do not account for the state of quantum secure keys on links, applying them in QKD networks directly will result in underutilization of quantum secure keys. Therefore, an efficient routing protocol for QKD networks, especially for large-scale QKD networks, is desperately needed. In this study, an efficient routing protocol based on optimized link-state routing, namely QOLSR, is proposed for QKD networks. QOLSR considerably improves quantum key utilization in QKD networks through link-state awareness and path optimization. Simulation results demonstrate the validity and efficiency of the proposed QOLSR routing protocol. Most importantly, with the growth of communication traffic, the benefit becomes even more apparent. 相似文献
16.
17.
In this paper an efficient quantum secure direct communication (QSDC) scheme with
authentication is presented, which is based on quantum entanglement and
polarized single photons. The present protocol uses Einstein--Podolsky--Rosen
(EPR) pairs and polarized
single photons in batches. A particle of the EPR pairs is retained
in the sender's station, and the other is transmitted forth and back
between the sender and the receiver, similar to the `ping--pong'
QSDC protocol. According to the shared information beforehand, these
two kinds of quantum states are mixed and then transmitted via a
quantum channel. The EPR pairs are used to transmit secret messages
and the polarized single photons used for authentication and
eavesdropping check. Consequently, because of the dual contributions
of the polarized single photons, no classical information is needed.
The intrinsic efficiency and total efficiency are both 1 in this
scheme as almost all of the instances are useful and each EPR pair
can be used to carry two bits of information. 相似文献
18.
CAO Hai-Jing CHEN Zhong-Hua SONG He-Shan 《理论物理通讯》2008,50(8):379-382
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel, quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel 相似文献
19.
A new quantum communication scheme based on entanglement swapping
is presented. Simplified calculation symbols are adopted to
realize the process. Quantum key distribution and quantum secure
direct communication can be simultaneously accomplished in the
scheme. Two legitimate communicators can secretly share four
certain key bits and four random key bits via three EPR pairs
(quantum channels). 相似文献