首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
We propose a novel quantum key distribution scheme by using the SAM-OAM hybrid entangled state as the physical resource.To obtain this state,the polarization entangled photon pairs are created by the spontaneous parametric down conversion process,and then,the q-plate acts as a SAM-to-OAM transverter to transform the polarization entangled pairs into the hybrid entangled pattern,which opens the possibility to exploit the features of the higher-dimensional space of OAM state to encode information.In the manipulation and encoding process,Alice performs the SAM measurement by modulating the polarization stateπ lθx on one photon,whereas Bob modulates the OAM sector state lx' on the other photon to encode his key elements using the designed holograms which is implemented by the computer-controlled SLM.With coincidence measurement,Alice could extract the key information.It is showed that N-based keys can be encoded with each pair of entangled photon,and this scheme is robust against Eve’s individual attack.Also,the MUBs are not used.Alice and Bob do not need the classical communication for the key recovery.  相似文献   

2.
Su X  Tan A  Jia X  Pan Q  Xie C  Peng K 《Optics letters》2006,31(8):1133-1135
The quantum entanglement of amplitude and phase quadratures between two intense optical beams with a total intensity of 22 mW and a frequency difference of 1 nm, which are produced from an optical parametric oscillator operating above threshold, is experimentally demonstrated with two sets of unbalanced Mach-Zehnder interferometers. The measured quantum correlations of intensity and phase are in reasonable agreement with the results calculated based on a semiclassical analysis of the noise characteristics given by Fabre et al. [J. Phys. (France) 50, 1209 (1989)].  相似文献   

3.
Zou H  Zhai S  Yang R  Fan D  Gao J  Zhang J 《Optics letters》2007,32(15):2218-2220
We demonstrate experimentally a protocol of transferring nonclassical quantum properties using two pairs of quantum-correlated twin beams in the continuous variable regime. The intensity quantum correlation from one twin beam is transferred to two initially independent idler beams with the help of a displacement transformation. It makes two originally independent beams exhibit an intensity quantum correlation of 0.8 dB below shot-noise level.  相似文献   

4.
杨宇光  温巧燕  朱甫臣 《物理学报》2005,54(12):5549-5553
提出了一种新的利用33 Hilbert空间的不可扩展乘积基和严格纠缠基的量子密钥分配方案.对窃听者的窃听成功概率进行了分析.该方案具有许多诸如容量大以及效率高等独特的特点. 关键词: 量子密钥分配 不可扩展乘积基 严格纠缠基 正交完备基  相似文献   

5.
A novel quantum key distribution scheme based on the path-spin hybrid entanglement is proposed and analyzed. In this proposed scheme, the entanglement between the path and the spin degrees of freedom is confined locally with the single particle and transmitted in one-way direction. Two split pulses of a single spin-1/2 particle are not simultaneously transmitted through the public quantum channels for the security goal. The scheme is robust against any individual attack even in noisy environments. Moreover, it also has high-efficiency since one single particle can be used to generate one bit key on average.  相似文献   

6.
A frequency-coded quantum key distribution scheme, what we propose here, is that using encoded qubit in different frequency of a photon in four kinds of states. These states satisfy requirements of BB84 protocol and could be produced with the recent advances in technology. Comparing with the scheme proposed in [Bloch et al., Opt. Lett. 32 (2007) 301], our scheme has no intrinsic deficiency that the measurement of one kind of the states will get wrong result with a little probability, and is a perfect BB84 protocol. The characters and feasibility of the scheme are discussed in detail.  相似文献   

7.
8.
《Physics letters. A》2020,384(16):126322
Quantum key distribution (QKD) is a promising application to establish unconditional secure communications by quantum mechanics. However, its widespread application still faces a great challenge, that is, the fundamental linear key-rate constraint called Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound. Recently, twin-field QKD (TF-QKD) was proposed (Lucamarini et al., 2018 [4]), it overcomes the constraint mentioned above. However, the original TF-QKD is based on the phase-encoding strategy, which requires active alignment. In this paper, we improve the original TF-QKD with the photon orbital angular momentum (OAM), and propose a novel reference frame independent protocol to overcome the reference frame dependence. No more alignment procedure is needed, and the intrinsic misalignment errors are eliminated by utilizing the rotation-invariance of OAM photons. Besides, the security performance is also improved.  相似文献   

9.
Xiao-Ming Chen 《中国物理 B》2022,31(12):120304-120304
The existing decoy-state quantum key distribution (QKD) beating photon-number-splitting (PNS) attack provides a more accurate method to estimate the secure key rate, while it still considers that only single-photon pulses can generate secure keys in any case. However, multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel. The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks. In particular, the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users. In this paper, under the null hypothesis of no weaker version of PNS attack, we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols, extract a Cauchy distribution statistic, and further provide a detection method and the type I error probability. If the result is judged to be an attack, we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate. Otherwise, the pulses with the same basis received including both single-photon pulses and multiphoton pulses, can be used to generate the keys and we give the secure key rate in this case. Finally, the associated experiments we performed (i.e., the significance level is 5%) show the correctness of our method.  相似文献   

10.
11.
《中国物理 B》2021,30(6):60304-060304
It is shown that the non-Gaussian operations can not only be used to prepare the nonclassical states, but also to improve the entanglement degree between Gaussian states. Thus these operations are naturally considered to enhance the performance of continuous variable quantum key distribution(CVQKD), in which the non-Gaussian operations are usually placed on the right-side of the entangled source. Here we propose another scheme for further improving the performance of CVQKD with the entangled-based scheme by operating photon-addition operation on the left-side of the entangled source.It is found that the photon-addition operation on the left-side presents both higher success probability and better secure key rate and transmission distance than the photon subtraction on the right-side, although they share the same maximal tolerable noise. In addition, compared to both photon subtraction and photon addition on the right-side, our scheme shows the best performance and the photon addition on the right-side is the worst.  相似文献   

12.
杨宇光  温巧燕  朱甫臣 《物理学报》2005,54(12):5544-5548
提出了一种基于纠缠交换的多方多级量子密钥分配协议.构造了一种两方三级系统的完备正交归一化基,利用该正交归一化基和纠缠交换可以实现两方量子密钥分配.同时,三级可以推广到多级以及两方推广到多方,即可以实现基于纠缠交换的多方多级量子密钥分配.这样,利用纠缠交换和多级密钥分配可以极大地提高检测窃听的效率、密钥生成率以及信息容量. 关键词: 量子密钥分配 纠缠交换 多方 多级  相似文献   

13.
Plug-and-play dual-phase-modulated continuous-variable quantum key distribution (CVQKD) protocol can effectively solve the security loopholes associated with transmitting local oscillator (LO). However, this protocol has larger excess noise compared with one-way Gaussian-modulated coherent-states scheme, which limits the maximal transmission distance to a certain degree. In this paper, we show a reliable solution for this problem by employing non-Gaussian operation, especially, photon subtraction operation, which provides a way to improve the performance of plug-and-play dual-phase-modulated CVQKD protocol. The photon subtraction operation shows experimental feasibility in the plug-andplay configuration since it can be implemented under current technology. Security results indicate that the photon subtraction operation can evidently enhance the maximal transmission distance of the plug-and-play dual-phase-modulated CVQKD protocol, which effectively makes up the drawback of the original one. Furthermore, we achieve the tighter bound of the transmission distance by considering the finite-size effect, which is more practical compared with that achieved in the asymptotic limit.  相似文献   

14.
朱俊  何广强  曾贵华 《中国物理》2007,16(5):1364-1369
In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein--Podolsky--Rosen (EPR) pairs is investigated. A new approach for calculating the secret information rate Δ I is proposed by using the Shannon information theory. Employing an available parameter F which is associated with the entanglement of the EPR pairs, one can detect easily the eavesdropping. Results show that the proposed scheme is secure against individual beam splitter attack strategy with a proper squeeze parameter.  相似文献   

15.
We introduce the concept of Shannon dimensionality D as a new way to quantify bipartite entanglement as measured in an experiment. This is applied to orbital-angular-momentum entanglement of two photons, using two state analyzers composed of a rotatable angular-sector phase plate that is lens coupled to a single-mode fiber. We can deduce the value of D directly from the observed two-photon coincidence fringe. In our experiment, D varies between 2 and 6, depending on the experimental conditions. We predict how the Shannon dimensionality evolves when the number of angular sectors imprinted in the phase plate is increased and anticipate that D approximately 50 is experimentally within reach.  相似文献   

16.
A conditional quantum correlation transfer is demonstrated experimentally for continuous variables by employing two pairs of twin-beams states. In present paper, the quantum correlation of twin beams is indicated by loss coefficient or “gemellity”, which is the remaining noise on the intensity difference normalized to the shot noise level. The quantum correlation between two initial idler beams with loss coefficient of 0.4 was conditionally transferred from two pairs of initially independent twin beams with loss coefficient of 0.2. A theory of conditional quantum correlation transfer and comparison between experimental results and theoretical prediction are also presented. The experimental results agree with the theory well.  相似文献   

17.
We report the generation and characterization of quantum-correlated twin beams and their application to a quantum channel. Compared with our previous results, the characterization of twin beams and the quantum channel have been studied with 7.0-dB intensity difference squeezing. The measured inference variance of twin beams is decreased to 0.40 ± 0.02. For the quantum channel, the bit error rate will be 0.035 by using 7.0-dB intensity difference squeezing compared with our previous result of 0.067 by using 4.9-dB intensity difference squeezing.  相似文献   

18.
Honjo T  Takesue H  Inoue K 《Optics letters》2007,32(9):1165-1167
We report what we believe to be the first differential-phase quantum key distribution experiment using a series of quantum entangled photon pairs. We employed two outstanding techniques. As an entangled photon source, we used a 1.5 microm band entangled photon pair source based on spontaneous four-wave mixing in a cooled dispersion-shifted fiber. As receivers, photon pairs were actively phase modulated with LiNbO3 phase modulators followed by very stable planar light-wave circuit Mach-Zehnder interferometers, which provided two nonorthogonal measurements. As a consequence, we successfully generated sifted keys with a quantum bit error rate of 8.3% and a key generation rate of 0.3 bit/s and revealed the feasibility of this QKD scheme.  相似文献   

19.
安雪碧  银振强  韩正甫 《物理学报》2015,64(14):140303-140303
宏观-微观纠缠最早起源于“薛定谔的猫”思想实验, 是指在宏观体系与微观体系之间建立量子纠缠. 实现宏观-微观纠缠可以利用多种物理体系来完成, 本文重点介绍了在光学体系中制备和检验宏观-微观纠缠的发展过程. 从最初的受激辐射单光子量子克隆到光学参量放大, 再到相空间的位移操作, 实验上制备宏观-微观纠缠的方法取得了长足的进步. 利用非线性光学参量放大过程制备的宏观-微观纠缠的光子数可以达到104量级, 人眼已经可以观察到, 因此使用人眼作为探测器来检验宏观-微观纠缠的实验开始出现. 但随后人们意识到, 粗精度的光子数探测器, 例如人眼, 无法严格判定宏观-微观纠缠的存在. 为了解决这个难题, 提出了一种巧妙的方法, 即在制备宏-微观纠缠后, 利用局域操作过程将宏观态再变为微观态, 通过判定微观纠缠存在的方法来判定宏微观纠缠的存在. 之后相空间的位移操作方法将宏观态的粒子数提高到108, 并且实现了纠缠的严格检验. 利用光机械实现宏观-微观纠缠的方案也被提出. 由于量子密钥分配中纠缠是必要条件, 而宏观-微观纠缠态光子数较多这一优势可能会对量子密钥分配的传输距离有所提高. 本文介绍了利用相位纠缠的相干态来进行量子秘钥分配的方案, 探讨了利用宏观-微观纠缠实现量子密钥分配的可能性.  相似文献   

20.
Continuous-variable quantum key distribution(CVQKD) protocols with entanglement in the middle(EM) enable long maximal transmission distances for quantum communications. For the security analysis of the protocols, it is usually assumed that Eve performs collective Gaussian attacks and there is a lack of finite-size analysis of the protocols. However,in this paper we consider the finite-size regime of the EM-based CVQKD protocols by exposing the protocol to collective attacks and coherent attacks. We differentiate between the collective attacks and the coherent attacks while comparing asymptotic key rate and the key rate in the finite-size scenarios. Moreover, both symmetric and asymmetric configurations are collated in a contrastive analysis. As expected, the derived results in the finite-size scenarios are less useful than those acquired in the asymptotic regime. Nevertheless, we find that CVQKD with entanglement in the middle is capable of providing fully secure secret keys taking the finite-size effects into account with transmission distances of more than 30 km.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号