共查询到20条相似文献,搜索用时 15 毫秒
1.
通过比较被动系统与主动系统的特性, 得出可信光源、不可信光源主动系统和不可信光源被动系统的密钥生成率随距离的变化关系; 采用标准误差分析法, 得到相应变量的偏离量; 基于诱骗态方案分析不可信光源被动系统暗计数率和光源强度参数波动对系统安全特性的影响, 得出在1310 nm 和1550 nm通信窗口下, 系统最大安全通信距离范围分别为[73.2 km, 96.5 km] 和[104.5 km, 137.9 km]. 这可为实用量子通信实验提供重要的理论参数.
关键词:
量子密钥分配
不可信光源
被动系统
统计波动 相似文献
2.
3.
Measurement-device-independent quantum cryptographic conferencing with an untrusted source 下载免费PDF全文
Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical multi-party quantum communication. In order to mitigate the experimental complexity of MDI-QCC and remove the key assumption(the sources are trusted) in MDI-QCC, we extend the framework of MDI-QKD with an untrusted source to MDI-QCC and give the rigorous security analysis of MDI-QCC with an untrusted source. What is more, in the security analysis we clearly provide a rigorous analytical method for parameters' estimation, which with simple modifications can be applied to not only MDI-QKD with an untrusted source but also arbitrary multi-party communication protocol with an untrusted source. The simulation results show that at reasonable distances the asymptotic key rates for the two cases(with trusted and untrusted sources) almost overlap, which indicates the feasibility of our protocol. 相似文献
4.
5.
Wen-Ting Li 《中国物理 B》2022,31(5):50310-050310
The transmission loss of photons during quantum key distribution (QKD) process leads to the linear key rate bound for practical QKD systems without quantum repeaters. Phase matching quantum key distribution (PM-QKD) protocol, an novel QKD protocol, can overcome the constraint with a measurement-device-independent structure, while it still requires the light source to be ideal. This assumption is not guaranteed in practice, leading to practical secure issues. In this paper, we propose a modified PM-QKD protocol with a light source monitoring, named PM-QKD-LSM protocol, which can guarantee the security of the system under the non-ideal source condition. The results show that our proposed protocol performs almost the same as the ideal PM-QKD protocol even considering the imperfect factors in practical systems. PM-QKD-LSM protocol has a better performance with source fluctuation, and it is robust in symmetric or asymmetric cases. 相似文献
6.
7.
针对实用的量子密钥分配(QKD)系统是基于强衰减的弱激光脉冲作为单光子源, 光子数分束攻击极大限制了通信双方在非理想条件下QKD的传输距离和密钥生成率,采用大数定律对诱惑态协议中单光子的计数率、单光子增益和误码率分别进行统计涨落分析, 利用双诱惑态比较了1310 nm和1550 nm条件下,编码脉冲的长度为(N = 106-N = 1012)实际QKD协议中密钥的生成率与安全传输距离之间的关系、安全传输距离随编码长度的变化的关系, 得出脉冲编码长度增大到N = 1012时,密钥的最大安全传输距离为135 km. 相似文献
8.
提出一种新的预报单光子源诱骗态量子密钥分发方案.在发端采用参量下变换产生纠缠光子对,其中之一用来进行预报探测,根据探测结果将另一路光脉冲分成两个集合,其中预报探测有响应的脉冲集合用作信号态,无响应的脉冲集合作为诱骗态.由于探测效率的问题,这两个集合都是有光子的,通过这两个集合的通过率和错误率估计出单光子的通过率和错误率.此方法不需要改变光强,简单可行.仿真结果表明:该方法可以达到完美单光子源的安全通信距离;与预报单光子源的量子密钥分发相比,密钥产生率有了很大的提高;和三强度预报单光子源诱骗态量子密钥分发的
关键词:
量子保密通信
量子密钥分发
诱骗态
预报单光子源 相似文献
9.
Decoy-state reference-frame-independent quantum key distribution with both source errors and statistical fluctuations 下载免费PDF全文
Reference-frame-independent quantum key distribution(RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performance of decoystate RFI QKD with both source errors and statistical fluctuations is still missing until now. In this paper, we investigate the performance of decoy-state RFI QKD in practical scenarios with two kinds of light sources, the heralded single photon source(HSPS) and the weak coherent source(WCS), and also give clear comparison results of decoy-state RFI QKD with WCS and HSPS. Simulation results show that the secret key rates of decoy-state RFI QKD with WCS are higher than those with HSPS in short distance range, but the secret key rates of RFI QKD with HSPS outperform those with WCS in long distance range. 相似文献
10.
11.
12.
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack 下载免费PDF全文
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. 相似文献
13.
现在诱惑态已被证明是一种可以大大提高量子密钥分发安全性能的现实可行的方法.由于考虑到现实应用中激光器在调制过程中的消光比不能做到100%,以及激光器固有的自发辐射因而使得制备真空态并不是一件容易的事情. 因此本文将对理想情况下准单光子光源量子密钥分发系统应用中的诱惑态结论作了补充和扩展,提出了两个弱光强态的诱惑态方案和一个弱光强诱惑态方案.最后,将“双探测器”的理论应用在准单光子源(HSPS)光源系统中,使系统的安全传输距离可达到2215km,比使用普通探测器的系统增加了约50km.
关键词:
量子密钥分发
诱惑态
HSPS光源
双探测器 相似文献
14.
现在诱惑态已被证明是一种可以大大提高量子密钥分发安全性能的现实可行的方法.由于考虑到现实应用中激光器在调制过程中的消光比不能做到100%,以及激光器固有的自发辐射因而使得制备真空态并不是一件容易的事情. 因此本文将对理想情况下准单光子光源量子密钥分发系统应用中的诱惑态结论作了补充和扩展,提出了两个弱光强态的诱惑态方案和一个弱光强诱惑态方案.最后,将“双探测器”的理论应用在准单光子源(HSPS)光源系统中,使系统的安全传输距离可达到2215km,比使用普通探测器的系统增加了约50km. 相似文献
15.
针对"即插即用"双向量子密钥分发系统传输效率低的实际问题, 详细分析了系统低效的原因和当前的解决方案, 提出了一种单光源多波长双向量子密钥分发方案. 该方案采用波分复用器件作为滤波器来产生量子密钥分发所需的多波长信号. 与其他多波长方案相比, 该方案的优点是在实现高速多波长量子密钥分发时, 不再受外界控制源调制速率和精度等性能的影响, 不再带来多激光器引入的边信道攻击的缺陷, 且整体系统易于集成. 该方案为"即插即用"量子密钥分发系统的高效研究提供了一个新的参考方案. 相似文献
16.
从有效性、稳定性和可行性三个方面, 对基于标记配对相干态光源的诱骗态量子密钥分配的性能进行了全面分析. 采用四组实验数据对基于标记配对相干态光源的三强度诱骗态方案的密钥生成效率、量子比特误码率和最优信号态强度与安全传输距离之间的关系进行了仿真和分析; 考虑到光源涨落, 对方案的稳定性进行了讨论和仿真; 并对基于标记配对相干态光源设计简单易实现方案的可行性进行了分析. 结论表明: 基于标记配对相干态光源的诱骗态方案性能在安全传输距离和密钥生成效率两方面都优于现有基于弱相干态光源和预报单光子源的诱骗态方案; 在光源强度涨落相同条件下, 标记配对相干态光源的稳定性逊于预报单光子源, 而优于相干态光源. 但是标记配对相干态光源在有效性上的优势可弥补其在稳定性上的不足; 且标记配对相干态光源的双模特性为设计简单易实现的被动诱骗态方案提供了条件.
关键词:
量子光学
量子密钥分配
标记配对相干态光源
性能 相似文献
17.
Practical non-orthogonal decoy state quantum key distribution with heralded single photon source 下载免费PDF全文
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol. 相似文献
18.
基于改造的弱相干态光源,提出了一种非正交编码被动诱骗态量子密钥分配方案.该方案不主动制备诱骗态,而是根据发送端探测器是否响应,将接收端的探测结果分为响应集合和未响应集合,以此分别作为信号态和诱骗态,并利用这两个集合来估计参量和生成密钥.数值仿真表明,非正交编码被动诱骗态方案的密钥生成效率和安全传输距离都优于现有的被动诱骗态方案,且性能非常接近主动无穷诱骗态方案的理论极限值;未响应集合对密钥生成的参与使方案性能免受发送端探测效率的影响,弥补了实际探测器探测效率低下的缺陷;由于不需要主动制备诱骗态,该方案实现非常简单,适用于高速量子密钥分配的场合.
关键词:
量子光学
量子密钥分配
被动诱骗态
密钥生成效率 相似文献
19.
Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key 下载免费PDF全文
Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios,also have the problem of device imperfections like finite-length keys. In this paper, based on the WCP source which can be used for the passive decoy-state method, we obtain the expressions of single-photon error rates, single-photon counts, and phase error rates. According to the information of smooth min-entropy, we calculate the key generation rate under the condition of finite-length key. Key generation rates with different numbers of pulses are compared by numerical simulations. From the results, it can be seen that the passive decoy-state method can have good results if the total number of pulses reaches 1010. We also simulate the passive decoy-state method with different probabilities of choosing a pulse for parameter estimation when the number of pulses is fixed. 相似文献
20.
《Physics letters. A》2014,378(11-12):863-868
Two-way Quantum Key Distribution (QKD) schemes commonly make use of a set of unitaries corresponding to binary encodings which can in principle be distinguished perfectly. In this paper, inline with the proposal in Chiribella et al. (2008) [13], we introduce a non-entangled two-way QKD scheme with two sets of unitaries of which the elements in one set can be viewed as ‘nonorthogonal’ to elements in the other with the aim of naturally suppressing an eavesdropper's information to provide for a higher security threshold. Security analysis is done in the context of individual attack strategies for a quick comparison with the conventional two-way QKD scheme. Given the richer structure of the improvement, future direction is also discussed. 相似文献