首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Secure Communication Based on Quantum Key   总被引:1,自引:0,他引:1  
We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient.  相似文献   

2.
独立推导预报单光子源诱骗态量子密钥分发的密钥产生率计算公式,讨论密钥产生率和发送端探测效率的关系;进行弱相干光和预报单光子源诱骗态量子密钥分发的最优强度估计和密钥产生率数值计算.结果表明,预报单光子源诱骗态量子密钥分发的密钥产生率随着发送端探测效率的增加而增加,其安全通信距离与完美单光子源的通信距离一致;诱骗态量子密钥分发可提高安全通信距离和密钥产生率;预报单光子源由于减少了暗计数的影响,进一步提高了安全通信距离.  相似文献   

3.
真实量子密钥分发系统中不完善的单光子源和信道损耗的存在,使得现有基于弱相干态的量子密码实验在分束攻击下并不安全,诱骗信号方案能实现基于现有技术绝对安全的量子密钥分发,并能有效提高密钥分发率和安全传输距离,因此成为近年来量子通信研究的热点问题.结合现实量子密码系统的一般模型,介绍目前几种典型的诱骗信号方案以及实验进展,综述了诱骗信号方案的发展情况和最新成果,并对未来的研究方向进行了展望.  相似文献   

4.
By utilizing the delocalized correlation of entangled states in quantum information theory, a novel method on acknowledgments of quantum information among three-party is presented, and then two three-party quantum network communication protocols based on quantum teleportation are presented, namely, three-party stop-wait quantum communication protocol and three-party selective automatic repeat quantum communication protocol. In the two proposed protocols, the data frames composed of qubits are teleported via three-party quantum teleportation, the two receivers simultaneously receive quantum frames from the sender, and then return quantum acknowledgment frames or quantum negative acknowledgment frames via quantum entanglement channels. The sender simultaneously receives and deals with quantum acknowledgment frames and quantum negative acknowledgment frames from the two receivers, thus the processing delay on returning quantum frames is reduced. And due to the transience of transferring quantum information, the returning of quantum acknowledgment frames and quantum negative acknowledgment frames are completed instantaneously, the proposed protocols reduce the transmission delay and improve the communication efficiency. During the whole course of communications, the classical channels are only used to transmit the measurement message, so the burdens of classical channels are reduced.  相似文献   

5.
We investigate the state or entanglement transfer through a two-dimensional spin network. We show that for state transfer, better fidelity can be gained along the diagonal direction but for entanglement transfer, when the initial entanglement is created along the boundary, the concurrence is more inclined to propagate along the boundary. This behavior is produced by quantum mechanical interference and the communication quality depends on the precise size of the network. For some number of sites, the fidelity in a two-dimensional channel is higher than one-dimensional case. This is an important result for realizing quantum communication through high dimension spin chain networks.  相似文献   

6.
We investigate the state or entanglement transfer through a two-dimensional spin network. We show that for state transfer, better fidelity can be gained along the diagonal direction but for entanglement transfer, when the initial entanglement is created along the boundary, the concurrence is more inclined to propagate along the boundary. This behavior is produced by quantum mechanical interference and the communication quality depends on the precise size of the network. For some number of sites, the fidelity in a two-dimensional channel is higher than one-dimensional case. This is an important result for realizing quantum communication through high dimension spin chain networks.  相似文献   

7.
Measurement-device-independent quantum key distribution(MDI-QKD) offers a practical way to realize a startype quantum network. Previous experiments on MDI-QKD networks can only support the point-to-point communication. We experimentally demonstrate a plug-and-play MDI-QKD network which can support the pointto-multipoint communication among three users. Benefiting from the plug-and-play MDI-QKD architecture,the whole network is automatically stabilized in spectrum, polarization, arrival time, and phase reference. The users only need the encoding devices, which means that the hardware requirements are greatly reduced. Our experiment shows that it is feasible to establish a point-to-multipoint MDI-QKD network.  相似文献   

8.
Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening question. In this paper, we briefly review the development of quantum hacking and security evaluation technology for a practical decoy state BB84 QKD system. The security requirement and parameters in each module (source, encoder, decoder and detector) are discussed, and the relationship between quantum hacking and security parameter are also shown.  相似文献   

9.
Quantum Secure Direct Communication Network with Two-Step Protocol   总被引:9,自引:0,他引:9       下载免费PDF全文
An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.  相似文献   

10.
Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections in realistic devices that are not considered in the theoretical security proof may have an impact on the practical security of realistic HD-QKD systems. In this paper, we research the influence of a realistic intensity modulator on the practical security of HD-QKD systems with the decoy-state method and finite-key effects. We demonstrate that there is a certain impact in the secret key rate and the transmission distance when taking practical factors into security analysis.  相似文献   

11.
We investigate the key rate of polarization-coded optical fiber-based quantum key distribution system (QKD) with BB84 protocol by channel tomography. The quantum bit error rate (QBER) of the QKD system under depolarizing channel is obtained by analyzing output density operators, transmission rate of channel, transmission rate of the receiver and dark count of single photon detector. According to the estimated QBER an LDPC chosen adaptively is applied to information reconciliation and the practical final key rate is discussed. Analysis results show that compared with cascade scheme and no channel knowledge the key rate can be improved by the proposed reconciliation scheme with channel tomography.  相似文献   

12.
The goal of quantum key distribution(QKD) is to generate secret key shared between two distant players,Alice and Bob. We present the connection between sampling rate and erroneous judgment probability when estimating error rate with random sampling method, and propose a method to compute optimal sampling rate, which can maximize final secure key generation rate. These results can be applied to choose the optimal sampling rate and improve the performance of QKD system with finite resources.  相似文献   

13.
We present a scheme that is capable of detecting photon numbers during the quantum key distribution (QKD) based on an improved differential phase shift (DPS) system without Trojan horse attack. A time-multiplexed detector (TMD) is set in for the photon-number resolution. Two fibre loops are used for detecting photon numbers as well as distributing keys. The long-term stabilization is guaranteed by two Faraday mirrors (FM) at Bob's site to automatically compensate for polarization defect. Our experimental study (90km QKD is completed) indicates that such a system is stable and secure which nearly reaches the performance of a single photon scheme.  相似文献   

14.
Quantum Key Distribution Network Based on Differential Phase Shift   总被引:4,自引:0,他引:4       下载免费PDF全文
Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the different detection time slots ensure the security of our scheme against eavesdropping. We discuss the security under the intercept-resend attack and the source replacement attack.  相似文献   

15.
Recently, small-scale Quantum Key Distribution (QKD) networks have been demonstrated and continuously operated in field environment. However, nodes of these QKD networks are less than 10 nodes. When the scale and structure of these networks becomes large and complex, such networks will subject to problem of intractable routing selection and limited transmission distance. We present a novel quantum network model and the corresponding protocol to solve these problems. The proposed quantum network model integrates classical communication network with quantum key distribution layer. Nodes in this quantum network model are divided into communication nodes for classical communication and quantum nodes for quantum key distribution. We use atomic ensembles to create entangled photons inside quantum nodes. Quantum repeaters are used to establish entanglement between remote quantum nodes so the maximum distribution distance of entangled photons can be extended. The main idea is to establish an appropriate key distribution path in the quantum key distribution layer based on the routing information obtained by the upper classical communication network. After the entanglement has been established between remote quantum nodes, these nodes will use the Ekert91 or BBM92 protocol to generate secret keys shared between each other. Then, these keys can be used to ensure the security of communication in the classical communication network.  相似文献   

16.
17.
Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.  相似文献   

18.
We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques.  相似文献   

19.
In this paper, we consider the influence of a divergence of polarization of a quantum signal transmitted through an optical fiber channel on the quantum bit error rate of the subcarrier wave quantum key distribution protocol. Firstly, we investigate the dependence of the optical power of the signal on the modulation indices’ difference after the second phase modulation of the signal. Then we consider the Liouville equation with regard to relaxation in order to develop expressions of the dynamics of the Stokes parameters. As a result, we propose a model that describes quantum bit error rate for the subcarrier wave quantum key distribution depending on the characteristics of the optical fiber. Finally, we propose several methods for minimizing quantum bit error rate.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号