首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exceed the basic rate-distance limit without quantum repeaters. Its variant protocol, sending or not-sending quantum key distribution (SNS-QKD), not only fixes the security vulnerability of TF-QKD, but also can tolerate large misalignment errors. However, the current SNS-QKD protocol is based on the active decoy-state method, which may lead to side channel information leakage when multiple light intensities are modulated in practice. In this work, we propose a passive decoy-state SNS-QKD protocol to further enhance the security of SNS-QKD. Numerical simulation results show that the protocol not only improves the security in source, but also retains the advantages of tolerating large misalignment errors. Therefore, it may provide further guidance for the practical application of SNS-QKD.  相似文献   

3.
《Physics letters. A》2020,384(16):126322
Quantum key distribution (QKD) is a promising application to establish unconditional secure communications by quantum mechanics. However, its widespread application still faces a great challenge, that is, the fundamental linear key-rate constraint called Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound. Recently, twin-field QKD (TF-QKD) was proposed (Lucamarini et al., 2018 [4]), it overcomes the constraint mentioned above. However, the original TF-QKD is based on the phase-encoding strategy, which requires active alignment. In this paper, we improve the original TF-QKD with the photon orbital angular momentum (OAM), and propose a novel reference frame independent protocol to overcome the reference frame dependence. No more alignment procedure is needed, and the intrinsic misalignment errors are eliminated by utilizing the rotation-invariance of OAM photons. Besides, the security performance is also improved.  相似文献   

4.
Yu Zhou 《中国物理 B》2022,31(8):80303-080303
High-dimensional quantum resources provide the ability to encode several bits of information on a single photon, which can particularly increase the secret key rate rate of quantum key distribution (QKD) systems. Recently, a practical four-dimensional QKD scheme based on time-bin quantum photonic state, only with two single-photon avalanche detectors as measurement setup, has been proven to have a superior performance than the qubit-based one. In this paper, we extend the results to our proposed eight-dimensional scheme. Then, we consider two main practical factors to improve its secret key bound. Concretely, we take the afterpulse effect into account and apply a finite-key analysis with the intensity fluctuations. Our secret bounds give consideration to both the intensity fluctuations and the afterpulse effect for the high-dimensional QKD systems. Numerical simulations show the bound of eight-dimensional QKD scheme is more robust to the intensity fluctuations but more sensitive to the afterpulse effect than the four-dimensional one.  相似文献   

5.
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD. However, the device imperfections may compromise its practical implementations. The goal of this paper is to make it robust against the state preparation flaws (SPFs) and side channels at the light source. We adopt the sending or not-sending (SNS) TF-QKD protocol to accommodate the SPFs and multiple optical modes in the emitted states. We analyze that the flaws of the phase modulation can be overcome by regarding the deviation of the phase as phase noise and eliminating it with the post-selection of phase. To overcome the side channels, we extend the generalized loss-tolerant (GLT) method to the four-intensity decoy-state SNS protocol. Remarkably, by decomposing of the two-mode single-photon states, the phase error rate can be estimated with only four parameters. The practical security of the SNS protocol with flawed and leaky source can be guaranteed. Our results might constitute a crucial step towards guaranteeing the practical implementation of the SNS protocol.  相似文献   

6.
As a variant of the twin-field quantum key distribution (TF-QKD), the sending-or-not twin-field quantum key distribution (SNS TF-QKD) is famous for its higher tolerance of misalignment error, in addition to the capacity of surpassing the rate–distance limit. Importantly, the free-space SNS TF-QKD will guarantee the security of the communications between mobile parties. In the paper, we first discuss the influence of atmospheric turbulence (AT) on the channel transmittance characterized by the probability distribution of the transmission coefficient (PDTC). Then, we present a method called prefixed-threshold real-time selection (P-RTS) to mitigate the interference of AT on the free-space SNS TF-QKD. The simulations of the free-space SNS TF-QKD with and without P-RTS are both given for comparison. The results showed that it is possible to share the secure key by using the free-space SNS TF-QKD. Simultaneously, the P-RTS method can make the free-space SNS TF-QKD achieve better and more stable performance at a short distance.  相似文献   

7.
In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.  相似文献   

8.
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound. One variation called phase-matching QKD (PM-QKD) protocol employs discrete phase randomization and the phase post-compensation technique to improve the key rate quadratically. However, the discrete phase randomization opens a loophole to threaten the actual security. In this paper, we first introduce the unambiguous state discrimination (USD) measurement and the photon-number-splitting (PNS) attack against PM-QKD with imperfect phase randomization. Then, we prove the rigorous security of decoy state PM-QKD with discrete phase randomization. Simulation results show that, considering the intrinsic bit error rate and sifting factor, there is an optimal discrete phase randomization value to guarantee security and performance. Furthermore, as the number of discrete phase randomization increases, the key rate of adopting vacuum and one decoy state approaches infinite decoy states, the key rate between discrete phase randomization and continuous phase randomization is almost the same.  相似文献   

9.
龙全 《光学学报》1998,18(7):56-861
讨论了一个双模环型激光增益噪声模型,其中考虑了完全饱和效应且乘法噪声由增益系数涨落引起。在共振及两模具有相同泵参数时,获得了光强联合定态分布的精确解析表达式。通过与现有的双模激光摸型(其中乘法噪声由损失系数涨落引起)的比较,发现乘法噪声系数的非线性效应减弱了乘法噪声给激光光强统计性质带来的反常特性,并且这种减弱随着乘法噪声增强或损失系数减小而愈加明显。  相似文献   

10.

The interferometer-based, time-frequency encoding quantum key distribution (TF-QKD) scheme is a promising way to loosen up the restrict resolution requirement for the temporal measurement in TF-QKD protocol. However, the utilization of delay interferometers in the existing schemes causes lower efficiency of the frequency measurement, so it would decrease the secure key generation rate and the error tolerance. In order to improve this imperfection, we propose two kinds of schemes, one is the pre-balance TF scheme (PB-TF), in which Alice actively adjusts the probability distributions of sending photons encoded in two bases. The other one is the non-delay interferometer based TF scheme (NDI-TF), in this scheme the signals are converted from serial to parallel before entering the interferometers which eliminates the extra loss of the frequency measurement with delay interferometers. We theoretically verify the performance improvement of both schemes and discuss their advantages under the practical application scenario. The simulation results show that both of the schemes can improve the secure key generation rate and the error tolerance, but the NDI-TF scheme has higher secure key generation rate especially in the high-dimensional encoding QKD systems. As for the low-dimensional system, the PB-TF scheme is preferred since its performance is comparable to the NDI-TF scheme but with low cost and easy to implement.

  相似文献   

11.
Sintayehu Tesfa 《中国物理 B》2012,21(1):14204-014204
A steady state analysis of the nonclassical features and statistical properties of the cavity radiation of a two-photon coherent beat laser is presented. Results show that the degree of two-mode squeezing, detectable entanglement and intensity of the cavity radiation can increase with the deviation of the phase fluctuations of the laser employed in preparing the atoms, but decrease with the increasing rate at which the induced coherence superposition decays. Although it is found that varying the phase fluctuations and dephasing can lead to modification in the quantum features and statistical properties of the radiation, it does not alter the similarity in the nature of the degree of entanglement detectable by the criteria following from Duan-Giedke-Cirac-Zoller and logarithmic negativity in a perceivable manner. Since the intensity and quantum features can be readily enhanced, this system is expected to be a viable source of a strong robust entangled (squeezed) light under various conditions. Moreover, comparison of the mean number of photon pairs with intensity difference shows that the chance of inciting a two-photon process can be enhanced by changing the rate of dephasing and phase fluctuations.  相似文献   

12.
We investigate the fluctuations around the average density profile in the weakly asymmetric exclusion process with open boundaries in the steady state. We show that these fluctuations are given, in the macroscopic limit, by a centered Gaussian field and we compute explicitly its covariance function. We use two approaches. The first method is dynamical and based on fluctuations around the hydrodynamic limit. We prove that the density fluctuations evolve macroscopically according to an autonomous stochastic equation, and we search for the stationary distribution of this evolution. The second approach, which is based on a representation of the steady state as a sum over paths, allows one to write the density fluctuations in the steady state as a sum over two independent processes, one of which is the derivative of a Brownian motion, the other one being related to a random path in a potential.  相似文献   

13.
14.
In this paper, we investigate the transport of an inertial Brownian motor moving in an asymmetric periodic potential, where it is driven by a time periodic and a constant biasing driving force, and potential fluctuations generated by a Gaussian white noise. It is found that some anomalous transports (ATs) appear in the presence of the potential fluctuations. For smaller potential fluctuations, we detect that the phenomenons of absolute negative mobility (ANM) near zero bias, and negative nonlinear mobility (NNM) at larger bias away from equilibrium, which means that the inertial Brownian motor moves opposite to the bias force in the two parameter regimes. However for larger potential fluctuations, the phenomenons of both the ANM and NNM vanish. Furthermore, the asymmetry of the potential can also cause the ATs (i.e., both ANM and NNM) to disappear.  相似文献   

15.
刘康  李剑  朱建荣  张春梅  王琴 《中国物理 B》2017,26(12):120302-120302
Reference-frame-independent quantum key distribution(RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performance of decoystate RFI QKD with both source errors and statistical fluctuations is still missing until now. In this paper, we investigate the performance of decoy-state RFI QKD in practical scenarios with two kinds of light sources, the heralded single photon source(HSPS) and the weak coherent source(WCS), and also give clear comparison results of decoy-state RFI QKD with WCS and HSPS. Simulation results show that the secret key rates of decoy-state RFI QKD with WCS are higher than those with HSPS in short distance range, but the secret key rates of RFI QKD with HSPS outperform those with WCS in long distance range.  相似文献   

16.
By incorporating market impact and asymmetric sensitivity into the evolutionary minority game, we study the coevolutionary dynamics of stock prices and investment strategies in financial markets. Both the stock price movement and the investors’ global behavior are found to be closely related to the phase region they fall into. Within the region where the market impact is small, investors’ asymmetric response to gains and losses leads to the occurrence of herd behavior, when all the investors are prone to behave similarly in an extreme way and large price fluctuations occur. A linear relation between the standard deviation of stock price changes and the mean value of strategies is found. With full market impact, the investors tend to self-segregate into opposing groups and the introduction of asymmetric sensitivity leads to the disappearance of dominant strategies. Compared with the situations in the stock market with little market impact, the stock price fluctuations are suppressed and an efficient market occurs. Theoretical analyses indicate that the mechanism of phase transition from clustering to self-segregation in the present model is similar to that in the majority–minority game and the occurrence and disappearance of efficient markets are related to the competition between the trend-following and the trend-aversion forces. The clustering of the strategies in the present model results from the majority-wins effect and the wealth-driven mechanism makes the market become predictable.  相似文献   

17.
A detailed discussion of self-similarities in fragment-size distributions and fluctuations is presented using an exactly solvable model of fragmentation (the “chain model”). The effects of particle-number conservation and quantum symmetry can rigorously be considered in systems ranging from microscopic to macroscopic. Due to the analyticity of the model the various scalings can be studied free of any statistical noise. Using a tuning parameter we can generate self-similar distributions with realistic power-laws and/or fluctuations which show intermittency. Finite-size effects neither destroy nor cause intermittency. The relation of self-similarity in both the averages and the fluctuations can be studied analytically. It is found that they are unlinked - there are cases where the size-distribution is a power-law with realistic exponents τ between ?2 and ?3 but no intermittency. Two cases will even be shown which have indistinguishable fragment distributions but very different factorial moments. We also discuss the interpretation of both the size and slope of the factorial moments in terms of multiplicity and bin mixing. We show that while either is sufficient to produce large moments, one must have bin mixing to produce large slopes. The two types of mixing are necessarily linked in constrained systems such as described by our model.  相似文献   

18.
平衡体系热力学推导涨落的前提是涨落必须很小,如果得到一个发散的结果说明这一涨落是不可靠的.对一些体系温度涨落的热力学结果,在温度趋于绝对零度时是发散的,这时必须用统计物理来处理.对这些体系进行统计物理处理的结果表明,涨落在温度趋于绝对零度时是趋于零的. 关键词: 热力学与统计物理 涨落  相似文献   

19.
Nonlinear systems with correlated stochastic parameters are approximated by simpler systems. This method is an extension of an earlier version of statistical replacement and statistical linearization. The extended method is applicable to systems with correlated fluctuations. We show how this general method reduces to the earlier methods in special cases.  相似文献   

20.
用蒙特–卡洛模拟研究了多重数分布(多重数在事件空间中的起伏)对高能碰撞中erraticity行为的影响,并和NA27实验数据的结果进行了比较.证明了erraticity现象对多重数起伏不敏感.对于低的平均多重数,即使各个事件之间的多重数起伏不定,这一现象仍然主要由统计涨落决定.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号