首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
We propose a scheme to remove the demand of transmitting a high-brightness local oscillator (LO) in continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, which we call as the self-referenced (SR) CV-MDI QKD. We show that our scheme is immune to the side-channel attacks, such as the calibration attacks, the wavelength attacks and the LO fluctuation attacks, which are all exploiting the security loopholes introduced by transmitting the LO. Besides, the proposed scheme waives the necessity of complex multiplexer and demultiplexer, which can greatly simplify the QKD processes and improve the transmission efficiency. The numerical simulations under collective attacks show that all the improvements brought about by our scheme are only at the expense of slight transmission distance shortening. This scheme shows an available method to mend the security loopholes incurred by transmitting LO in CV-MDI QKD.  相似文献   

2.
沈咏  邹宏新 《物理学报》2010,59(3):1473-1480
对一种结合离散调制和反向协调,适用于长距离传输的连续变量量子密钥分发四态协议的安全性进行了严格证明.这种协议中Alice发送的态与高斯调制协议中的有一定差异,这种差异可以等价成信道衰减和额外噪声.另外,由于Alice不可能做到精确调制,这会导致其发送的相干态中含有噪声.把这种调制引起的噪声看作光源的噪声,并推导出了在光源噪声不能被窃听者所利用的条件下的安全码率的下界.为了避免实验上快速、随机的控制本地振荡光的相位,还将无开关协议和四态协议相结合,分析了其安全性.  相似文献   

3.
相比于离散变量量子密钥分发,连续变量量子密钥分发虽然具备更高的安全码率等优势,但是在安全传输距离上却略有不足.尽管量子催化的运用对高斯调制连续变量量子密钥分发协议的性能,尤其在安全传输距离方面有着显著的提升,然而能否用来改善离散调制协议的性能却仍然未知.鉴于上述分析,本文提出了一种基于量子催化的离散调制协议的方案,试图在安全密钥率、安全传输距离和最大可容忍过噪声方面进一步提升协议性能.研究结果表明,在相同参数下,当优化量子催化引入的透射率T,相比于原始四态调制协议,所提方案能够有效地提升量子密钥分发的性能.特别是,对于可容忍过噪声为0.002,量子催化可将安全通信距离突破300 km,密钥率为10^-8bits/pulse,而过大的可容忍噪声会抑制量子催化对协议性能的改善效果.此外,为了彰显量子催化的优势,本文给出了点对点量子通信的最终极限Pirandola-Laurenza-Ottaviani-Banchi边界,仿真结果表明,虽然原始方案与所提方案都未能突破这种边界,但是相比于前者,后者能够在远距离通信上逼近于这种边界,这为实现全球量子安全通信的最终目标提供理论依据.  相似文献   

4.
Plug-and-play dual-phase-modulated continuous-variable quantum key distribution (CVQKD) protocol can effectively solve the security loopholes associated with transmitting local oscillator (LO). However, this protocol has larger excess noise compared with one-way Gaussian-modulated coherent-states scheme, which limits the maximal transmission distance to a certain degree. In this paper, we show a reliable solution for this problem by employing non-Gaussian operation, especially, photon subtraction operation, which provides a way to improve the performance of plug-and-play dual-phase-modulated CVQKD protocol. The photon subtraction operation shows experimental feasibility in the plug-andplay configuration since it can be implemented under current technology. Security results indicate that the photon subtraction operation can evidently enhance the maximal transmission distance of the plug-and-play dual-phase-modulated CVQKD protocol, which effectively makes up the drawback of the original one. Furthermore, we achieve the tighter bound of the transmission distance by considering the finite-size effect, which is more practical compared with that achieved in the asymptotic limit.  相似文献   

5.
何广强  曾贵华 《中国物理》2006,15(6):1284-1289
This paper proposes a deterministic quantum key distribution scheme based on Gaussian-modulated continuous variable EPR correlations. This scheme can implement fast and efficient key distribution. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier. For general beam splitter eavesdropping strategy, the secret information rate $\Delta I=I(\alpha,\beta)-I(\alpha,\epsilon)$ is calculated in view of Shannon information theory. Finally the security analysis is presented.  相似文献   

6.
In a fiber-based continuous-variable quantum key distribution (CVQKD) system, to perform the channel estimation, the channel transmittance is usually assumed to be a constant. Subsequently, when the channel parameters are intentionally manipulated, the employed parameter estimation method will lead to deviations of channel parameters and ultimately impacting the evaluation of the secret key rate. In this paper, we propose a denial-of-service attack strategy based on Eve's manipulation of the channel parameters. In particular, we analyze in detail the impact of this attack when the channel transmittance is attacked and obeys two-point distribution and uniform distribution. The result shows that in both cases, Eve's slight manipulation on the quantum channel will lead to large underestimation of the secure transmission distance by using the previous parameter estimation, which will lead to intentional terminations of the communication. To prevent this attack, a simple data post-selection should be added before parameter estimation.  相似文献   

7.
Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum key distribution protocol was proposed based on the qubits.Later on,it was found that quantum continuous variables can also be exploited for this target.The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse.In this article,we review the current status of the continuous variable quantum key distribution research,including its basic principle,experimental implementations,security and future directions;the experimental progress in this field made by our group is also presented.  相似文献   

8.
We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel. Different from optical fibers, the underwater channel has more severe optical attenuation because of optical absorption and scattering, which reduces the maximum communication distance. To enhance the performance of the protocol, the photon subtraction operation is implemented at the modulator side. We carry out a performance simulation in two different kinds of seawater channel, and the result shows that the scheme with photon subtraction has a longer secure communication distance under certain conditions.  相似文献   

9.
钟海  叶炜  吴晓东  郭迎 《物理学报》2021,(2):298-305
量子密钥分发融合经典通信方案将连续变量量子密钥分发和经典通信合并到了一起,为将来在现有的光网络上同时进行密钥分发和经典通信提供了一个有效的方法.然而,在量子信号上叠加一个经典信号将会给连续变量量子密钥分发系统引入过噪声从而大大降低系统的性能.本文提出基于光前置放大器的量子密钥分发融合经典通信方案,即在接收端插入光前置放...  相似文献   

10.
卢钊  史建红  李风光 《中国物理 B》2017,26(4):40304-040304
Information reconciliation is a significant step for a continuous-variable quantum key distribution(CV-QKD) system.We propose a reconciliation method that allows two authorized parties to extract a consistent and secure binary key in a CV-QKD protocol,which is based on Gaussian-modulated coherent states and homodyne detection.This method named spherical reconciliation is based on spherical quantization and non-binary low-density parity-check(LDPC) codes.With the suitable signal-to-noise ratio(SNR) and code rate of non-binary LDPC codes,spherical reconciliation algorithm has a high efficiency and can extend the transmission distance of CV-QKD.  相似文献   

11.
Lingzhi Kong 《中国物理 B》2022,31(9):90304-090304
We propose a new scheme to enhance the performance of the Gussian-modulated coherent-state continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) system via quantum scissors (QS) operation at Bob's side. As an non-deterministic amplifying setup, we firstly introduce the QS-enhanced CV-MDI-QKD protocol and then investigate the success probability of the QS operation in accordance with the equivalent one-way scheme. Afterwards, we investigate the effect of the QS operation on the proposed scheme and analyze the performance of the QS-enhanced CV-MDI-QKD system under the extreme asymmetric circumstance. Simulation results show that the QS operation can indeed improve the performance of the CV-MDI-QKD system considerably. QS-enhanced CV-MDI-QKD protocol outperforms the original CV-MDI-QKD protocol in both the maximum transmission distance and the secret key rate. Moreover, the better the performance of QS operation, the more significant the improvement of performance of the system.  相似文献   

12.
The state preparation operation of continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol may become imperfect in practical applications. We address the security of the CV-MDI-QKD protocol based on imperfect preparation of the coherent state under realistic conditions of lossy and noisy quantum channel. Specifically, we assume that the imperfection of Alice's and Bob's practical state preparations equal to the amplification of ideal modulators and lasers at both Alice's and Bob's sides by untrusted third-parties Fred and Gray employing phase-insensitive amplifiers (PIAs), respectively. The equivalent excess noise introduced by the imperfect state preparation is comprehensively and quantitatively calculated by adopting the gains of PIAs. Security analysis shows that CV-MDI-QKD is quite sensitive to the imperfection of practical state preparation, which inevitably deteriorates the performance and security of CV-MDI-QKD system. Moreover, a lower bound of the secret key rate is derived under arbitrary collective attacks, and the upper threshold of this imperfection tolerated by the system is obtained in the form of the specific gains of PIAs. In addition, the methods presented will improve and perfect the practical security of CV-MDI-QKD protocol.  相似文献   

13.
Lingzhi Kong 《中国物理 B》2022,31(7):70303-070303
When developing a practical continuous-variable quantum key distribution (CVQKD), the detector is necessary at the receiver's side. We investigate the practical security of the CVQKD system with an unbalanced heterodyne detector. The results show that unbalanced heterodyne detector introduces extra excess noise into the system and decreases the lower bound of the secret key rate without awareness of the legitimate communicators, which leaves loopholes for Eve to attack the system. In addition, we find that the secret key rate decreases more severely with the increase in the degree of imbalance and the excess noise induced by the imbalance is proportional to the intensity of the local oscillator (LO) under the same degree of imbalance. Finally, a countermeasure is proposed to resist these kinds of effects.  相似文献   

14.
连续变量量子密码术   总被引:3,自引:0,他引:3  
文章综述了连续变量量子密码术的基本原理,突出了其在光源制备、光子探测以及量子密钥生成的码率等办面相对于单光子量子密码术的优越性,给出了连续变量量子密码术的安全性以及对线路噪声的具体要求,提出了连续变量量子密码术目前所面临的主要困难和今后的发展前景。  相似文献   

15.
陈进建  韩正甫  赵义博  桂有珍  郭光灿 《物理》2006,35(09):785-790
文章综述了连续变量量子密码术的基本原理,突出了其在光源制备、光子探测以及量子密钥生成的码率等方面相对于单光子量子密码术的优越性,给出了连续变量量子密码术的安全性以及对线路噪声的具体要求,提出了连续变量量子密码术目前所面临的主要困难和今后的发展前景.  相似文献   

16.
《Physics letters. A》2020,384(2):126061
In this paper, we proposed an unidimensional continuous-variable quantum key distribution (CV-QKD) protocol with discrete modulation, which waives the necessity in one of the quadrature modulations and further simplified the implementation of the CV-QKD protocol. On the basis of the Heisenberg uncertainty relation, we analyze the boundary between the unphysical and physical region. Besides, we utilize a novel proof approach to achieve a lower bound valid of transmission distance. This scheme shows an available method to further simplified the implementation of the QKD.  相似文献   

17.
一种网络多用户量子认证和密钥分配理论方案   总被引:4,自引:0,他引:4       下载免费PDF全文
杨宇光  温巧燕  朱甫臣 《物理学报》2005,54(9):3995-3999
提出了一种网络多用户量子认证和密钥分配理论方案.类似于现代密码学中的网络认证体系结构提出了一种基于网络中用户与所属的可信服务器之间共享Einstein-Podolsky-Rosen(EPR)纠缠对进行身份认证和密钥分配的分布式客户机/服务器体系结构.基于该体系结构实现网络中任意用户之间的身份认证和密钥分配.可信服务器只提供用户的身份认证以及 交换粒子之间的纠缠使得两个想要秘密通信的用户的粒子纠缠起来.密钥的生成由发起请求 的用户自己完成.网络中的用户只需和所属的可信服务器共享EPR纠缠对通过经典信道和量子 信道与服务器通信.用户不需要互相共享EPR纠缠对,这使得网络中的EPR对的数量由O(n2)减小到O(n). 关键词: 量子认证 量子密钥分配 客户机/服务器 纠缠交换  相似文献   

18.
Qingquan Peng 《中国物理 B》2022,31(6):60306-060306
The trans-media transmission of quantum pulse is one of means of free-space transmission which can be applied in continuous-variable quantum key distribution (CVQKD) system. In traditional implementations for atmospheric channels, the 1500-to-1600-nm pulse is regarded as an ideal quantum pulse carrier. However, the underwater transmission of this pulses tends to suffer from severe attenuation, which inevitably deteriorates the security of the whole CVQKD system. In this paper, we propose an alternative scheme for implementations of CVQKD over satellite-to-submarine channels. We estimate the parameters of the trans-media channels, involving atmosphere, sea surface and seawater and find that the short-wave infrared performs well in the above channels. The 450-nm pulse is used for generations of quantum signal carriers to accomplish quantum communications through atmosphere, sea surface and seawater channels. Numerical simulations show that the proposed scheme can achieve the transmission distance of 600 km. In addition, we demonstrate that non-Gaussian operations can further lengthen its maximal transmission distance, which contributes to the establishment of practical global quantum networks.  相似文献   

19.
马鸿鑫  鲍皖苏  李宏伟  周淳 《中国物理 B》2016,25(8):80309-080309
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.  相似文献   

20.
杨芳丽  郭迎  石金晶  王焕礼  潘矜矜 《中国物理 B》2017,26(10):100303-100303
A modified continuous-variable quantum key distribution(CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator(LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号