共查询到19条相似文献,搜索用时 78 毫秒
1.
2.
设计了一套可以用来测量弱脉冲光时域噪声信息的平衡零拍探测系统,通过对本底光散粒噪声基准的测量分析了该系统的各项性能指标,并且对弱相干光脉冲进行了正交位相振幅分量的噪声测量。 相似文献
3.
平衡零拍探测器的改进 总被引:1,自引:0,他引:1
平衡零拍探测技术是连续变量量子信息科学研究中测量量子态量子噪声的最佳方法之一。在平衡零拍探测系统中,需要一对性能和结构尽量相同的光电探测器,以便很好地减去经典噪声,有效探测散粒噪声基准及光场噪声。根据基尔霍夫电流定律及光电二极管串联的办法,设计并制作出一种性能优良的低噪声平衡零拍探测器。该探测器从光电二极管串联节点处取出光电流相减信号,然后对信号进行放大,在对两探测器全同性要求降低的同时提高了平衡零拍探测的性能。实验结果表明,该探测器在2MHz处共模抑制比达39dB,能很好地满足量子信息对低噪声、线性增益及高共模抑制比的要求。 相似文献
4.
5.
平衡零拍探测是测量量子光场的重要方法之一. 通过对相位灵敏光学参量放大器注入的信号进行位相调制, 然后利用平衡零拍探测系统测量光学参量放大器输出的压缩光. 将相位灵敏光学参量分别运转在参量放大和参量缩小, 通过观察噪声谱中的调制信号就可确定测量的量子光场是正交振幅或位相分量. 通过解调位相调制信号可获得误差信号, 实现锁定平衡零拍探测系统本底光与待测光场相对位相为零(对应于待测光场振幅噪声分量).
关键词:
平衡零拍探测
位相锁定 相似文献
6.
7.
在连续变量量子密钥分发系统中,同步技术是确保通信双方时钟和数据一致的关键技术.本文通过巧妙设计发送端和接收端仪器的硬件时序,采用时域差拍探测方式和峰值采集技术,实验实现了可硬件同步的四态离散调制连续变量量子密钥分发.通信双方在设计好的硬件同步时序下可实现时钟的恢复和数据的自动对齐,无需借助软件算法实现数据的对齐.本文采用了加拿大滑铁卢大学Norbert Lütkenhaus研究组提出的针对连续变量离散调制协议的安全密钥速率计算方法.该方法需计算出接收端所测各种平移热态的一阶矩和二阶(非中心)矩,以此为约束条件结合凸优化算法可计算出安全密钥速率.计算过程中无需假设信道为线性信道,无需额外噪声的估算.密钥分发系统重复频率为10 MHz,传输距离为25 km,平均安全密钥比特率为24 kbit/s.本文提出的硬件同步方法无需过采样和软件帧同步,减小了系统的复杂度和计算量,在一定程度上降低了系统所需的成本、功耗和体积,有效地增强了连续变量量子密钥分发的实用性. 相似文献
8.
基于飞秒脉冲的同步泵浦参量过程产生的多模时域飞秒压缩光场,由于其独特的优势,特别是可以享有单模光纤网络兼容,是实现可扩展量子计算及大容量量子通讯的良好光源。由于无法实现多模时域飞秒压缩光场的空间分离,目前对于多模时域飞秒压缩光场的测量,采用最为有效的平衡零拍探测。因此如何构造与时域飞秒压缩光场时域函数分布相同的本地光,是其中的关键内容,并直接影响测量效果。本文主要理论研究了本地脉冲光的时域整形方案,分析了系统参数对整形后的多模本地光的保真度以及系统调制效率的影响,并结合实验参数提出可能的解决办法。 相似文献
11.
R. Kumar E. BarriosA. MacRae E. CairnsE.H. Huntington A.I. Lvovsky 《Optics Communications》2012,285(24):5259-5267
We present a comprehensive theory and an easy to follow method for the design and construction of a wideband homodyne detector for time-domain quantum measurements. We show how one can evaluate the performance of a detector in a specific time-domain experiment based on the electronic spectral characteristic of that detector. We then present and characterize a high-performance detector constructed using inexpensive, commercially available components such as low-noise high-speed operational amplifiers and high-bandwidth photodiodes. Our detector shows linear behavior up to a level of over 13 dB clearance between shot noise and electronic noise, in the range from DC to 100 MHz. The detector can be used for measuring quantum optical field quadratures both in the continuous-wave and pulsed regimes with standard commercial mode-locked lasers. 相似文献
12.
Practical security analysis of continuous-variable quantum key distribution with an unbalanced heterodyne detector 下载免费PDF全文
Lingzhi Kong 《中国物理 B》2022,31(7):70303-070303
When developing a practical continuous-variable quantum key distribution (CVQKD), the detector is necessary at the receiver's side. We investigate the practical security of the CVQKD system with an unbalanced heterodyne detector. The results show that unbalanced heterodyne detector introduces extra excess noise into the system and decreases the lower bound of the secret key rate without awareness of the legitimate communicators, which leaves loopholes for Eve to attack the system. In addition, we find that the secret key rate decreases more severely with the increase in the degree of imbalance and the excess noise induced by the imbalance is proportional to the intensity of the local oscillator (LO) under the same degree of imbalance. Finally, a countermeasure is proposed to resist these kinds of effects. 相似文献
13.
Effect of excess noise on continuous variable entanglement sudden death and Gaussian quantum discord 下载免费PDF全文
A symmetric two-mode Gaussian entangled state is used to investigate the effect of excess noise on entanglement sudden death and Gaussian quantum discord with continuous variables. The results show that the excess noise in the channel can lead to entanglement sudden death of a symmetric two-mode Gaussian entangled state, while Gaussian quantum discord never vanishes. As a practical application, the security of a quantum key distribution (QKD) scheme based on a symmetric two-mode Gaussian entangled state against collective Gaussian attacks is analyzed. The calculation results show that the secret key cannot be distilled when entanglement vanishes and only quantum discord exists in such a QKD scheme. 相似文献
14.
In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information deterministicaJly in two rounds. The devices and efficiency of the protocol are discussed respectively. We also show the security of the protocol against intercept-resend and Trojan-Horse eavesdropping attacks. 相似文献
15.
Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum key distribution protocol was proposed based on the qubits.Later on,it was found that quantum continuous variables can also be exploited for this target.The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse.In this article,we review the current status of the continuous variable quantum key distribution research,including its basic principle,experimental implementations,security and future directions;the experimental progress in this field made by our group is also presented. 相似文献
16.
17.
相比于离散变量量子密钥分发,连续变量量子密钥分发虽然具备更高的安全码率等优势,但是在安全传输距离上却略有不足.尽管量子催化的运用对高斯调制连续变量量子密钥分发协议的性能,尤其在安全传输距离方面有着显著的提升,然而能否用来改善离散调制协议的性能却仍然未知.鉴于上述分析,本文提出了一种基于量子催化的离散调制协议的方案,试图在安全密钥率、安全传输距离和最大可容忍过噪声方面进一步提升协议性能.研究结果表明,在相同参数下,当优化量子催化引入的透射率T,相比于原始四态调制协议,所提方案能够有效地提升量子密钥分发的性能.特别是,对于可容忍过噪声为0.002,量子催化可将安全通信距离突破300 km,密钥率为10^-8bits/pulse,而过大的可容忍噪声会抑制量子催化对协议性能的改善效果.此外,为了彰显量子催化的优势,本文给出了点对点量子通信的最终极限Pirandola-Laurenza-Ottaviani-Banchi边界,仿真结果表明,虽然原始方案与所提方案都未能突破这种边界,但是相比于前者,后者能够在远距离通信上逼近于这种边界,这为实现全球量子安全通信的最终目标提供理论依据. 相似文献
18.
We propose a novel scheme for measurement-device-independent (MDI) continuous-variable quantum key distribution (CVQKD) by simultaneously conducting classical communication and QKD, which is called “simultaneous MDI-CVQKD” protocol. In such protocol, each sender (Alice, Bob) can superimpose random numbers for QKD on classical information by taking advantage of the same weak coherent pulse and an untrusted third party (Charlie) decodes it by using the same coherent detectors, which could be appealing in practice due to that multiple purposes can be realized by employing only single communication system. What is more, the proposed protocol is MDI, which is immune to all possible side-channel attacks on practical detectors. Security results illustrate that the simultaneous MDI-CVQKD protocol can secure against arbitrary collective attacks. In addition, we employ phasesensitive optical amplifiers to compensate the imperfection existing in practical detectors. With this technology, even common practical detectors can be used for detection through choosing a suitable optical amplifier gain. Furthermore, we also take the finite-size effect into consideration and show that the whole raw keys can be taken advantage of to generate the final secret key instead of sacrificing part of them for parameter estimation. Therefore, an enhanced performance of the simultaneous MDI-CVQKD protocol can be obtained in finite-size regime. 相似文献
19.
This paper proposes a deterministic quantum key distribution scheme based
on Gaussian-modulated continuous variable EPR correlations. This
scheme can implement fast and efficient key distribution. The
security is guaranteed by continuous variable EPR entanglement correlations
produced by nondegenerate optical parametric amplifier. For
general beam splitter eavesdropping strategy, the secret
information rate $\Delta I=I(\alpha,\beta)-I(\alpha,\epsilon)$ is
calculated in view of Shannon information theory. Finally the
security analysis is presented. 相似文献