首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
基于泊松分布单光子源的量子误码率的分析   总被引:1,自引:0,他引:1  
马晶  张光宇  谭立英 《光学技术》2006,32(1):101-104
在自由空间量子密钥分配中,单光子源采用具有泊松分布的高度衰减激光脉冲,量子密码术协议采用BB84和B92协议。通过引入量子信道传输率、单光子捕获概率、测量因子和数据筛选因子,建立了量子误码率理论模型,给出了量子误码率的表达式。对于自由空间量子信道,引起量子误码率的主要因素是光学元件、探测器暗噪声和空间光学环境,并对这些因素进行了分析。针对低轨卫星_地面站间链路,进行了量子误码率的数值仿真研究。结果表明,在低轨卫星_地面站间进行量子密钥分配是可行的,限制自由空间量子密钥分配链路距离的主要因素是探测器暗噪声和空间光学环境。  相似文献   

2.
Whereas quantum cryptography ensures security by virtue of complete indistinguishability of nonorthogonal quantum states, attenuation in quantum communication channels and the unavailability of single-photon sources present major problems. In view of these difficulties, the security of quantum cryptography can change from unconditional to conditional. Since the restrictions imposed by nonrelativistic quantum mechanics and used to formulate key distribution protocols have been largely exhausted, new principles are required. The fundamental relativistic causality principle in quantum cryptography can be used to propose a new approach to ensuring unconditional security of quantum cryptosystems that eliminates the aforementioned difficulties. Quantum cryptosystems of this kind should obviously be called relativistic. It is shown that relativistic quantum cryptosystems remain unconditionally secure: first, attenuation in a quantum communication channel can only reduce the key generation rate, but not the security of the key; second, the source may not generate pure single-photon states, and a nonzero single-photon probability will suffice. The scheme remains secure even if the contribution of a single-photon component is arbitrarily small. This formally implies that a state may be characterized by an arbitrarily large mean photon number. The single-photon probability affects only the key generation rate, but not security.  相似文献   

3.
The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310nm up-conversion singlephoton detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett-Brassard 1984, the Bennett-Brassard -Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310 nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved.  相似文献   

4.
A new family of two-parameter quantum key distribution protocols is discussed where eavesdropping is detected by using two parameters: bit error rate Q and photon count rate q in control time slots. When a single-photon source is used and mutually orthogonal states are prepared in each basis, the protocol’s maximum tolerable error rate for secure key distribution is the highest, reaching a theoretical upper limit of 50%. When the signal states emitted by the source of attenuated laser light include multiphoton coherent states, the protocol also guarantees secure key distribution over the longest distance as compared to other quantum cryptography systems, up to the channel length for which the channel losses are sufficiently high that all five-photon pulses can be blocked by an eavesdropper.  相似文献   

5.
A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state. It can give us different lower and upper bounds of the fraction of single-photon counts and single-photon QBER, respectively, for one decoy state protocol. We have also analyzed the feasibility of performing quantum key distribution (QKD), with different exiting protocols, in earth-satellite and intersatellite links. Our simulation shows the choice of intensity of signal state and the effect of choosing the number of decoy states on key generation rate. The final key rate over transmission distance has been simulated, which shows that security proofs give a zero key generation rate at long distances (larger than 16,000 km). It has been shown that the practical QKD can be established with low earth orbit and medium earth orbit satellites.  相似文献   

6.
量子保密通信用的光精密控制强衰减技术   总被引:4,自引:4,他引:0  
光衰减技术是一种重要的光学技术,它在许多领域有重要的应用.在量子密钥分配中采用光衰减技术可获得单光子序列,这是量子保密通信的基础.用线性分束耦合器形成多个输出口,将光强的时序衰减变为光强沿输出口的空间分布,研制出了量子保密通信用的精密控制强衰减器,实现了对光子数的精密控制.  相似文献   

7.
We show that an entanglement swapping operation performed with spontaneous parametric down-conversion can be made faithful without postselection using sum-frequency generation. This invites us to revisit the sum-frequency process and from a proof-of-principle experiment, we demonstrate that it provides a realistic solution for nonlinear optics at the single-photon level. This opens the way to attractive alternatives to six-photon protocols based on linear optics used, e.g., for the heralded creation of maximally entangled pairs or for device-independent quantum key distribution.  相似文献   

8.
杨璐  马鸿洋  郑超  丁晓兰  高健存  龙桂鲁 《物理学报》2017,66(23):230303-230303
量子保密通信包括量子密钥分发、量子安全直接通信和量子秘密共享等主要形式.在量子密钥分发和秘密共享中,传输的是随机数而不是信息,要再经过一次经典通信才能完成信息的传输.在量子信道直接传输信息的量子通信形式是量子安全直接通信.基于量子隐形传态的量子通信(简称量子隐形传态通信)是否属于量子安全直接通信尚需解释.构造了一个量子隐形传态通信方案,给出了具体的操作步骤.与一般的量子隐形传态不同,量子隐形传态通信所传输的量子态是计算基矢态,大大简化了贝尔基测量和单粒子操作.分析结果表明,量子隐形传态通信等价于包含了全用型量子密钥分发和经典通信的复合过程,不是量子安全直接通信,其传输受到中间介质和距离的影响,所以不比量子密钥分发更有优势.将该方案与量子密钥分发、量子安全直接通信和经典一次性便笺密码方案进行对比,通过几个通信参数的比较给出各个方案的特点,还特别讨论了各方案在空间量子通信方面的特点.  相似文献   

9.
焦荣珍  冯晨旭  马海强 《物理学报》2008,57(3):1352-1355
分析了1.55 μm升频单光子探测量子密钥分配(QKD)系统的性能,讨论了升频单光子探测器的主要参数:量子效率和暗计数与抽运功率的关系.比较了BB84协议、BBM92协议和DPSK协议的光纤QKD系统的性能:安全通信速率与距离的关系,通过比较得出升频探测器优于传统的InGaAs/InP雪崩二极管单光子探测器,用升频探测器后的通信距离能比传统的大两倍以上,能很好改善量子通信系统的性能. 关键词: 量子效率 通信速率 暗计数  相似文献   

10.
In this paper,two fault tolerant channel-encrypting quantum dialogue(QD)protocols against collective noise are presented.One is against collective-dephasing noise,while the other is against collective-rotation noise.The decoherent-free states,each of which is composed of two physical qubits,act as traveling states combating collective noise.Einstein-Podolsky-Rosen pairs,which play the role of private quantum key,are securely shared between two participants over a collective-noise channel in advance.Through encryption and decryption with private quantum key,the initial state of each traveling two-photon logical qubit is privately shared between two participants.Due to quantum encryption sharing of the initial state of each traveling logical qubit,the issue of information leakage is overcome.The private quantum key can be repeatedly used after rotation as long as the rotation angle is properly chosen,making quantum resource economized.As a result,their information-theoretical efficiency is nearly up to 66.7%.The proposed QD protocols only need single-photon measurements rather than two-photon joint measurements for quantum measurements.Security analysis shows that an eavesdropper cannot obtain anything useful about secret messages during the dialogue process without being discovered.Furthermore,the proposed QD protocols can be implemented with current techniques in experiment.  相似文献   

11.
By utilizing Bell states and GHZ states, two quantum deterministic key distribution (QDKD) protocols are presented to hand over the previously deterministic key to the intended receiver. The proposed QDKD protocols have two-way authentications, and then the eavesdropping and impersonation can be detected easily. The deterministic key itself is not transmitted over the channel and the receiver Bob infers his key in an indirect manner with the relationship between Alice’s messages and his own measurement results, which guarantees the security of the deterministic key. Different from the quantum key distribution protocols yielding random keys, the proposed QDKD protocols can distribute the pre-deterministic keys securely, which are of great significance in the filed of key management.  相似文献   

12.
Quantum transducers can transfer quantum information between different systems. Microwave–optical photon conversion is important for future quantum networks to interconnect remote superconducting quantum computers with optical fibers. Here, a high-speed quantum transducer based on a single-photon emitter in an atomically thin membrane resonator, that can couple single microwave photons to single optical photons, is proposed. The 2D resonator is a freestanding van der Waals heterostructure (which may consist of hexagonal boron nitride, graphene, or other 2D materials) that hosts a quantum emitter. The mechanical vibration (phonon) of the 2D resonator interacts with optical photons by shifting the optical transition frequency of the single-photon emitter with strain or the Stark effect. The mechanical vibration couples to microwave photons by shifting the resonant frequency of an LC circuit that includes the membrane. Thanks to the small mass of the 2D resonator, both the single-photon optomechanical coupling strength and the electromechanical coupling strength can reach the strong coupling regime. This provides a way for high-speed quantum state transfer between a microwave photon, a phonon, and an optical photon.  相似文献   

13.
The security of keys for the basic nonrelativistic BB84 protocol has been examined for more than 15 years. A simple proof of security for the case of a single-photon source of quantum states and finite sequences has been only recently obtained using entropy uncertainty relations. However, the existing sources of states are not strictly single-photon. Since sources are not single-photon and losses in a quantum channel??open space??are not a priori known and vary, nonrelativistic quantum cryptographic systems in open space cannot guarantee the unconditional security of keys. Recently proposed relativistic quantum cryptography removes fundamental constraints associated with non-single-photon sources and losses in open space. The resistance of a fundamentally new family of protocols for relativistic quantum key distribution through open space has been analyzed for the real situation with finite lengths of transmitted sequences of quantum states. This system is stable with real sources of non-single-photon states (weakened laser radiation) and arbitrary losses in open space.  相似文献   

14.
邓富国  李熙涵  李涛 《物理学报》2018,67(13):130301-130301
量子通信以量子态为信息载体在远距离的通信各方之间传递信息,因此量子态的传输和远距离共享是量子通信的首要步骤.信道噪声不仅会影响通信效率还可能被窃听者利用从而威胁通信安全,对抗信道噪声是实现安全高效量子通信亟需解决的问题.本文介绍基于光量子态的两类对抗信道噪声的实用方法——量子态的避错传输和容错的量子通信,包括对抗噪声的基本原理和两种方法的代表性方案,并从资源消耗和可操作性的角度分析了方案的实用价值.  相似文献   

15.
在量子密钥分配中,量子比特率是一个重要的系统参数。通过引入测量因子和筛选因子,建立了基于理想单光子源和泊松分布单光子源的量子比特率理论模型,给出了量子比特率的表达式,并对两种单光子源进行了比较分析。结果表明,当平均光子数大于1时,泊松分布单光子源能被优化。在发射机脉冲重复率一定的条件下,采用泊松分布单光子源无法达到理想单光子源的量子比特率,这是为保密通信所必须付出的代价。  相似文献   

16.
An experimental setup for investigating the distribution of a quantum key over free space is described. The results from experiments to study the rate of key generation and that of the quantum bit error as a function of the quantum efficiency of single-photon detectors and the average number of photons per pulse is given.  相似文献   

17.
The quantum bit rate is an important operating parameter in free-space quantum key distribution. We introduce the measuring factor and the sifting factor, and present the expressions of the quantum bit rate based on the ideal single-photon sources and the single-photon sources with Poisson distribution. The quantum bit rate is studied in the numerical simulation for the laser links between a ground station and a satellite in a low earth orbit. The results show that it is feasible to implement quantum key distribution between a ground station and a satellite in a low earth orbit.  相似文献   

18.
宋汉冲  龚黎华  周南润 《物理学报》2012,61(15):154206-154206
基于量子远程通信的原理, 本文借助双模压缩真空态和相干态, 提出一种连续变量量子确定性密钥分配协议. 在利用零差探测法的情况下协议的传输效率达到了100%. 从信息论的角度分析了协议的安全性, 结果表明该协议可以安全传送预先确定的密钥. 在密钥管理中, 量子确定性密钥分配协议具有量子随机性密钥分配协议不可替代的重要地位和作用. 与离散变量量子确定性密钥分配协议相比, 该协议分发密钥的速率和效率更高, 又协议中用到的连续变量量子态易于产生和操控、适于远距离传输, 因此该协议更具有实际意义.  相似文献   

19.
Xiao-Ming Chen 《中国物理 B》2022,31(12):120304-120304
The existing decoy-state quantum key distribution (QKD) beating photon-number-splitting (PNS) attack provides a more accurate method to estimate the secure key rate, while it still considers that only single-photon pulses can generate secure keys in any case. However, multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel. The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks. In particular, the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users. In this paper, under the null hypothesis of no weaker version of PNS attack, we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols, extract a Cauchy distribution statistic, and further provide a detection method and the type I error probability. If the result is judged to be an attack, we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate. Otherwise, the pulses with the same basis received including both single-photon pulses and multiphoton pulses, can be used to generate the keys and we give the secure key rate in this case. Finally, the associated experiments we performed (i.e., the significance level is 5%) show the correctness of our method.  相似文献   

20.
We propose protocols for the entanglement swapping of distant atomic Bose-Einstein condensates using the photon entanglement states as the quantum channel. Two protocols are introduced: one is a single-photon scheme in which an entangled single-photon state serves as the quantum channel, and the other is a multi-photon scheme where an entangled coherent state of the probe lasers is used as the quantum channel.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号