共查询到20条相似文献,搜索用时 265 毫秒
1.
提出一种自动补偿高效实用的改进型差分相位编码量子密钥分发方案.在Alice端采用偏振型强度调制器对连续激光进行调制,产生任意个相干脉冲进行差分相位调制编码;在Bob端采用双FM干涉仪代替传统的M-Z干涉仪,自动补偿了环境引起的偏振抖动,提高了系统的干涉稳定度.简化了系统的结构,提高了密钥生成效率,增强了系统的安全性.在实验上实现了稳定的80km量子密钥分配,误码率<4%.
关键词:
量子保密通信
量子密钥分发
差分相位编码
偏振型强度调制器 相似文献
2.
This paper proposes a deterministic quantum key distribution scheme based
on Gaussian-modulated continuous variable EPR correlations. This
scheme can implement fast and efficient key distribution. The
security is guaranteed by continuous variable EPR entanglement correlations
produced by nondegenerate optical parametric amplifier. For
general beam splitter eavesdropping strategy, the secret
information rate $\Delta I=I(\alpha,\beta)-I(\alpha,\epsilon)$ is
calculated in view of Shannon information theory. Finally the
security analysis is presented. 相似文献
3.
相比于离散变量量子密钥分发,连续变量量子密钥分发虽然具备更高的安全码率等优势,但是在安全传输距离上却略有不足.尽管量子催化的运用对高斯调制连续变量量子密钥分发协议的性能,尤其在安全传输距离方面有着显著的提升,然而能否用来改善离散调制协议的性能却仍然未知.鉴于上述分析,本文提出了一种基于量子催化的离散调制协议的方案,试图在安全密钥率、安全传输距离和最大可容忍过噪声方面进一步提升协议性能.研究结果表明,在相同参数下,当优化量子催化引入的透射率T,相比于原始四态调制协议,所提方案能够有效地提升量子密钥分发的性能.特别是,对于可容忍过噪声为0.002,量子催化可将安全通信距离突破300 km,密钥率为10^-8bits/pulse,而过大的可容忍噪声会抑制量子催化对协议性能的改善效果.此外,为了彰显量子催化的优势,本文给出了点对点量子通信的最终极限Pirandola-Laurenza-Ottaviani-Banchi边界,仿真结果表明,虽然原始方案与所提方案都未能突破这种边界,但是相比于前者,后者能够在远距离通信上逼近于这种边界,这为实现全球量子安全通信的最终目标提供理论依据. 相似文献
4.
We propose a new system of a continuous variable quantum key distribution via a wavelength router in the optical networks. A large bandwidth signal is generated by a soliton pulse propagating within the micro ring resonator, which is allowed to form the continuous wavelength with large tunable channel capacity. There are two forms of localized soliton pulses proposed. Firstly, the required information is transmitted via the localized temporal soliton pulse. Secondly, the continuous variable quantum key distribution is formed by using the localized spatial soliton pulse via a quantum router and networks, which is formed by using and optical add/drop multiplexer incorporating in the network. The localized soliton pulses are available for add/drop signals to/from the optical network, where the high security and capacity information can be performed. 相似文献
5.
6.
时域脉冲平衡零拍探测器能够直接对光场量子态的正交分量进行测量, 是连续变量量子密钥分发系统的核心测量器件, 其测量精度与密钥分发系统的额外噪声及安全密钥速率密切相关. 本文理论分析了探测器双臂不平衡对测量精度的影响, 实验设计并研制了双臂可精确自动平衡的时域脉冲平衡零拍探测器. 通过高精度控制探测器一臂的光纤圆环曲率半径, 实现了光纤内部光场强度的精密衰减, 进而获得了探测器的精确自动平衡. 实验测试结果表明时域平衡零拍探测器双臂具有10-5以上的平衡精度, 能够长时间稳定运行, 有效避免了探测器的输出电压进入非线性区或饱和区. 该探测装置可应用于连续变量量子密钥分发系统, 有效降低由于量子态信号探测过程引入的额外噪声, 提高系统的长期稳定性. 相似文献
7.
8.
The difficulty of quantum key agreement is to realize its security and fairness at the same time.This paper presents a new three-party quantum key agreement protocol based on continuous variable single-mode squeezed state.The three parties participating in the agreement are peer entities,making same contributions to the final key.Any one or two participants of the agreement cannot determine the shared key separately.The security analysis shows that the proposed protocol can resist both external and internal attacks. 相似文献
9.
10.
11.
In this paper security of the quantum key distribution scheme using
correlations of continuous variable Einstein--Podolsky--Rosen (EPR)
pairs is investigated. A new approach for calculating the secret
information rate Δ I is proposed by using the Shannon
information theory. Employing an available parameter F which is
associated with the entanglement of the EPR pairs, one can detect
easily the eavesdropping. Results show that the proposed scheme is
secure against individual beam splitter attack strategy with a
proper squeeze parameter. 相似文献
12.
量子保密通信包括量子密钥分发、量子安全直接通信和量子秘密共享等主要形式.在量子密钥分发和秘密共享中,传输的是随机数而不是信息,要再经过一次经典通信才能完成信息的传输.在量子信道直接传输信息的量子通信形式是量子安全直接通信.基于量子隐形传态的量子通信(简称量子隐形传态通信)是否属于量子安全直接通信尚需解释.构造了一个量子隐形传态通信方案,给出了具体的操作步骤.与一般的量子隐形传态不同,量子隐形传态通信所传输的量子态是计算基矢态,大大简化了贝尔基测量和单粒子操作.分析结果表明,量子隐形传态通信等价于包含了全用型量子密钥分发和经典通信的复合过程,不是量子安全直接通信,其传输受到中间介质和距离的影响,所以不比量子密钥分发更有优势.将该方案与量子密钥分发、量子安全直接通信和经典一次性便笺密码方案进行对比,通过几个通信参数的比较给出各个方案的特点,还特别讨论了各方案在空间量子通信方面的特点. 相似文献
13.
We propose a novel system of a simultaneous generation of continuous variable quantum key distribution (QKD) and quantum dense coding (QDC) via an optical memory array. The optical memory system is formed by using an array waveguide incorporating a nano-ring resonator, whereas the different spatial light modes can be generated and stored within an optical memory unit. The polarized photon is formed and stored within a storing device, i.e. a ring resonator, whereas the different time slot entangled photons can be generated, transmitted and detected by the different subscriber in the distributed networks. By using the optical memory concept, the continuous variable quantum key distribution is provided. Furthermore, the use of quantum dense coding via time division multiplexing paths, i.e. different time slot, is also plausible. The advantage of the proposed system is that the quantum key distribution can provide the network top security with high capacity and safety, which is the large demand of usage in the public networks. 相似文献
14.
In this paper, a continuous variable (CV) measurement-device-independent (MDI) quantum key distribution (QKD) protocol using Gaussian modulated coherent states is proposed. The MDI is first proposed to resist the attacks on the detection equipment by introducing an untrusted relay. However, the necessity of propagation of local oscillator between legitimate users and the relay makes the implementation of CV-MDI-QKD highly impractical. By introducing the plug-and-play (P&P) technique into CV-MDI-QKD, the problems of polarization drifts caused by environmental disturbance and the security loopholes during the local oscillator transmission are solved naturally. The proposed scheme is superior to the previous CV-MDI-QKD protocol on the aspect of implementation. The security bounds of the P&P CV-MDI-QKD under the Gaussian collective attack are analyzed. It is believed that the technique presented in this paper can be extended to quantum network. 相似文献
15.
16.
The performance of quantum key distribution such as one-way continuous variable protocols, can be increased by adding some noise on the reference side of error correction in the error-correction phase. For this reason, we here study this possibility in the case of two-way continuous variable system. Finally, the numerical results show that the using of additional noise gives two-way schemes better security performance in terms of secret key rates and resistance to channel excess noise. 相似文献
17.
具有正交振幅和正交相位分量量子关联的连续变量量子纠缠态光场是进行量子信息和量子计算研究的最基本的资源。随着量子信息和量子计算研究的深入开展,为了实现高质量的信息传递和高效率的量子计算,必须尽可能提高所利用的纠缠态光场的纠缠度。基于光学参变过程量子纠缠增强是提高连续变量纠缠态光场纠缠度的一种有效方法,详细讨论了连续变量纠缠增强与非简并光学参变放大器各实验参量的关系,讨论了这些参量对纠缠增强的影响。计算结果将为优化利用非简并光学参变放大器构建的纠缠增强系统,进一步提高量子纠缠增强效率提供参考。 相似文献
18.
19.
In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that seriously threatens the security of practical QKD systems. In this paper, we propose a new quantum hacking attack on an integrated silicon photonic continuous-variable quantum key distribution (CVQKD) system, which is known as a power analysis attack. This attack can be implemented by analyzing the power originating from the integrated electrical control circuit in state preparation with the help of machine learning, where the state preparation is assumed to be perfect in initial security proofs. Specifically, we describe a possible power model and show a complete attack based on a support vector regression (SVR) algorithm. The simulation results show that the secret key information decreases with the increase of the accuracy of the attack, especially in a situation with less excess noise. In particular, Eve does not have to intrude into the transmitter chip (Alice), and may perform a similar attack in practical chip-based discrete-variable quantum key distribution (DVQKD) systems. To resist this attack, the electrical control circuit should be improved to randomize the corresponding power. In addition, the power can be reduced by utilizing the dynamic voltage and frequency scaling (DVFS) technology. 相似文献
20.
宏观-微观纠缠最早起源于“薛定谔的猫”思想实验, 是指在宏观体系与微观体系之间建立量子纠缠. 实现宏观-微观纠缠可以利用多种物理体系来完成, 本文重点介绍了在光学体系中制备和检验宏观-微观纠缠的发展过程. 从最初的受激辐射单光子量子克隆到光学参量放大, 再到相空间的位移操作, 实验上制备宏观-微观纠缠的方法取得了长足的进步. 利用非线性光学参量放大过程制备的宏观-微观纠缠的光子数可以达到104量级, 人眼已经可以观察到, 因此使用人眼作为探测器来检验宏观-微观纠缠的实验开始出现. 但随后人们意识到, 粗精度的光子数探测器, 例如人眼, 无法严格判定宏观-微观纠缠的存在. 为了解决这个难题, 提出了一种巧妙的方法, 即在制备宏-微观纠缠后, 利用局域操作过程将宏观态再变为微观态, 通过判定微观纠缠存在的方法来判定宏微观纠缠的存在. 之后相空间的位移操作方法将宏观态的粒子数提高到108, 并且实现了纠缠的严格检验. 利用光机械实现宏观-微观纠缠的方案也被提出. 由于量子密钥分配中纠缠是必要条件, 而宏观-微观纠缠态光子数较多这一优势可能会对量子密钥分配的传输距离有所提高. 本文介绍了利用相位纠缠的相干态来进行量子秘钥分配的方案, 探讨了利用宏观-微观纠缠实现量子密钥分配的可能性. 相似文献