共查询到20条相似文献,搜索用时 0 毫秒
1.
A new mediated semi‐quantum key distribution (SQKD) protocol is proposed, allowing two classical participants to share a secret key with the help of an untrusted third party, who only needs to generate single photons and perform Bell measurements. This is the first work attempting to reduce the quantum overhead of the untrusted third party, which makes the mediated SQKD even more practical. The proposed protocol is shown to be free from several well‐known attacks. 相似文献
2.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed. 相似文献
3.
4.
5.
In quantum key distribution(QKD),the passive decoy-state method can simplify the intensity modulation and reduce some of side-channel information leakage and modulation errors.It is usually implemented with a heralded single-photon source.In Wang et al 2016(Phys.Rev.A 96032312),a novel passive decoy-state method is proposed by Wang et al,which uses two local detectors to generate more detection events for tightly estimating channel parameters.However,in the original scheme,the two local detectors are assumed to be identical,including the same detection efficiency and dark count rate,which is often not satisfied in the realistic experiment.In this paper,we construct a model for this passive decoy-state QKD scheme with two mismatched detectors and explore the effect on QKD performance with certain parameters.We also take the finite-size effect into consideration,showing the performance with statistical fluctuations.The results show that the efficiencies of local detectors affect the key rate more obviously than dark count rates. 相似文献
6.
7.
8.
We demonstrate quantum key distribution based on Bennett’s two-coherent-state protocol [Phys. Rev. Lett. 68 (1992) 3121]. The wavelength is set at 1550 nm for low-loss fiber transmission. A large reference pulse is used in order to enhance security of the protocol. The measured quantum bit-error rate is 2% for a fiber length of 10.5 km. 相似文献
9.
Passive decoy state SARG04 quantum-key-distribution with practical photon-number resolving detectors 下载免费PDF全文
SARG04 protocol has its advantages in defending photon number splitting attack, benefited from two-photon pulses part. In this paper, we present a passive decoy state SARG04 scheme combining with practical photon number resolving (PNR) detectors. Two kinds of practical detectors, transition-edge sensor and time-multiplexing detector, are taken into consideration. Theoretical analysis shows that both of them are compatible with the passive decoy state SARG04. Compared with the original SARG04, two detectors can boost the key generation rate and maximal secure distance obviously. Meanwhile, the result shows that quantum efficiency and dark count of the detector influence the maximal distance slightly, which indicates the prospect of implementation in real quantum key distribution system with imperfect practical PNS detectors. 相似文献
10.
11.
Several implementations of quantum computation making effective use of the quantum behavior of single-photons have been explored. These implementing methods were found unsuitble for large-scale computation, because they require 2N-1 optical paths to represent N qubits. In this paper, a new computing scheme is described which utilizes spatial distribution of photons. The occupation of several optical paths by single-photons is adopted as qubits. This adoption gives several extension of processing capacity and computational functionality with a simple setup. An optical implementation of a solution algorithm on four-bit Deutsch-Jozsa problem is demonstrated with utilization of the spatial distribution of photons. 相似文献
12.
基于泊松分布单光子源的量子误码率的分析 总被引:1,自引:0,他引:1
在自由空间量子密钥分配中,单光子源采用具有泊松分布的高度衰减激光脉冲,量子密码术协议采用BB84和B92协议。通过引入量子信道传输率、单光子捕获概率、测量因子和数据筛选因子,建立了量子误码率理论模型,给出了量子误码率的表达式。对于自由空间量子信道,引起量子误码率的主要因素是光学元件、探测器暗噪声和空间光学环境,并对这些因素进行了分析。针对低轨卫星_地面站间链路,进行了量子误码率的数值仿真研究。结果表明,在低轨卫星_地面站间进行量子密钥分配是可行的,限制自由空间量子密钥分配链路距离的主要因素是探测器暗噪声和空间光学环境。 相似文献
13.
14.
单光子量子路由对于在芯片中实现量子信息交换具有重大意义。研究单光子量子路由中的耗散影响能够更加真实的模拟实际实验的结果。研究发现耗散能级的存在使得同等条件下的量子路由概率减小,并且需要相对较强的耦合才能取得最大量子路由概率。同时,也建立了共振条件下量子路由概率同耦合强度以及耗散强度间的关系。 相似文献
15.
We present two schemes to generate frequency-multiplexed entangled (FME) single photons by coherently mapping photonic entanglement into and out of a quantum memory based on Raman interactions. By splitting a single photon and performing subsequent state transfer, we separate the generation of entanglement and its frequency conversion, and find that the both progresses have the characteristic of inherent determinacy. Our theory can reproduce the prominent features of observed results including pulse shapes and the condition for deterministically generating the FME single photons. The schemes are suitable for the entangled photon pairs with a wider frequency range, and could be immune to the photon loss originating from cavity-mode damping, spontaneous emission, and the dephasing due to atomic thermal motion. The sources might have significant applications in wavelength-division-multiplexing quantum key distribution. 相似文献
16.
提出一种新的预报单光子源诱骗态量子密钥分发方案.在发端采用参量下变换产生纠缠光子对,其中之一用来进行预报探测,根据探测结果将另一路光脉冲分成两个集合,其中预报探测有响应的脉冲集合用作信号态,无响应的脉冲集合作为诱骗态.由于探测效率的问题,这两个集合都是有光子的,通过这两个集合的通过率和错误率估计出单光子的通过率和错误率.此方法不需要改变光强,简单可行.仿真结果表明:该方法可以达到完美单光子源的安全通信距离;与预报单光子源的量子密钥分发相比,密钥产生率有了很大的提高;和三强度预报单光子源诱骗态量子密钥分发的
关键词:
量子保密通信
量子密钥分发
诱骗态
预报单光子源 相似文献
17.
18.
Practical security analysis of continuous-variable quantum key distribution with an unbalanced heterodyne detector 下载免费PDF全文
Lingzhi Kong 《中国物理 B》2022,31(7):70303-070303
When developing a practical continuous-variable quantum key distribution (CVQKD), the detector is necessary at the receiver's side. We investigate the practical security of the CVQKD system with an unbalanced heterodyne detector. The results show that unbalanced heterodyne detector introduces extra excess noise into the system and decreases the lower bound of the secret key rate without awareness of the legitimate communicators, which leaves loopholes for Eve to attack the system. In addition, we find that the secret key rate decreases more severely with the increase in the degree of imbalance and the excess noise induced by the imbalance is proportional to the intensity of the local oscillator (LO) under the same degree of imbalance. Finally, a countermeasure is proposed to resist these kinds of effects. 相似文献
19.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks toauthenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed. 相似文献
20.
In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information deterministicaJly in two rounds. The devices and efficiency of the protocol are discussed respectively. We also show the security of the protocol against intercept-resend and Trojan-Horse eavesdropping attacks. 相似文献