首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
A new mediated semi‐quantum key distribution (SQKD) protocol is proposed, allowing two classical participants to share a secret key with the help of an untrusted third party, who only needs to generate single photons and perform Bell measurements. This is the first work attempting to reduce the quantum overhead of the untrusted third party, which makes the mediated SQKD even more practical. The proposed protocol is shown to be free from several well‐known attacks.  相似文献   

2.
杨静  王川  张茹 《理论物理通讯》2010,(11):829-834
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.  相似文献   

3.
独立推导预报单光子源诱骗态量子密钥分发的密钥产生率计算公式,讨论密钥产生率和发送端探测效率的关系;进行弱相干光和预报单光子源诱骗态量子密钥分发的最优强度估计和密钥产生率数值计算.结果表明,预报单光子源诱骗态量子密钥分发的密钥产生率随着发送端探测效率的增加而增加,其安全通信距离与完美单光子源的通信距离一致;诱骗态量子密钥分发可提高安全通信距离和密钥产生率;预报单光子源由于减少了暗计数的影响,进一步提高了安全通信距离.  相似文献   

4.
长距离长期稳定的量子密钥分发系统   总被引:6,自引:0,他引:6       下载免费PDF全文
介绍了最近完成的长距离长期稳定的量子密钥分发系统.该系统利用往返光路补偿光纤偏振 抖动和相位漂移的原理,采用结电容平衡魔T网络耦合的单光子探测技术,在506km单模 光纤中实现了长时间(大于12h)稳定的量子密钥分发实验.单脉冲平均光子数为007, 误码率为4%,其中单光子探测器的探测效率大于5%,单脉冲暗计数低于29×10-6. 关键词: 量子保密通信 量子密钥分发 单光子探测  相似文献   

5.
In quantum key distribution(QKD),the passive decoy-state method can simplify the intensity modulation and reduce some of side-channel information leakage and modulation errors.It is usually implemented with a heralded single-photon source.In Wang et al 2016(Phys.Rev.A 96032312),a novel passive decoy-state method is proposed by Wang et al,which uses two local detectors to generate more detection events for tightly estimating channel parameters.However,in the original scheme,the two local detectors are assumed to be identical,including the same detection efficiency and dark count rate,which is often not satisfied in the realistic experiment.In this paper,we construct a model for this passive decoy-state QKD scheme with two mismatched detectors and explore the effect on QKD performance with certain parameters.We also take the finite-size effect into consideration,showing the performance with statistical fluctuations.The results show that the efficiencies of local detectors affect the key rate more obviously than dark count rates.  相似文献   

6.
7.
设计了一种高效的部分纠缠光子对产生装置,这套装置中使用了简单的线性光学元件以及双光子吸收介质(TPAM),在文中讨论了TPAM的一种实现方案.我们把此种装置应用于量子密钥分配方案,分析了其效率和安全性,相比于用自发参量下转换(SPDC)产生纠缠光子对的密钥分配方案,该方案有更高的效率和安全性.  相似文献   

8.
We demonstrate quantum key distribution based on Bennett’s two-coherent-state protocol [Phys. Rev. Lett. 68 (1992) 3121]. The wavelength is set at 1550 nm for low-loss fiber transmission. A large reference pulse is used in order to enhance security of the protocol. The measured quantum bit-error rate is 2% for a fiber length of 10.5 km.  相似文献   

9.
许方星  王双  韩正甫  郭光灿 《中国物理 B》2010,19(10):100312-100312
SARG04 protocol has its advantages in defending photon number splitting attack, benefited from two-photon pulses part. In this paper, we present a passive decoy state SARG04 scheme combining with practical photon number resolving (PNR) detectors. Two kinds of practical detectors, transition-edge sensor and time-multiplexing detector, are taken into consideration. Theoretical analysis shows that both of them are compatible with the passive decoy state SARG04. Compared with the original SARG04, two detectors can boost the key generation rate and maximal secure distance obviously. Meanwhile, the result shows that quantum efficiency and dark count of the detector influence the maximal distance slightly, which indicates the prospect of implementation in real quantum key distribution system with imperfect practical PNS detectors.  相似文献   

10.
在量子密钥分配中,量子比特率是一个重要的系统参数。通过引入测量因子和筛选因子,建立了基于理想单光子源和泊松分布单光子源的量子比特率理论模型,给出了量子比特率的表达式,并对两种单光子源进行了比较分析。结果表明,当平均光子数大于1时,泊松分布单光子源能被优化。在发射机脉冲重复率一定的条件下,采用泊松分布单光子源无法达到理想单光子源的量子比特率,这是为保密通信所必须付出的代价。  相似文献   

11.
Several implementations of quantum computation making effective use of the quantum behavior of single-photons have been explored. These implementing methods were found unsuitble for large-scale computation, because they require 2N-1 optical paths to represent N qubits. In this paper, a new computing scheme is described which utilizes spatial distribution of photons. The occupation of several optical paths by single-photons is adopted as qubits. This adoption gives several extension of processing capacity and computational functionality with a simple setup. An optical implementation of a solution algorithm on four-bit Deutsch-Jozsa problem is demonstrated with utilization of the spatial distribution of photons.  相似文献   

12.
基于泊松分布单光子源的量子误码率的分析   总被引:1,自引:0,他引:1  
马晶  张光宇  谭立英 《光学技术》2006,32(1):101-104
在自由空间量子密钥分配中,单光子源采用具有泊松分布的高度衰减激光脉冲,量子密码术协议采用BB84和B92协议。通过引入量子信道传输率、单光子捕获概率、测量因子和数据筛选因子,建立了量子误码率理论模型,给出了量子误码率的表达式。对于自由空间量子信道,引起量子误码率的主要因素是光学元件、探测器暗噪声和空间光学环境,并对这些因素进行了分析。针对低轨卫星_地面站间链路,进行了量子误码率的数值仿真研究。结果表明,在低轨卫星_地面站间进行量子密钥分配是可行的,限制自由空间量子密钥分配链路距离的主要因素是探测器暗噪声和空间光学环境。  相似文献   

13.
利用单光子的量子对话   总被引:1,自引:0,他引:1  
提出了一个利用一束单光子对话的方案.在方案中,利用两个不同的幺正操作对光子态进行编码,并且从一束光子中选择较大的子集进行窃听检查,该方案能够有效地抵御截取再发送袭击.此外,由于利用单光子没有利用EPR对,因此该方案是很实际的.该方案是绝对安全的.  相似文献   

14.
单光子量子路由对于在芯片中实现量子信息交换具有重大意义。研究单光子量子路由中的耗散影响能够更加真实的模拟实际实验的结果。研究发现耗散能级的存在使得同等条件下的量子路由概率减小,并且需要相对较强的耦合才能取得最大量子路由概率。同时,也建立了共振条件下量子路由概率同耦合强度以及耗散强度间的关系。  相似文献   

15.
We present two schemes to generate frequency-multiplexed entangled (FME) single photons by coherently mapping photonic entanglement into and out of a quantum memory based on Raman interactions. By splitting a single photon and performing subsequent state transfer, we separate the generation of entanglement and its frequency conversion, and find that the both progresses have the characteristic of inherent determinacy. Our theory can reproduce the prominent features of observed results including pulse shapes and the condition for deterministically generating the FME single photons. The schemes are suitable for the entangled photon pairs with a wider frequency range, and could be immune to the photon loss originating from cavity-mode damping, spontaneous emission, and the dephasing due to atomic thermal motion. The sources might have significant applications in wavelength-division-multiplexing quantum key distribution.  相似文献   

16.
一种新的预报单光子源诱骗态量子密钥分发方案   总被引:9,自引:0,他引:9       下载免费PDF全文
权东晓  裴昌幸  朱畅华  刘丹 《物理学报》2008,57(9):5600-5604
提出一种新的预报单光子源诱骗态量子密钥分发方案.在发端采用参量下变换产生纠缠光子对,其中之一用来进行预报探测,根据探测结果将另一路光脉冲分成两个集合,其中预报探测有响应的脉冲集合用作信号态,无响应的脉冲集合作为诱骗态.由于探测效率的问题,这两个集合都是有光子的,通过这两个集合的通过率和错误率估计出单光子的通过率和错误率.此方法不需要改变光强,简单可行.仿真结果表明:该方法可以达到完美单光子源的安全通信距离;与预报单光子源的量子密钥分发相比,密钥产生率有了很大的提高;和三强度预报单光子源诱骗态量子密钥分发的 关键词: 量子保密通信 量子密钥分发 诱骗态 预报单光子源  相似文献   

17.
延迟选择实验是量子物理中一项重要的实验.本文利用单光子与腔的关系,提出了一种变通的可操作验证延迟选择实验方案.在光子进入腔中之后,通过控制光子与腔的失谐控制光子的入射(光子位于腔内)-反射(光子位于腔外)行为.该方案与传统的方案比较有一定的特点.  相似文献   

18.
Lingzhi Kong 《中国物理 B》2022,31(7):70303-070303
When developing a practical continuous-variable quantum key distribution (CVQKD), the detector is necessary at the receiver's side. We investigate the practical security of the CVQKD system with an unbalanced heterodyne detector. The results show that unbalanced heterodyne detector introduces extra excess noise into the system and decreases the lower bound of the secret key rate without awareness of the legitimate communicators, which leaves loopholes for Eve to attack the system. In addition, we find that the secret key rate decreases more severely with the increase in the degree of imbalance and the excess noise induced by the imbalance is proportional to the intensity of the local oscillator (LO) under the same degree of imbalance. Finally, a countermeasure is proposed to resist these kinds of effects.  相似文献   

19.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks toauthenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.  相似文献   

20.
In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information deterministicaJly in two rounds. The devices and efficiency of the protocol are discussed respectively. We also show the security of the protocol against intercept-resend and Trojan-Horse eavesdropping attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号