首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 55 毫秒
1.
沈咏  邹宏新 《物理学报》2010,59(3):1473-1480
对一种结合离散调制和反向协调,适用于长距离传输的连续变量量子密钥分发四态协议的安全性进行了严格证明.这种协议中Alice发送的态与高斯调制协议中的有一定差异,这种差异可以等价成信道衰减和额外噪声.另外,由于Alice不可能做到精确调制,这会导致其发送的相干态中含有噪声.把这种调制引起的噪声看作光源的噪声,并推导出了在光源噪声不能被窃听者所利用的条件下的安全码率的下界.为了避免实验上快速、随机的控制本地振荡光的相位,还将无开关协议和四态协议相结合,分析了其安全性.  相似文献   

2.
在连续变量量子密钥分发系统中,同步技术是确保通信双方时钟和数据一致的关键技术.本文通过巧妙设计发送端和接收端仪器的硬件时序,采用时域差拍探测方式和峰值采集技术,实验实现了可硬件同步的四态离散调制连续变量量子密钥分发.通信双方在设计好的硬件同步时序下可实现时钟的恢复和数据的自动对齐,无需借助软件算法实现数据的对齐.本文采用了加拿大滑铁卢大学Norbert Lütkenhaus研究组提出的针对连续变量离散调制协议的安全密钥速率计算方法.该方法需计算出接收端所测各种平移热态的一阶矩和二阶(非中心)矩,以此为约束条件结合凸优化算法可计算出安全密钥速率.计算过程中无需假设信道为线性信道,无需额外噪声的估算.密钥分发系统重复频率为10 MHz,传输距离为25 km,平均安全密钥比特率为24 kbit/s.本文提出的硬件同步方法无需过采样和软件帧同步,减小了系统的复杂度和计算量,在一定程度上降低了系统所需的成本、功耗和体积,有效地增强了连续变量量子密钥分发的实用性.  相似文献   

3.
吴晓东  黄端 《物理学报》2023,(5):187-198
往返式离散调制连续变量量子密钥分发,无需使用两台独立的激光器也能本地生成本振光,并且信号光与本振光均来自于同一台激光器,在有效保证系统实际安全性的同时,具有较好的同频特性.此外,该方案与高效纠错码具有良好的兼容性,即使在低信噪比情况下也能获得较高的协商效率.然而,基于非可信信源模型的往返式光路结构存在较大的过噪声,严重限制离散调制方案的最大传输距离.针对这个问题,本文提出基于非高斯态区分探测的往返式离散调制连续变量量子密钥分发方案,即在探测端部署非高斯态区分探测器,采用自适应测量方法并结合贝叶斯推论,可以在满足低于标准量子极限错误概率的情况下无条件区分出基于四态离散调制的四种非正交相干态.本文详细分析了所提出的基于非高斯态区分探测的往返式离散调制连续变量量子密钥分发方案的安全性,包括渐近情况与有限长效应情况.仿真结果表明所提出的方案相比于原始方案,即使在有信源噪声的情况下,其密钥率与最大传输距离仍然有明显的提升.这些结果表明本方案能够有效降低往返式离散调制连续变量量子密钥分发方案中非可信信源噪声对方案性能的负面影响,在保证系统实际安全性的同时,实现更高效、更远传输距离的量子密钥分发.  相似文献   

4.
在实际的连续变量量子密钥分发系统中,接收端模数转换器的有限采样带宽会导致脉冲峰值采样结果不准确,从而使参数估计过程产生误差,给窃听者留下了安全性漏洞.针对这个问题,本文提出一种基于峰值补偿的连续变量量子密钥分发方案,利用高斯脉冲的基本特性来估计每个脉冲的最大采样值与脉冲峰值之间的偏差,从而对该采样值进行峰值补偿,使系统...  相似文献   

5.
同步技术是连续变量量子密钥分发系统的核心技术之一,能实现通信双方的实时通信,确保量子信息的有效提取。本文提出了一种新型的同步方案,能有效克服量子信道噪声及误码的影响,实现发送端和接收端的准确同步。文章从理论上介绍了方案的同步机制,并对其性能进行了仿真分析。  相似文献   

6.
连续变量量子密钥分发的数据逆向协调   总被引:1,自引:0,他引:1  
基于多级编码/多级译码(MLC/MSD)系统实现了连续变量量子密钥分发的逆向数据协调。讨论了高斯连续变量量化过程中使互信息量最大时最佳量化区间的选取,并且通过理论计算给出了信噪比为4dB的情况下各级等价信道的最佳码率。协调方案中选择低密度奇偶校验码(LDPC)作为信道编码,结合边信息译码原理最终通过LDPC迭代译码算法实现了数据的逆向协调。  相似文献   

7.
为使连续变量量子密钥分发协议获得稳定的密钥生成率,需要根据信道变化动态调整发送光脉冲的强度.将光纤量子信道看作加性玻色量子高斯信道,给出高斯态通过玻色量子高斯信道仍得到高斯态的证明过程.通过平衡零差检测后,采用最大似然估计法得到了信道参数,进而根据估计的噪声大小自适应调整Alice发送的光脉冲的强度,从而获得稳定的密钥生成率. 关键词: 量子密钥分发 连续变量 玻色量子高斯信道 信道估计  相似文献   

8.
高速连续变量量子密钥分发系统同步技术研究   总被引:2,自引:0,他引:2  
在高速连续变量量子密钥分发系统中,位帧同步技术是确保准确获取量子信号所携带有效信息的核心技术之一。结合平衡零差探测器测量相干态的正则分量数据,提出了一种简单高效的位帧同步理论方案。基于此理论方案,在重复频率为25MHz的高斯调制相干态连续变量量子密钥分发系统上进行了实验测试和性能分析。结果表明,所提出的位帧同步方案能有效克服量子信号在密钥分发中受到的环境因素影响,有效实现通信双方同步。  相似文献   

9.
10.
11.
We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel. Different from optical fibers, the underwater channel has more severe optical attenuation because of optical absorption and scattering, which reduces the maximum communication distance. To enhance the performance of the protocol, the photon subtraction operation is implemented at the modulator side. We carry out a performance simulation in two different kinds of seawater channel, and the result shows that the scheme with photon subtraction has a longer secure communication distance under certain conditions.  相似文献   

12.
《Physics letters. A》2020,384(2):126061
In this paper, we proposed an unidimensional continuous-variable quantum key distribution (CV-QKD) protocol with discrete modulation, which waives the necessity in one of the quadrature modulations and further simplified the implementation of the CV-QKD protocol. On the basis of the Heisenberg uncertainty relation, we analyze the boundary between the unphysical and physical region. Besides, we utilize a novel proof approach to achieve a lower bound valid of transmission distance. This scheme shows an available method to further simplified the implementation of the QKD.  相似文献   

13.
We propose a scheme to remove the demand of transmitting a high-brightness local oscillator (LO) in continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, which we call as the self-referenced (SR) CV-MDI QKD. We show that our scheme is immune to the side-channel attacks, such as the calibration attacks, the wavelength attacks and the LO fluctuation attacks, which are all exploiting the security loopholes introduced by transmitting the LO. Besides, the proposed scheme waives the necessity of complex multiplexer and demultiplexer, which can greatly simplify the QKD processes and improve the transmission efficiency. The numerical simulations under collective attacks show that all the improvements brought about by our scheme are only at the expense of slight transmission distance shortening. This scheme shows an available method to mend the security loopholes incurred by transmitting LO in CV-MDI QKD.  相似文献   

14.
何广强  曾贵华 《中国物理》2006,15(6):1284-1289
This paper proposes a deterministic quantum key distribution scheme based on Gaussian-modulated continuous variable EPR correlations. This scheme can implement fast and efficient key distribution. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier. For general beam splitter eavesdropping strategy, the secret information rate $\Delta I=I(\alpha,\beta)-I(\alpha,\epsilon)$ is calculated in view of Shannon information theory. Finally the security analysis is presented.  相似文献   

15.
Plug-and-play dual-phase-modulated continuous-variable quantum key distribution (CVQKD) protocol can effectively solve the security loopholes associated with transmitting local oscillator (LO). However, this protocol has larger excess noise compared with one-way Gaussian-modulated coherent-states scheme, which limits the maximal transmission distance to a certain degree. In this paper, we show a reliable solution for this problem by employing non-Gaussian operation, especially, photon subtraction operation, which provides a way to improve the performance of plug-and-play dual-phase-modulated CVQKD protocol. The photon subtraction operation shows experimental feasibility in the plug-andplay configuration since it can be implemented under current technology. Security results indicate that the photon subtraction operation can evidently enhance the maximal transmission distance of the plug-and-play dual-phase-modulated CVQKD protocol, which effectively makes up the drawback of the original one. Furthermore, we achieve the tighter bound of the transmission distance by considering the finite-size effect, which is more practical compared with that achieved in the asymptotic limit.  相似文献   

16.
朱俊  何广强  曾贵华 《中国物理》2007,16(5):1364-1369
In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein--Podolsky--Rosen (EPR) pairs is investigated. A new approach for calculating the secret information rate Δ I is proposed by using the Shannon information theory. Employing an available parameter F which is associated with the entanglement of the EPR pairs, one can detect easily the eavesdropping. Results show that the proposed scheme is secure against individual beam splitter attack strategy with a proper squeeze parameter.  相似文献   

17.
Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum key distribution protocol was proposed based on the qubits.Later on,it was found that quantum continuous variables can also be exploited for this target.The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse.In this article,we review the current status of the continuous variable quantum key distribution research,including its basic principle,experimental implementations,security and future directions;the experimental progress in this field made by our group is also presented.  相似文献   

18.
《Physics letters. A》2020,384(12):126340
How to lengthen the maximum transmission of continuous variable quantum key distribution (CVQKD) has been a notorious hard problem in quantum communications. Here, we propose a simple solution to this problem, i.e., quantum catalyzing CVQKD for discrete modulation with eight states. The quantum catalysis, which can facilitate the conversion of the target ensemble, is used for not only tolerating more excess noise but also lengthening the maximum transmission distance. Security analysis shows that the zero-photon catalysis (ZPC), which is actually seen as a noiseless attenuation can be used as an elegant candidate for the performance improvement of discrete modulation (DM)-CVQKD. The numerical simulations show the ZPC-involved DM-CVQKD protocol outperforms the original DM-CVQKD in terms of maximum transmission distance as well as tolerable noise. Moreover, the ZPC-involved DM-CVQKD protocol can tolerate lower reconciliation efficiency and allow the lower detection efficiency to achieve the same performance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号