首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 1 毫秒
1.
基于相位调制偏振态QKD系统的量子信道校正发送方案   总被引:4,自引:1,他引:3  
提出了一种基于相位调制偏振态QKD系统的量子信道校正发送的新方案—采用波导型相位调制器研制成电控连续可调光学相移器,它可随相位调制器输入电压的连续改变而产生连续的相移,从而控制输出的偏振态;在其前放置一个半波片,即可校正接收端偏振态量子态在信道中所发生的改变,从而保证信道传送密钥的可用性.通过理论推导和实验研究验证了基于相位调制偏振态QKD系统的量子信道校正发送方案的核心部件的可行性.由于本方案能实现高速调制(GHz),为解决光纤传输的偏振编码QKD系统中偏振态漂移问题提供了一种新的途径.  相似文献   

2.
A theoretical quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ states is devised. In this scheme, EPR pairs and tripartite GHZ states are exploited to set up random hybrid quantum channel. Only one photon in each entangled state is necessary to run forth and back in the channel. The security of the quantum key distribution scheme is guaranteed by more than one round of eavesdropping check procedures. It is of high capacity since one particle could carry more than two bits of information via quantum dense coding.  相似文献   

3.

Quantum entanglement is one of the key methods in quantum information processing, but it is difficult to prepare quantum entanglement. Quantum walk is widely used in quantum computation and quantum simulation, it can be applied to the preparation of quantum entangled states. In this paper, a controllable quantum network coding scheme based on quantum walk is proposed. With the help of quantum walk, the scheme preliminary realized the entanglement distribution of butterfly network, reduced entanglement resources and enhanced scalability. According to the existing technology, it is feasible to implement the quantum network coding scheme proposed in this paper.

  相似文献   

4.
A new quantum key expansion scheme is proposed. The protocol of quantum key expansion proposed by Hwang is analyzed and the eavesdropping scheme is presented. We found that the using of the basis sequence shared by communicating parties is the weakness of the protocol. Hence we propose a ‘purification attack’ for the eavesdropper to steal partial information of the raw key and the new key between communicating parties. In view of this defect, we propose a new protocol of quantum key expansion, where the shared key is encrypted into a sequence of unitary operators which can be used securely against the presented attack.  相似文献   

5.
Quantum Key Distribution Scheme Based on Dense Encoding in Entangled States   总被引:1,自引:0,他引:1  
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob. Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.  相似文献   

6.
International Journal of Theoretical Physics - In this paper, we show a new quantum proxy blind signature scheme based on single particle superdense coding. We only need perform unitary operator on...  相似文献   

7.
As the foundation of quantum secure communication, the quantum key distribution (QKD) network is impossible to construct by using the operation mechanism of traditional networks. In the meantime, most of the existing QKD network routing schemes do not fit some specific quantum key practicality scenarios. Aiming at the special scenario of high concurrency and large differences in application requirements, we propose a new quantum key distribution network routing scheme based on application priority ranking (APR-QKDN). Firstly, the proposed APR-QKDN scheme comprehensively uses the application’s priority, the total amount of key requirements, and the key update rate for prioritizing a large number of concurrent requests. The resource utilization and service efficiency of the network are improved by adjusting the processing order of requests. Secondly, the queuing strategy of the request comprehensively considers the current network resource situation. This means the same key request may adopt different evaluation strategies based on different network resource environments. Finally, the performance of the APR-QKDN routing scheme is compared with the existing schemes through simulation experiments. The results show that the success rate of application key requests of the APR-QKDN routing scheme is improved by at least 5% in the scenario of high concurrency.  相似文献   

8.
设计了一种高效的部分纠缠光子对产生装置,这套装置中使用了简单的线性光学元件以及双光子吸收介质(TPAM),在文中讨论了TPAM的一种实现方案.我们把此种装置应用于量子密钥分配方案,分析了其效率和安全性,相比于用自发参量下转换(SPDC)产生纠缠光子对的密钥分配方案,该方案有更高的效率和安全性.  相似文献   

9.
GAO Gan 《理论物理通讯》2009,51(5):820-822
Based on entanglement swapping, a quantum key distribution (QKD) scheme is proposed. In this scheme, the secret keys are formed by comparing initial Bell states and outcomes of entanglement swapping. Moreover, all initial Bell states prepared by Alice and Bob are completely arbitrary. As the classical information exchanged between two parties is very little, this QKD scheme has a high efficiency. In addition, in order to prevent eavesdropping, decoy particles are used.  相似文献   

10.
基于高维两粒子纠缠态的超密编码方案   总被引:3,自引:3,他引:0  
基于通信双方预先共享d维二粒子最大纠缠态非定域相关性,信息发送方Bob只需要向信息接收者Alice传送一个粒子,就可以传送log22比特经典信息,为保护信息的安全,方案采用诱骗光子技术,安全性等价于改进后的原始量子密钥分配方案(Bennett-Brassard 1984,BB84).本文讨论了基于高维纯纠缠态超密编码方...  相似文献   

11.
基于通信双方预先共享d维二粒子最大纠缠态非定域相关性,信息发送方Bob只需要向信息接收者Alice传送一个粒子,就可以传送logd22比特经典信息,为保护信息的安全,方案采用诱骗光子技术,安全性等价于改进后的原始量子密钥分配方案(Bennett-Brassard 1984,BB84).本文讨论了基于高维纯纠缠态超密编码方案.即通过引入一个附加量子比特,信息接收方对手中的纠缠粒子和附加粒子在执行相应的幺正演化,可以获取dαk2logd2+logd2(αk=minαj,j∈0,L,d-1)比特经典信息.通信双方采用诱骗光子技术确保量子信道的安全建立.与其他方案相比,该方案具有通信效率较高、实用性较强的优点.  相似文献   

12.
Optics and Spectroscopy - In this study, we demonstrate the possibility of realizing the quantum key distribution system by temporal coding of time-bin qubits that are prepared and measured using...  相似文献   

13.
为了向用户提供差异化的密钥服务,研究了配备密钥池的可信任量子密钥分配网络.首先,理论分析了数据包时延和密钥池的关系,给出了具体关系式,指出带有密钥池缓存功能的量子密钥分配网络的平均数据包时延与密钥产生速率、密钥池的初始密钥长度、以及数据包的平均长度、到达时间和到达率密切相关.对比理论分析和软件仿真结果,验证了时延分析的正确性.其次,将密钥提供服务分为三类:保证提供型、优先提供型和尽力提供型,并提出了相应的技术实现方案,即提前预约、逐跳插队和逐跳排队;最后,仿真结果表明差异化密钥服务提供机制是有效的.  相似文献   

14.
基于六光子量子避错码的量子密钥分发方案   总被引:3,自引:0,他引:3  
刘文予  李宁  王长强  刘玉 《光学学报》2005,25(11):568-1572
量子信道中不可避免存在的噪声将扭曲被传输的信息,对通信造成危害。目前克服量子信道噪声的较好方案是量子避错码(QEAC)。将量子避错码思想用于量子密钥分发,能有效克服信道中的噪声,且无需复杂的系统。用六光子构造了量子避错码,提出了一种丛于六光子避错码的量子密钥分发(QDK)方案。以提高量子密钥分发的量子比特效率和安全性为前提,对六光子避错码的所有可能态进行组合,得到一种六光子避错码的最优组合方法,可将两比特信息编码在一个态中,根据测肇结果和分组信息进行解码,得到正确信息的平均概率为7/16。与最近的基于四光子避错码的克服量子信道噪声的量子密钥分发方案相比,该方案的量子比特效率提高了16.67%,密钥分发安全性足它的3.5倍。  相似文献   

15.
Oneofthemostintriguingandexcitingrecentdevelopmentsinquantummechanicsisthepredictionanddemonstrationofacryptographickeydistri...  相似文献   

16.
On the basis of entanglement swapping of Bell states, Hwang et al. proposed a probabilistic quantum key distribution (PQKD) protocol Quantum Inf. Comput. 11(7-8), 615–637 (2011). Recently, Lin et al. Quantum Inf. Comput. 14(9-10), 757–762 (2014) proposed a unitary operation attack on Hwang et al.’s PQKD. However, unlike the unitary operation attack, this work points out that a malicious participant in Hwang et al.’s PQKD protocol can manipulate the secret key. As a result, the security requirements of a PQKD protocol, i.e., fairness, cannot be satisfied in their protocol. Moreover, the same attack can also crack the fairness requirement of the existing quantum key agreement (QKA) protocols. To overcome both problems, this paper proposes a new PQKD protocol based on the order rearrangement of the transmitted photons. Furthermore, the rearrangement method can also solve the key manipulation attack in QKA protocols.  相似文献   

17.
It is shown that the configuration of phase coding for quantum key distribution with single photon can also be used for continuous variable quantum key distribution. Therefore the robust long-distance high-speed quantum key distribution can be achieved with current technology.  相似文献   

18.
A family of attacks on the BB84 protocol of quantum key distribution is explicitly constructed under which the lower bound of fundamental entropy uncertainty relations is attained in the asymptotic limit of long sequences. All attacks are parameterized by a single parameter Q, which has the meaning of error probability on the receiver side, is known to the eavesdropper, but is reliably unknown to legitimate users. The situation on the receiver side looks like a scheme with classical Bernoulli tests with unknown parameter Q. For the eavesdropper, the situation also looks like a Bernoulli scheme—tossing a coin with quantum states, where each message of the eavesdropper leads to a quantum state that is uniquely determined by the outcome of measurements on the receiver side. A statistical interpretation is given to the estimate of the error probability for Q and the key secrecy parameter εδ,n. It is shown that, for a given length n of a series of tests, the width δ of the confidence interval actually determines the accuracy of the estimate for the parameter Q and, accordingly, the key secrecy level—the value of the secrecy parameter \({\varepsilon _{\delta ,n}} = 2{e^{ - 2{\delta ^2}n}}\).  相似文献   

19.
We present a scheme that is capable of detecting photon numbers during the quantum key distribution (QKD) based on an improved differential phase shift (DPS) system without Trojan horse attack. A time-multiplexed detector (TMD) is set in for the photon-number resolution. Two fibre loops are used for detecting photon numbers as well as distributing keys. The long-term stabilization is guaranteed by two Faraday mirrors (FM) at Bob's site to automatically compensate for polarization defect. Our experimental study (90km QKD is completed) indicates that such a system is stable and secure which nearly reaches the performance of a single photon scheme.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号