共查询到20条相似文献,搜索用时 0 毫秒
1.
We suggest a protocol for quantum key distribution—a technology allowing two distant parties to create an unconditionally
secure cryptographic key. For the creation of the key we suggest to use laser pulses weakened to the single-photon level of
duration T, the pulse carrying the value “1” being shifted in time by T/2 compared to the pulse carrying the value “0”. The overlap of the pulses provides their non-orthogonality and, therefore,
impossibility to discriminate between them with certainty. Besides the signal pulses the protocol uses coherent decoy pulses,
having longer duration than the signal ones and providing a more effective protection from a wide class of attacks. Security
of the protocol is based on interferometric control of the pulse coherence at the receiving station. We analyze the security
of the protocol against a number of intercept-resend attacks and on the basis of this analysis substantiate the necessity
of decoy state implementation. 相似文献
2.
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty’s theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss. 相似文献
3.
Y. G. Tan Q. Y. Cai 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2010,56(3):449-455
In this paper, we consider the controllably secure quantum key distribution (QKD) with coherent
source, i.e., the practical decoy state QKD with finite
resource is studied within the scope of some controllable security
parameters. Our simulation shows the controllably secure QKD is more
resource-consuming compared with the practical decoy QKD with
relatively statistical fluctuation. However, further numerically
solutions show that both protocols agree well with each other in the
asymptotic limit, where the resource is large enough but not
infinite. Our work shows the dark counts will contribute apparently
to the transmission distance when communication distance approaches
to the asymptotic limit. It also shows that both the secure
transmission distance and the rate of the secure final key can be
increased apparently when the security estimation parameters are not
fixed but numerically optimized. 相似文献
4.
5.
Practical non-orthogonal decoy state quantum key distribution with heralded single photon source 下载免费PDF全文
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol. 相似文献
6.
提出了一种改进的基于时间和相位混合编码的量子密钥分发方案, 并进行了实验研究.在以BB84协议为基础的相位编码量子密钥分发系统上, 利用了系统中原来舍弃的脉冲进行时间编码, 使成码率提高为原方案的二倍. 系统同时获得时间编码密钥和相位编码密钥, 现在可以将两组密钥组合成新密钥, 提高了成码率和监测窃听灵敏度. 同时在系统的接收端用双FM反射式干涉仪代替传统的光纤M-Z干涉仪,提高了系统的稳定性. 实验上已实现90km光纤量子密钥分发, 实验表明本系统具有安全性高,稳定性好,成本低的优点.
关键词:
量子保密通信
量子密钥分发
相位编码
时间编码 相似文献
7.
提出一种新的预报单光子源诱骗态量子密钥分发方案.在发端采用参量下变换产生纠缠光子对,其中之一用来进行预报探测,根据探测结果将另一路光脉冲分成两个集合,其中预报探测有响应的脉冲集合用作信号态,无响应的脉冲集合作为诱骗态.由于探测效率的问题,这两个集合都是有光子的,通过这两个集合的通过率和错误率估计出单光子的通过率和错误率.此方法不需要改变光强,简单可行.仿真结果表明:该方法可以达到完美单光子源的安全通信距离;与预报单光子源的量子密钥分发相比,密钥产生率有了很大的提高;和三强度预报单光子源诱骗态量子密钥分发的
关键词:
量子保密通信
量子密钥分发
诱骗态
预报单光子源 相似文献
8.
针对实用的量子密钥分配(QKD)系统是基于强衰减的弱激光脉冲作为单光子源, 光子数分束攻击极大限制了通信双方在非理想条件下QKD的传输距离和密钥生成率,采用大数定律对诱惑态协议中单光子的计数率、单光子增益和误码率分别进行统计涨落分析, 利用双诱惑态比较了1310 nm和1550 nm条件下,编码脉冲的长度为(N = 106-N = 1012)实际QKD协议中密钥的生成率与安全传输距离之间的关系、安全传输距离随编码长度的变化的关系, 得出脉冲编码长度增大到N = 1012时,密钥的最大安全传输距离为135 km. 相似文献
9.
An efficient quantum key distribution (QKD) protocol with orthogonal
product states in the 3 \otimes 3 Hilbert space is presented. The
sender, Alice, disorders the orthogonal product state sequence and
sends it to Bob. After Alice has published the matching information
of the particle sequence, Bob recovers the correct correspondences
and makes an orthogonal measurement on the orthogonal product states
to obtain the information sent by Alice. Finally, security analysis
is also made. 相似文献
10.
An efficient two-step quantum key distribution (QKD) protocol with
orthogonal product states in the n\otimes n(n\geq3)Hilbert space
is presented. In this protocol, the particles in the orthogonal
product states form two particle sequences. The sender, Alice, first
sends one sequence to the receiver, Bob. After Bob receives the first
particle sequence, Alice and Bob check eavesdropping by measuring a
fraction of particles randomly chosen. After ensuring the security of
the quantum channel, Alice sends the other particle sequence to Bob.
By making an orthogonal measurement on the two particle sequences,
Bob can obtain the information of the orthogonal product states sent
by Alice. This protocol has many distinct features such as great
capacity, high efficiency in that it uses all orthogonal product
states in distributing the key except those chosen for checking
eavesdroppers. 相似文献
11.
We assess the security of a quantum key distribution protocol relying on the transmission of Gaussian-modulated coherent states and homodyne detection. This protocol is shown to be equivalent to an entanglement purification protocol using CSS codes followed by key extraction, and is thus secure against any eavesdropping strategy. 相似文献
12.
Counterfactual quantum key distribution provides natural advantage against the eavesdropping on the actual signal particles.
It can prevent the photon-number-splitting attack when a weak coherent light source is used for the practical implementation.
We experimentally realized the counterfactual quantum key distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long
quantum channel with a high-fringe visibility of 97.4%. According to the security analysis, the system was robust against
the photon-number-splitting attack. The article is published in the original. 相似文献
13.
基于连续变量GHZ态的纠缠特性,提出一种三方量子确定性密钥分配协议,其中密钥由GHZ态的振幅产生,而相位可以用来验证信道的安全性.现有的量子确定性密钥分配协议一次只能向一个接收方传送密钥,现实生活中经常要向多个接收方发送确定性密钥.信息论分析结果表明,当信道传输效率大于0.5时,该协议可以同时向两个接收方安全传送确定性密钥,制备多重纠缠态后,该协议还能够扩展成多方量子确定性密钥分配协议,这极大提高了密钥的整体传送效率,而且连续变量量子GHZ态信道容量较高,因此该协议具有重要的现实意义. 相似文献
14.
We study the possible application of the decoy state method on a basic two way quantum key distribution (QKD) scheme to extend its distance. Noting the obvious advantage of such a QKD scheme in allowing for single as well as double photon contributions, we derive relevant lower bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states. We work with two different approaches in this vein and compare these with an ideal infinite decoy state case as well as the simulation of the original. 相似文献
15.
S. A. Podoshvedov 《Journal of Experimental and Theoretical Physics》2010,110(4):576-583
We propose a scheme for a quantum key distribution (QKD) protocol with dual-rail displaced photon states. Displaced single-photon
states with different amplitudes carry bit values of code that may be extracted, while coherent states carry nothing and only
provide an inconclusive outcome. A real resource of single photons is used, involving imperfections associated with experimental
technique that result in a photon state with an admixture of the vacuum state. The protocol is robust against the loss of
a single photon and the inefficiency of the detectors. Pulses with large amplitudes, unlike the conventional QKD relying on
faint laser pulses, are used that may approximate it to standard telecommunication and may show resistance to eaves-dropping
even in settings with high attenuation. Information leakage to the eavesdropper is determined from comparison of the output
distributions of the outcomes with ideal ones that are defined by two additional parameters accessible to only those send
the pulses. Robustness to some possible eavesdropping attacks is shown. 相似文献
16.
《Physics letters. A》2020,384(12):126340
How to lengthen the maximum transmission of continuous variable quantum key distribution (CVQKD) has been a notorious hard problem in quantum communications. Here, we propose a simple solution to this problem, i.e., quantum catalyzing CVQKD for discrete modulation with eight states. The quantum catalysis, which can facilitate the conversion of the target ensemble, is used for not only tolerating more excess noise but also lengthening the maximum transmission distance. Security analysis shows that the zero-photon catalysis (ZPC), which is actually seen as a noiseless attenuation can be used as an elegant candidate for the performance improvement of discrete modulation (DM)-CVQKD. The numerical simulations show the ZPC-involved DM-CVQKD protocol outperforms the original DM-CVQKD in terms of maximum transmission distance as well as tolerable noise. Moreover, the ZPC-involved DM-CVQKD protocol can tolerate lower reconciliation efficiency and allow the lower detection efficiency to achieve the same performance. 相似文献
17.
S. N. Molotkov 《JETP Letters》2010,91(1):48-53
A new deterministic optical scheme has been proposed for preparing and detecting quantum states in quantum cryptography. This
scheme makes it possible to quadruple the efficiency of the existing systems under the other conditions being equal. Thus,
the efficiency of the optical part is increased to the maximum for the preparation and detection of quantum states. 相似文献
18.
单光子的衰减特性及其易受干扰的缺点限制了纯单光子量子系统的传输码率及距离.弱相干光脉冲(WCP)光源和准单光子源(HSPS)则具有更高的实用价值.本文将这两种光源和诱发态方案相结合并采用Lütkenhaus和Gottesman-Lo- Lütkenhaus-Preskill (GLLP)两种数据后处理方法进行性能分析.仿真结果表明:HSPS在传输距离上要优于WCP,对应相同传输距离时系统量子误码率(QBER)要小些,但相对密钥生成率低.
关键词:
量子密钥分配
诱发态
WCP光源
HSPS光源 相似文献
19.
20.
Wang Q Chen W Xavier G Swillo M Zhang T Sauge S Tengner M Han ZF Guo GC Karlsson A 《Physical review letters》2008,100(9):090501
We have experimentally demonstrated a decoy-state quantum key distribution scheme (QKD) with a heralded single-photon source based on parametric down-conversion. We used a one-way Bennett-Brassard 1984 protocol with a four states and one-detector phase-coding scheme, which is immune to recently proposed time-shift attacks, photon-number splitting attacks, and can also be proven to be secure against Trojan horse attacks and any other standard individual or coherent attacks. In principle, the setup can tolerate the highest losses or it can give the highest secure key generation rate under fixed losses compared with other practical schemes. This makes it a quite promising candidate for future quantum key distribution systems. 相似文献