首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
We suggest a protocol for quantum key distribution—a technology allowing two distant parties to create an unconditionally secure cryptographic key. For the creation of the key we suggest to use laser pulses weakened to the single-photon level of duration T, the pulse carrying the value “1” being shifted in time by T/2 compared to the pulse carrying the value “0”. The overlap of the pulses provides their non-orthogonality and, therefore, impossibility to discriminate between them with certainty. Besides the signal pulses the protocol uses coherent decoy pulses, having longer duration than the signal ones and providing a more effective protection from a wide class of attacks. Security of the protocol is based on interferometric control of the pulse coherence at the receiving station. We analyze the security of the protocol against a number of intercept-resend attacks and on the basis of this analysis substantiate the necessity of decoy state implementation.  相似文献   

2.
张阳  王双  银振强  陈巍  梁文烨  李宏伟  郭光灿  韩正甫 《中国物理 B》2012,21(10):100307-100307
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty’s theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss.  相似文献   

3.
In this paper, we consider the controllably secure quantum key distribution (QKD) with coherent source, i.e., the practical decoy state QKD with finite resource is studied within the scope of some controllable security parameters. Our simulation shows the controllably secure QKD is more resource-consuming compared with the practical decoy QKD with relatively statistical fluctuation. However, further numerically solutions show that both protocols agree well with each other in the asymptotic limit, where the resource is large enough but not infinite. Our work shows the dark counts will contribute apparently to the transmission distance when communication distance approaches to the asymptotic limit. It also shows that both the secure transmission distance and the rate of the secure final key can be increased apparently when the security estimation parameters are not fixed but numerically optimized.  相似文献   

4.
5.
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.  相似文献   

6.
提出了一种改进的基于时间和相位混合编码的量子密钥分发方案, 并进行了实验研究.在以BB84协议为基础的相位编码量子密钥分发系统上, 利用了系统中原来舍弃的脉冲进行时间编码, 使成码率提高为原方案的二倍. 系统同时获得时间编码密钥和相位编码密钥, 现在可以将两组密钥组合成新密钥, 提高了成码率和监测窃听灵敏度. 同时在系统的接收端用双FM反射式干涉仪代替传统的光纤M-Z干涉仪,提高了系统的稳定性. 实验上已实现90km光纤量子密钥分发, 实验表明本系统具有安全性高,稳定性好,成本低的优点. 关键词: 量子保密通信 量子密钥分发 相位编码 时间编码  相似文献   

7.
一种新的预报单光子源诱骗态量子密钥分发方案   总被引:9,自引:0,他引:9       下载免费PDF全文
权东晓  裴昌幸  朱畅华  刘丹 《物理学报》2008,57(9):5600-5604
提出一种新的预报单光子源诱骗态量子密钥分发方案.在发端采用参量下变换产生纠缠光子对,其中之一用来进行预报探测,根据探测结果将另一路光脉冲分成两个集合,其中预报探测有响应的脉冲集合用作信号态,无响应的脉冲集合作为诱骗态.由于探测效率的问题,这两个集合都是有光子的,通过这两个集合的通过率和错误率估计出单光子的通过率和错误率.此方法不需要改变光强,简单可行.仿真结果表明:该方法可以达到完美单光子源的安全通信距离;与预报单光子源的量子密钥分发相比,密钥产生率有了很大的提高;和三强度预报单光子源诱骗态量子密钥分发的 关键词: 量子保密通信 量子密钥分发 诱骗态 预报单光子源  相似文献   

8.
诱惑态量子密钥分配系统中统计涨落的研究   总被引:1,自引:0,他引:1       下载免费PDF全文
焦荣珍  唐少杰  张弨 《物理学报》2012,61(5):50302-050302
针对实用的量子密钥分配(QKD)系统是基于强衰减的弱激光脉冲作为单光子源, 光子数分束攻击极大限制了通信双方在非理想条件下QKD的传输距离和密钥生成率,采用大数定律对诱惑态协议中单光子的计数率、单光子增益和误码率分别进行统计涨落分析, 利用双诱惑态比较了1310 nm和1550 nm条件下,编码脉冲的长度为(N = 106-N = 1012)实际QKD协议中密钥的生成率与安全传输距离之间的关系、安全传输距离随编码长度的变化的关系, 得出脉冲编码长度增大到N = 1012时,密钥的最大安全传输距离为135 km.  相似文献   

9.
杨宇光  温巧燕 《中国物理》2007,16(8):2215-2218
An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3 \otimes 3 Hilbert space is presented. The sender, Alice, disorders the orthogonal product state sequence and sends it to Bob. After Alice has published the matching information of the particle sequence, Bob recovers the correct correspondences and makes an orthogonal measurement on the orthogonal product states to obtain the information sent by Alice. Finally, security analysis is also made.  相似文献   

10.
An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the n\otimes n(n\geq3)Hilbert space is presented. In this protocol, the particles in the orthogonal product states form two particle sequences. The sender, Alice, first sends one sequence to the receiver, Bob. After Bob receives the first particle sequence, Alice and Bob check eavesdropping by measuring a fraction of particles randomly chosen. After ensuring the security of the quantum channel, Alice sends the other particle sequence to Bob. By making an orthogonal measurement on the two particle sequences, Bob can obtain the information of the orthogonal product states sent by Alice. This protocol has many distinct features such as great capacity, high efficiency in that it uses all orthogonal product states in distributing the key except those chosen for checking eavesdroppers.  相似文献   

11.
We assess the security of a quantum key distribution protocol relying on the transmission of Gaussian-modulated coherent states and homodyne detection. This protocol is shown to be equivalent to an entanglement purification protocol using CSS codes followed by key extraction, and is thus secure against any eavesdropping strategy.  相似文献   

12.
Ren  M.  Wu  G.  Wu  E.  Zeng  H. 《Laser Physics》2011,21(4):755-760
Counterfactual quantum key distribution provides natural advantage against the eavesdropping on the actual signal particles. It can prevent the photon-number-splitting attack when a weak coherent light source is used for the practical implementation. We experimentally realized the counterfactual quantum key distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility of 97.4%. According to the security analysis, the system was robust against the photon-number-splitting attack. The article is published in the original.  相似文献   

13.
周南润  宋汉冲  龚黎华  刘晔 《物理学报》2012,61(21):225-231
基于连续变量GHZ态的纠缠特性,提出一种三方量子确定性密钥分配协议,其中密钥由GHZ态的振幅产生,而相位可以用来验证信道的安全性.现有的量子确定性密钥分配协议一次只能向一个接收方传送密钥,现实生活中经常要向多个接收方发送确定性密钥.信息论分析结果表明,当信道传输效率大于0.5时,该协议可以同时向两个接收方安全传送确定性密钥,制备多重纠缠态后,该协议还能够扩展成多方量子确定性密钥分配协议,这极大提高了密钥的整体传送效率,而且连续变量量子GHZ态信道容量较高,因此该协议具有重要的现实意义.  相似文献   

14.
We study the possible application of the decoy state method on a basic two way quantum key distribution (QKD) scheme to extend its distance. Noting the obvious advantage of such a QKD scheme in allowing for single as well as double photon contributions, we derive relevant lower bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states. We work with two different approaches in this vein and compare these with an ideal infinite decoy state case as well as the simulation of the original.  相似文献   

15.
We propose a scheme for a quantum key distribution (QKD) protocol with dual-rail displaced photon states. Displaced single-photon states with different amplitudes carry bit values of code that may be extracted, while coherent states carry nothing and only provide an inconclusive outcome. A real resource of single photons is used, involving imperfections associated with experimental technique that result in a photon state with an admixture of the vacuum state. The protocol is robust against the loss of a single photon and the inefficiency of the detectors. Pulses with large amplitudes, unlike the conventional QKD relying on faint laser pulses, are used that may approximate it to standard telecommunication and may show resistance to eaves-dropping even in settings with high attenuation. Information leakage to the eavesdropper is determined from comparison of the output distributions of the outcomes with ideal ones that are defined by two additional parameters accessible to only those send the pulses. Robustness to some possible eavesdropping attacks is shown.  相似文献   

16.
《Physics letters. A》2020,384(12):126340
How to lengthen the maximum transmission of continuous variable quantum key distribution (CVQKD) has been a notorious hard problem in quantum communications. Here, we propose a simple solution to this problem, i.e., quantum catalyzing CVQKD for discrete modulation with eight states. The quantum catalysis, which can facilitate the conversion of the target ensemble, is used for not only tolerating more excess noise but also lengthening the maximum transmission distance. Security analysis shows that the zero-photon catalysis (ZPC), which is actually seen as a noiseless attenuation can be used as an elegant candidate for the performance improvement of discrete modulation (DM)-CVQKD. The numerical simulations show the ZPC-involved DM-CVQKD protocol outperforms the original DM-CVQKD in terms of maximum transmission distance as well as tolerable noise. Moreover, the ZPC-involved DM-CVQKD protocol can tolerate lower reconciliation efficiency and allow the lower detection efficiency to achieve the same performance.  相似文献   

17.
A new deterministic optical scheme has been proposed for preparing and detecting quantum states in quantum cryptography. This scheme makes it possible to quadruple the efficiency of the existing systems under the other conditions being equal. Thus, the efficiency of the optical part is increased to the maximum for the preparation and detection of quantum states.  相似文献   

18.
王涵  闫连山  潘炜  罗斌  郭振  徐明峰 《物理学报》2011,60(3):30304-030304
单光子的衰减特性及其易受干扰的缺点限制了纯单光子量子系统的传输码率及距离.弱相干光脉冲(WCP)光源和准单光子源(HSPS)则具有更高的实用价值.本文将这两种光源和诱发态方案相结合并采用Lütkenhaus和Gottesman-Lo- Lütkenhaus-Preskill (GLLP)两种数据后处理方法进行性能分析.仿真结果表明:HSPS在传输距离上要优于WCP,对应相同传输距离时系统量子误码率(QBER)要小些,但相对密钥生成率低. 关键词: 量子密钥分配 诱发态 WCP光源 HSPS光源  相似文献   

19.
尹逊汝  马文平  申冬苏  王丽丽 《物理学报》2013,62(17):170304-170304
提出了基于两粒子纠缠态的一个三方量子密钥协商协议. 方案中的三个参与者是完全对等的, 且对建立的共享密钥具有相同的贡献. 除此之外, 三方中的任何一方或两方都不能事先单独决定共享密钥. 安全分析表明本协议既能抵抗外部窃听者的攻击, 又能抵抗内部参与者攻击. 关键词: 量子密码学 量子密钥协商 Bell态  相似文献   

20.
We have experimentally demonstrated a decoy-state quantum key distribution scheme (QKD) with a heralded single-photon source based on parametric down-conversion. We used a one-way Bennett-Brassard 1984 protocol with a four states and one-detector phase-coding scheme, which is immune to recently proposed time-shift attacks, photon-number splitting attacks, and can also be proven to be secure against Trojan horse attacks and any other standard individual or coherent attacks. In principle, the setup can tolerate the highest losses or it can give the highest secure key generation rate under fixed losses compared with other practical schemes. This makes it a quite promising candidate for future quantum key distribution systems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号