首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
S. Suchat  P.P. Yupapin 《Optik》2010,121(17):1540-1544
We propose a remarkably simple system of a continuous variable quantum key distribution using chaotic signals generated by a soliton pulse within a nonlinear micro-ring resonator system. By using the appropriate soliton input power and micro-ring parameters, continuous signals are generated spreading over the spectrum. Polarized photons are formed incorporating the polarization control unit into the micro-ring system, which allows different time slot entangled photons to be randomly formed. Two different frequency bands for up-down-link converters can be selected (filtered) and performed, which is available for the simultaneous up-down-link application in the telephone networks. Results obtained have shown that the application of such a system for continuous variable quantum cryptography via optical-wireless up-down-link converters within a single system is plausible.  相似文献   

2.
P.P. Yupapin 《Optik》2010,121(5):422-425
We propose a novel system of quantum key generation via a micro ring resonator for mobile telephone network use, where the conversation messages can be secured by using a quantum code/decode (CODEC) technique incorporated in the public networks. The system consists of a set of micro ring devices incorporating a Mach-Zehnder interferometer (MZI). The entangled photon with different time slots is generated via each micro ring device, which is connected to an MZI. In each micro ring device, the time delay and the Kerr nonlinearity effect are exploited for the qubit (quantum key) generation. At present, fabrication technology has been promising in that the quantum key can be implemented within the mobile telephone hand set and networks, and it has also shown the feasibility of using as perfect security telephone networks.  相似文献   

3.
P. Pongwongtragull  P.P. Yupapin 《Optik》2010,121(23):2137-2139
We propose a novel system of a simultaneous generation of continuous variable quantum key distribution (QKD) and quantum dense coding (QDC) via an optical memory array. The optical memory system is formed by using an array waveguide incorporating a nano-ring resonator, whereas the different spatial light modes can be generated and stored within an optical memory unit. The polarized photon is formed and stored within a storing device, i.e. a ring resonator, whereas the different time slot entangled photons can be generated, transmitted and detected by the different subscriber in the distributed networks. By using the optical memory concept, the continuous variable quantum key distribution is provided. Furthermore, the use of quantum dense coding via time division multiplexing paths, i.e. different time slot, is also plausible. The advantage of the proposed system is that the quantum key distribution can provide the network top security with high capacity and safety, which is the large demand of usage in the public networks.  相似文献   

4.
Quantum key generated by using a fiber optic Mach Zehnder interferometer incorporating a fiber optic ring resonator is proposed. The generated quantum key is distributed via an optical wireless link system, which is available for the free space link. The random quantum bits can be formed and used as the secret codes in quantum communication system. By adding an ancillary photon after the signal photon within the correlation time of the fiber noise and by performing quantum parity checking, the high fidelity to the noiseless quantum in free space is achieved by the technique known as the quantum error correction.  相似文献   

5.
提出一种新的相位编码方案,使用差分和高效BB84协议实现量子密钥分发.在保留差分编码优势的同时,此方案进一步增加系统的安全性.Alice端随机选择{0,π/2,π,3π/2}中的相位对信号脉冲进行调制,Bob端随机选择{0,π/2}中的相位对信号脉冲进行调制.为了提高成码率和简化系统,以η(η→1)的概率选取{0,π} 基对相位进行调制,此时系统运行差分编码,用于生成密钥;以(1-η)的概率选取{π/2,3π/2}基中的相位对脉冲信号进行调制.{π/2,3π/2}基的选用是为了增加系统维度和进行安全性评估,不用于生成密钥.设计相应的系统,利用微弱相干光脉冲在该新协议下进行编码,在接收端采用法拉第-迈克尔逊方式进行解码,在实验上实现了长期稳定的密钥分发,误码率<5%,传输距离达85 km.  相似文献   

6.
Building a quantum key distribution network is crucial for practical quantum cryptography. We present a scheme to build a star topology quantum key distribution network based on wavelength division multiplexing which, with current technology, can connect at least a hundred users. With the scheme, a 4-user demonstration network was built up and key exchanges were performed.  相似文献   

7.
A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state. It can give us different lower and upper bounds of the fraction of single-photon counts and single-photon QBER, respectively, for one decoy state protocol. We have also analyzed the feasibility of performing quantum key distribution (QKD), with different exiting protocols, in earth-satellite and intersatellite links. Our simulation shows the choice of intensity of signal state and the effect of choosing the number of decoy states on key generation rate. The final key rate over transmission distance has been simulated, which shows that security proofs give a zero key generation rate at long distances (larger than 16,000 km). It has been shown that the practical QKD can be established with low earth orbit and medium earth orbit satellites.  相似文献   

8.
This study points out that a malicious gateway in Hong et al.'s multi-user quantum key distribution protocol [Optics Communication 283 (2010) 2644] may be able to reveal the secret key of the protocol without being detected. An improvement is suggested to avoid the weakness.  相似文献   

9.
In this Letter, we investigate the classicality and quantumness of a quantum ensemble. We define a quantity called ensemble classicality based on classical cloning strategy (ECCC) to characterize how classical a quantum ensemble is. An ensemble of commuting states has a unit ECCC, while a general ensemble can have a ECCC less than 1. We also study how quantum an ensemble is by defining a related quantity called quantumness. We find that the classicality of an ensemble is closely related to how perfectly the ensemble can be cloned, and that the quantumness of the ensemble used in a quantum key distribution (QKD) protocol is exactly the attainable lower bound of the error rate in the sifted key.  相似文献   

10.
Reference-frame-independent quantum key distribution (RFI-QKD) has been demonstrated to be reliable and useful both in theories and experiments, which is intrinsically robust against slowly varying reference frames. In this paper, we propose an efficient scheme of passive decoy-state RFI-QKD based on the parametric down-conversion source, where a beam splitter splits the idler pulses into four local detection events to improve the performance of RFI-QKD systems. In addition, we demonstrate the worst relative rotation of reference frames in our scheme. Simulation results show that our scheme can achieve good performance even at the worst-case scenario.  相似文献   

11.
A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels.  相似文献   

12.
Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate.  相似文献   

13.
S. Suchat  K. Paithoonwattanakij 《Optik》2010,121(21):1944-1947
We propose an interesting scheme on photon states generation using a fiber optic Mach Zehnder interferometer incorporating a fiber optic ring resonator without any optical pumping parts including in the system, which is available for long-distance link. In principle, the state of a quantum bit, it is known, unknown, or entangled to other systems. The desired quantum states are generated and transmitted in the link via a fiber optic. The transmission quality in terms of quantum fidelity is analyzed, where a high fidelity to the noiseless quantum channel is achieved by adding an ancillary photon after the signal photon within the correlation time of the fiber noise and by performing the quantum parity checking method. The error correction is also analyzed. For simplicity, feature and robustness against path-length mismatches among the nodes make our scheme suitable for multi-user quantum communication networks.  相似文献   

14.
P.P. Yupapin  S. Thongmee  K. Sarapat 《Optik》2010,121(7):599-603
An analysis of a new technique for quantum key distribution (QKD) using the entangled photon within a micro ring resonator is presented. The Kerr nonlinear type of light in the micro ring resonator induces the nonlinear behavior known as chaos within the device, where the superposition of the chaotic signals via a four-wave mixing type introduces the clear second-harmonic pulses. The generation of clear second-harmonic pulses is achieved by controlling the appropriate ring parameters. When the polarization control devices are applied into the system, the optimal entangle photon visibility is obtained. The condition for long-distance link is discussed, where the optimal entangled photon visibility in term of Bell's states is described.  相似文献   

15.
王美玉  闫凤利 《中国物理 B》2011,20(12):120309-120309
In this paper, we investigate perfect quantum teleportation and dense coding by using an 2N-qubit W state channel. In the quantum teleportation scheme, an unknown N-qubit entangled state can be perfectly teleported. One ebit of entanglement and two bits of classical communication are consumed in the teleportation process, just like when using the Bell state channel. While N+1 bits of classical information can be transmitted by only sending N particles in the dense coding protocol.  相似文献   

16.
A multi-user quantum key distribution protocol [C.H. Hong et al., Opt. Commun. 283 (2010) 2644] was proposed, in which any two among n users of the system can communicate with each other, even though there is no direct quantum channel between them. Nevertheless, we show that the mediator Trent, who performs entanglement swapping in this protocol, has a way to eavesdrop on the communication between the two users without being detected. We also give an effective method to solve the security leak.  相似文献   

17.
We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.  相似文献   

18.
基于相位调制偏振态QKD系统的量子信道校正发送方案   总被引:4,自引:1,他引:3  
提出了一种基于相位调制偏振态QKD系统的量子信道校正发送的新方案—采用波导型相位调制器研制成电控连续可调光学相移器,它可随相位调制器输入电压的连续改变而产生连续的相移,从而控制输出的偏振态;在其前放置一个半波片,即可校正接收端偏振态量子态在信道中所发生的改变,从而保证信道传送密钥的可用性.通过理论推导和实验研究验证了基于相位调制偏振态QKD系统的量子信道校正发送方案的核心部件的可行性.由于本方案能实现高速调制(GHz),为解决光纤传输的偏振编码QKD系统中偏振态漂移问题提供了一种新的途径.  相似文献   

19.
Upper bounds for the security of coherent-one-way (COW) quantum key distribution protocols have been analyzed by considering the one-pulse-attack [Branciard C, Gisin N and Scarani V (BGS) New J.Phys. (2008) 10 013031]. However, their security analysis was based on long distance case, and the typical value of the transmission distance is larger than 50 km. Applying the sharp continuity for the von Neumann entropy and some basic inequalities, we provide lower bounds for the security of modified coherent-one-way quantum key distribution protocol against the most general one-pulse-attack by only considering photon number resolved detectors that will be used in the receiver's side. Comparing with BGS's security analysis, our security analysis can be satisfied with arbitrary distance case.  相似文献   

20.
Quantum communication network scales point-to-point quantum communication protocols to more than two detached parties, which would permit a wide variety of quantum communication applications. Here, we demonstrate a fully-connected quantum communication network, exploiting three pairs of Einstein−Podolsky−Rosen (EPR) entangled sideband modes, with high degree entanglement of 8.0 dB, 7.6 dB, and 7.2 dB. Each sideband modes from a squeezed field are spatially separated by demultiplexing operation, then recombining into new group according to network requirement. Each group of sideband modes are distributed to one of the parties via a single physical path, making sure each pair of parties build their own private communication links with high channel capacity better than any classical scheme.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号