共查询到20条相似文献,搜索用时 15 毫秒
1.
Proof-of-principle experimental demonstration of quantum secure imaging based on quantum key distribution 下载免费PDF全文
《中国物理 B》2019,(10)
We present a quantum secure imaging(QSI) scheme based on the phase encoding and weak+vacuum decoy-state BB84 protocol of quantum key distribution(QKD). It allows us to implement a computational ghost imaging(CGI) system with more simplified equipment and reconstructed algorithm by using a digital micro-mirror device(DMD) to preset the specific spatial distribution of the light intensity. What is more, the quantum bit error rate(QBER) and the secure key rate analytical functions of QKD are used to see through the intercept-resend jamming attacks and ensure the authenticity of the imaging information. In the experiment, we obtained the image of the object quickly and efficiently by measuring the signal photon counts with a single-photon detector(SPD), and achieved a secure key rate of 571.0 bps and a secure QBER of 3.99%, which is well below the lower bound of QBER of 14.51%. Besides, our imaging system uses a laser with invisible wavelength of 1550 nm, whose intensity is as low as single-photon, that can realize weak-light imaging and is immune to the stray light or air turbulence, thus it will become a better choice for quantum security radar against intercept-resend jamming attacks. 相似文献
2.
A frequency-coded quantum key distribution scheme, what we propose here, is that using encoded qubit in different frequency of a photon in four kinds of states. These states satisfy requirements of BB84 protocol and could be produced with the recent advances in technology. Comparing with the scheme proposed in [Bloch et al., Opt. Lett. 32 (2007) 301], our scheme has no intrinsic deficiency that the measurement of one kind of the states will get wrong result with a little probability, and is a perfect BB84 protocol. The characters and feasibility of the scheme are discussed in detail. 相似文献
3.
An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented,based on which we construct a quantum election scheme without the help of an entanglement state.We show that this election scheme ensures the completeness,soundness,privacy,eligibility,unreusability,fairness,and verifiability of a large-scale election in which the administrator and counter are semi-honest.This election scheme can work even if there exist loss and errors in quantum channels.In addition,any irregularity in this scheme is sensible. 相似文献
4.
Kexin Liang Zhengwen Cao Xinlei Chen Lei Wang Geng Chai Jinye Peng 《Frontiers of Physics》2023,18(5):51301
Quantum secure direct communication (QSDC) is a method of communication that transmits secret information directly through a quantum channel. This paper proposes a two-step QSDC scheme based on intermediate-basis, in which the intermediate-basis Einstein−Podolsky−Rosen (EPR) pairs can assist to detect channel security and help encode information. Specifically, the intermediate-basis EPR pairs reduce the probability of Eve choosing the correct measurement basis in the first step, enhancing the security of the system. Moreover, they encode information together with information EPR pairs to improve the transmission efficiency in the second step. We consider the security of the protocol under coherent attack when Eve takes different dimensions of the auxiliary system. The simulation results show that intermediate-basis EPR pairs can lower the upper limit of the amount of information that Eve can steal in both attack scenarios. Therefore, the proposed protocol can ensure that the legitimate parties get more confidential information and improve the transmission efficiency. 相似文献
5.
Experimental long-distance decoy-state quantum key distribution based on polarization encoding 总被引:1,自引:0,他引:1
Peng CZ Zhang J Yang D Gao WB Ma HX Yin H Zeng HP Yang T Wang XB Pan JW 《Physical review letters》2007,98(1):010505
We demonstrate the decoy-state quantum key distribution (QKD) with one-way quantum communication in polarization space over 102 km. Further, we simplify the experimental setup and use only one detector to implement the one-way decoy-state QKD over 75 km, with the advantage to overcome the security loopholes due to the efficiency mismatch of detectors. Our experimental implementation can really offer the unconditionally secure final keys. We use 3 different intensities of 0, 0.2, and 0.6 for the light sources in our experiment. In order to eliminate the influences of polarization mode dispersion in the long-distance single-mode optical fiber, an automatic polarization compensation system is utilized to implement the active compensation. 相似文献
6.
7.
8.
9.
Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum key distribution protocol was proposed based on the qubits.Later on,it was found that quantum continuous variables can also be exploited for this target.The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse.In this article,we review the current status of the continuous variable quantum key distribution research,including its basic principle,experimental implementations,security and future directions;the experimental progress in this field made by our group is also presented. 相似文献
10.
In this paper, we present a two-way quantum dense key distribution protocol.
With double check modes, our scheme is secure regardless of the
presence of noises. And with a quantum teleportation process, secret
message can be encoded deterministically even if the quantum channel is highly
lossy. Therefore, our scheme can be used in a realistic quantum channel
regardless of the presence of noises and channel losses. 相似文献
11.
From Bell's theorem to secure quantum key distribution 总被引:1,自引:0,他引:1
The first step in any quantum key distribution (QKD) protocol consists of sequences of measurements that produce correlated classical data. We show that these correlation data must violate some Bell inequality in order to contain distillable secrecy, if not they could be produced by quantum measurements performed on a separable state of larger dimension. We introduce a new QKD protocol and prove its security against any individual attack by an adversary only limited by the no-signaling condition. 相似文献
12.
An optimized encoding method for secure key distribution by swapping quantum entanglement and its extension 下载免费PDF全文
《中国物理 B》2015,(8)
Song [Song D 2004 Phys. Rev. A69034301] first proposed two key distribution schemes with the symmetry feature.We find that, in the schemes, the private channels which Alice and Bob publicly announce the initial Bell state or the measurement result through are not needed in discovering keys, and Song's encoding methods do not arrive at the optimization.Here, an optimized encoding method is given so that the efficiencies of Song's schemes are improved by 7/3 times. Interestingly, this optimized encoding method can be extended to the key distribution scheme composed of generalized Bell states. 相似文献
13.
14.
15.
ChengXian Zhang BangHong Guo GuangMing Cheng JianJun Guo RongHua Fan 《中国科学:物理学 力学 天文学(英文版)》2014,57(11):2043-2048
We propose a novel quantum key distribution scheme by using the SAM-OAM hybrid entangled state as the physical resource.To obtain this state,the polarization entangled photon pairs are created by the spontaneous parametric down conversion process,and then,the q-plate acts as a SAM-to-OAM transverter to transform the polarization entangled pairs into the hybrid entangled pattern,which opens the possibility to exploit the features of the higher-dimensional space of OAM state to encode information.In the manipulation and encoding process,Alice performs the SAM measurement by modulating the polarization stateπ lθx on one photon,whereas Bob modulates the OAM sector state lx' on the other photon to encode his key elements using the designed holograms which is implemented by the computer-controlled SLM.With coincidence measurement,Alice could extract the key information.It is showed that N-based keys can be encoded with each pair of entangled photon,and this scheme is robust against Eve’s individual attack.Also,the MUBs are not used.Alice and Bob do not need the classical communication for the key recovery. 相似文献
16.
We demonstrate that a necessary precondition for an unconditionally secure quantum key distribution is that both sender and receiver can use the available measurement results to prove the presence of entanglement in a quantum state that is effectively distributed between them. One can thus systematically search for entanglement using the class of entanglement witness operators that can be constructed from the observed data. We apply such analysis to two well-known quantum key distribution protocols, namely, the 4-state protocol and the 6-state protocol. As a special case, we show that, for some asymmetric error patterns, the presence of entanglement can be proven even for error rates above 25% (4-state protocol) and 33% (6-state protocol). 相似文献
17.
A long-distance quantum key distribution scheme based on pre-detection of optical pulse with auxiliary state 下载免费PDF全文
《中国物理 B》2015,(5)
We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be changed. The circuit can be treated as a pre-detection device. Equipping the pre-detection device in the front of the receiver of the quantum key distribution(QKD) can reduce the influence of the dark count of the detector, hence increasing the secure communication distance significantly. Simulation results show that the secure communication distance can reach 516 km and 479 km for QKD with perfect single photon source and decoy-state QKD with weak coherent photon source, respectively. 相似文献
18.
19.
《中国科学:物理学 力学 天文学(英文版)》2016,(1)
Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth(PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check(LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and quasi-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%. 相似文献
20.
An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is shown that the proposed scheme is secure against several well-known attacks.Specifically,it can stand against the receiver’s disavowal attack.Moreover,compared with previous relevant arbitrated quantum signature schemes,the scheme proposed has the advantage of less transmission complexity. 相似文献