首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 20 毫秒
1.
Tao Liu 《中国物理 B》2022,31(11):110303-110303
Atmospheric effects have significant influence on the performance of a free-space optical continuous variable quantum key distribution (CVQKD) system. In this paper, we investigate how the transmittance, excess noise and interruption probability caused by atmospheric effects affect the secret-key rate (SKR) of the CVQKD. Three signal wavelengths, two weather conditions, two detection schemes, and two types of attacks are considered in our investigation. An expression aims at calculating the interruption probability is proposed based on the Kolmogorov spectrum model. The results show that a signal using long working wavelength can propagate much further than that of using short wavelength. Moreover, as the wavelength increases, the influence of interruption probability on the SKR becomes more significant, especially within a certain transmission distance. Therefore, interruption probability must be considered for CVQKD by using long-signal wavelengths. Furthermore, different detection schemes used by the receiver will result in different transmission distances when subjected to individual attacks and collective attacks, respectively.  相似文献   

2.
东晨  赵尚弘  张宁  董毅  赵卫虎  刘韵 《物理学报》2014,63(20):200304-200304
刻画了奇相干光源的光子数分布特征,研究了奇相干光源下诱骗态测量设备无关量子密钥分配系统的密钥生成率与安全传输距离的关系,推导了奇相干光源下的计数率下界和误码率上界.仿真结果表明,奇相干光源光子数分布中多光子脉冲的比例低于弱相干光,可以有效提高诱骗态测量设备无关密钥分配系统的最大安全通信距离,为实用的量子密钥分配实验提供了重要的理论参数.  相似文献   

3.
吴承峰  杜亚男  王金东  魏正军  秦晓娟  赵峰  张智明 《物理学报》2016,65(10):100302-100302
测量设备无关量子密钥分发系统能够抵御任何针对单光子探测器边信道的攻击, 进一步结合诱惑态的方案, 可以同时规避准单光子源引起的实际安全漏洞. 测量设备无关量子密钥分发系统中, 非对称传输、分束器的不对称以及各个单光子探测器存在实际参数差异等光学系统的具体实现特征会对系统误码率和成码率等性能产生一定的影响. 本文针对采用弱相干光源的测量设备无关量子密钥分发系统, 引入单光子探测器品质因子的实验参数(暗计数与探测效率的比值), 通过量子化描述, 理论推导并模拟了误码率与单光子探测器品质因子、分束器反射率以及通信双方弱相干光源平均光子数之间的关系. 结果表明: 在X基偏振编码 和相位编码系统中, 当分束器的反射率趋近于0.5时, 误码率取最小值; 在偏振编码和相位编码系统中, 误码率随着单光子探测器品质因子的增大而增大; 在Z基偏振编码系统中, 误码率随分束器的反射率的变化会呈现较小的波动, 当分束器的反射率为0.5时, 若通信双方采用的平均光子数相差较大, 则误码率取最大值; 分束器的反射率和平均光子数对误码率的影响在Z基情况下不能等同, 但是对于X基编码和相位编码却能等同.  相似文献   

4.
谷文苑  赵尚弘  东晨  朱卓丹  屈亚运 《物理学报》2019,68(9):90302-090302
研究了K分布强湍流下自由空间测量设备无关量子密钥分发协议模型,采用阈值后选择方法来减少大气湍流对密钥生成率的影响,对比分析了使用阈值后选择方法前后协议的密钥率和湍流强度之间的关系.仿真结果表明,使用阈值后选择方法可以有效地提高协议的密钥生成率,尤其是在高损耗和强湍流区域,而且其最佳阈值与湍流强度、信道平均损耗有关,对实际搭建性能较好的自由空间测量设备无关量子密钥分发协议系统具有一定的参考价值.  相似文献   

5.
杜亚男  解文钟  金璇  王金东  魏正军  秦晓娟  赵峰  张智明 《物理学报》2015,64(11):110301-110301
测量设备无关量子密钥分发系统可以免疫任何针对探测器边信道的攻击, 并进一步结合诱惑态方法规避了准单光子源引入的实际安全性问题. 目前实验中一般采用弱相干光源, 但是该光源含有一定比例的空脉冲和多光子脉冲. 本文针对弱相干光源的具体特性, 采用量子力学的描述, 将各个器件进行量子化处理, 并同时考虑探测器的具体性能参数的影响, 分别给出了通信双方各自发送的脉冲含有特定光子数时产生的成功贝尔态和错误贝尔态的概率公式, 从理论上对相位编码和偏振编码测量设备无关量子密钥分发系统的误码率进行了定量分析, 分别推导并模拟了通信双方采用的平均光子数对称和不对称时误码率随传输距离的变化情况, 结果表明在偏振编码Z基中, 多光子脉冲不会引起误码; 在偏振编码X基和相位编码中, 受多光子影响, 产生的误码率较大. 对于不同的编码方式, 误码率均随传输距离的增加有不同程度的升高, 长距离传输时, 平均光子数越小, 产生的误码率越大; 在偏振编码X基和相位编码的短距离传输中, 相对于对称, 通信双方采用的平均光子数不对称时产生的误码率较大.  相似文献   

6.
长距离长期稳定的量子密钥分发系统   总被引:6,自引:0,他引:6       下载免费PDF全文
介绍了最近完成的长距离长期稳定的量子密钥分发系统.该系统利用往返光路补偿光纤偏振 抖动和相位漂移的原理,采用结电容平衡魔T网络耦合的单光子探测技术,在506km单模 光纤中实现了长时间(大于12h)稳定的量子密钥分发实验.单脉冲平均光子数为007, 误码率为4%,其中单光子探测器的探测效率大于5%,单脉冲暗计数低于29×10-6. 关键词: 量子保密通信 量子密钥分发 单光子探测  相似文献   

7.
Measurement-device-independent quantum key distribution(MDI-QKD)provides us a powerful approach to resist all attacks at detection side.Besides the unconditional security,people also seek for high key generation rate,but MDI-QKD has relatively low key generation rate.In this paper,we provide an efficient approach to increase the key generation rate of MDI-QKD by adopting multiple degrees of freedom(DOFs)of single photons to generate keys.Compared with other high-dimension MDI-QKD protocols encoding in one DOF,our protocol is more flexible,for our protocol generating keys in independent subsystems and the detection failure or error in a DOF not affecting the information encoding in other DOFs.Based on above features,our MDI-QKD protocol may have potential application in future quantum comniunication field.  相似文献   

8.
Xiao-Ming Chen 《中国物理 B》2022,31(12):120304-120304
The existing decoy-state quantum key distribution (QKD) beating photon-number-splitting (PNS) attack provides a more accurate method to estimate the secure key rate, while it still considers that only single-photon pulses can generate secure keys in any case. However, multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel. The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks. In particular, the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users. In this paper, under the null hypothesis of no weaker version of PNS attack, we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols, extract a Cauchy distribution statistic, and further provide a detection method and the type I error probability. If the result is judged to be an attack, we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate. Otherwise, the pulses with the same basis received including both single-photon pulses and multiphoton pulses, can be used to generate the keys and we give the secure key rate in this case. Finally, the associated experiments we performed (i.e., the significance level is 5%) show the correctness of our method.  相似文献   

9.
Compared with full device-independent quantum key distribution(DI-QKD), one-side device-independent QKD(1s DI-QKD) needs fewer requirements, which is much easier to meet. In this paper, by applying recently developed novel time–energy entropic uncertainty relations, we present a time–energy high-dimensional one-side device-independent quantum key distribution(HD-QKD) and provide the security proof against coherent attacks. Besides, we connect the security with the quantum steering. By numerical simulation, we obtain the secret key rate for Alice's different detection efficiencies. The results show that our protocol can performance much better than the original 1s DI-QKD. Furthermore, we clarify the relation among the secret key rate, Alice's detection efficiency, and the dispersion coefficient. Finally, we simply analyze its performance in the optical fiber channel.  相似文献   

10.
相干光脉冲位置调制信道容量及传信率最大化研究   总被引:2,自引:0,他引:2  
分析了相干光脉冲位置调制的信道容量及传信率最大化条件.通过分析光外差接收的脉冲位置调制信号具有的概率分布特性,推导出采用最大似然检测的相干脉冲位置调制信道具有的转移概率矩阵和信道容量,证明在检测器散粒噪声极限假设下,信道容量只取决于接收脉冲能量和脉冲位置调制阶数.利用Jensen不等式化简信道容量得到其下限,该下限能够近似实际通信链路的信道容量.基于此估计出达到最高传信率时的脉冲位置调制阶数同粒子数反转的重建时间之间的关系,给出了二者在一定范围内的一般映射.数值仿真表明,在接收能量使信道误码率优于10-2时,估箅出的脉冲位置调制阶数能够使传信率接近最大值.  相似文献   

11.
独立推导预报单光子源诱骗态量子密钥分发的密钥产生率计算公式,讨论密钥产生率和发送端探测效率的关系;进行弱相干光和预报单光子源诱骗态量子密钥分发的最优强度估计和密钥产生率数值计算.结果表明,预报单光子源诱骗态量子密钥分发的密钥产生率随着发送端探测效率的增加而增加,其安全通信距离与完美单光子源的通信距离一致;诱骗态量子密钥分发可提高安全通信距离和密钥产生率;预报单光子源由于减少了暗计数的影响,进一步提高了安全通信距离.  相似文献   

12.
宋汉冲  龚黎华  周南润 《物理学报》2012,61(15):154206-154206
基于量子远程通信的原理, 本文借助双模压缩真空态和相干态, 提出一种连续变量量子确定性密钥分配协议. 在利用零差探测法的情况下协议的传输效率达到了100%. 从信息论的角度分析了协议的安全性, 结果表明该协议可以安全传送预先确定的密钥. 在密钥管理中, 量子确定性密钥分配协议具有量子随机性密钥分配协议不可替代的重要地位和作用. 与离散变量量子确定性密钥分配协议相比, 该协议分发密钥的速率和效率更高, 又协议中用到的连续变量量子态易于产生和操控、适于远距离传输, 因此该协议更具有实际意义.  相似文献   

13.
光纤耦合对量子密钥分配系统光子探测的影响   总被引:1,自引:1,他引:0  
陈彦  邓科  胡渝 《光学学报》2007,27(8):1401-1404
借助量子密码术和卫星可以实现全球性的保密通信网络。但使用现有的单光子探测模块搭建星地量子密钥分配(QKD)系统,接收端就面临着空间光-多模光纤耦合的技术挑战。空间光-多模光纤耦合条件对星地量子密钥分配系统的跟瞄精度提出了严格要求。理论分析和定量计算表明,跟瞄精度ε与光束发散角θdiv的比值ε/dθiv≤0.5时,星地量子密钥分配系统的光子探测概率较高,系统可以正常工作;ε/dθiv≤0.1时,系统处于量子密钥产生速率为几kb/s的更理想状况。采用短波长更有利于满足空间光-多模光纤耦合条件,同时有利于系统获得更高的密钥产生速率。  相似文献   

14.
Measurement-device-independent quantum key distribution (MDI-QKD) is innately immune to all detection-side attacks. Due to the limitations of technology, most MDI-QKD protocols use weak coherent photon sources (WCPs), which may suffer from a photon-number splitting (PNS) attack from eavesdroppers. Therefore, the existing MDI-QKD protocols also need the decoy-state method, which can resist PNS attacks very well. However, the existing decoy-state methods do not attend to the existence of PNS attacks, and the secure keys are only generated by single-photon components. In fact, multiphoton pulses can also form secure keys if we can confirm that there is no PNS attack. For simplicity, we only analyze the weaker version of a PNS attack in which a legitimate user’s pulse count rate changes significantly after the attack. In this paper, under the null hypothesis of no PNS attack, we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state MDI-QKD protocols via statistical hypothesis testing, extract a normal distribution statistic, and provide a detection method and the corresponding Type I error probability. If the result is judged to be an attack, we use the existing decoy-state method to estimate the secure key rate. Otherwise, all pulses with the same basis leading to successful Bell state measurement (BSM) events including both single-photon pulses and multiphoton pulses can be used to generate secure keys, and we give the formula of the secure key rate in this case. Finally, based on actual experimental data from other literature, the associated experimental results (e.g., the significance level is 5%) show the correctness of our method.  相似文献   

15.
杨芳丽  郭迎  石金晶  王焕礼  潘矜矜 《中国物理 B》2017,26(10):100303-100303
A modified continuous-variable quantum key distribution(CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator(LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection.  相似文献   

16.
In a quantum key distribution(QKD)system,the error rate needs to be estimated for determining the joint probability distribution between legitimate parties,and for improving the performance of key reconciliation.We propose an efficient error estimation scheme for QKD,which is called parity comparison method(PCM).In the proposed method,the parity of a group of sifted keys is practically analysed to estimate the quantum bit error rate instead of using the traditional key sampling.From the simulation results,the proposed method evidently improves the accuracy and decreases revealed information in most realistic application situations.  相似文献   

17.
High‐precision measurement of X‐ray spectra is affected by the statistical fluctuation of the X‐ray beam under low‐counting‐rate conditions. It is also limited by counting loss resulting from the dead‐time of the system and pile‐up pulse effects, especially in a high‐counting‐rate environment. In this paper a detection system based on a FAST‐SDD detector and a new kind of unit impulse pulse‐shaping method is presented, for counting‐loss correction in X‐ray spectroscopy. The unit impulse pulse‐shaping method is evolved by inverse deviation of the pulse from a reset‐type preamplifier and a C‐R shaper. It is applied to obtain the true incoming rate of the system based on a general fast–slow channel processing model. The pulses in the fast channel are shaped to unit impulse pulse shape which possesses small width and no undershoot. The counting rate in the fast channel is corrected by evaluating the dead‐time of the fast channel before it is used to correct the counting loss in the slow channel.  相似文献   

18.
The counting systems consisting of electronic devices are used for detection of radiation due to X or gamma rays. The dead time of the counting system is based on time limitations of these electronic devices. The dead time causes counting losses. Determination of counting rate losses in quantitative and qualitative analysis become a vital step for correction of analysis. Therefore, compensating for counting rate losses is of great importance. These counting rate losses are due to piled up reject time, paralyzable or non-paralyzable system dead time or a combination of these mechanisms. Paralyzable and non-paralyzable models are well-known and frequently used for correction of counting rate losses dependent on the system dead time. However, these two models do not provide enough correction at medium and high counting rates. Therefore, the new models for corrections of counting rate losses are needed. For this reason, both an alternative approach is proposed and a simulation program is coded for counting rate losses in this study. A good agreement is obtained between theoretical model and simulation program.  相似文献   

19.
一种稳定的自由空间量子密钥分配实验系统   总被引:2,自引:0,他引:2  
基于量子密钥分配的基本原理,采用B92方案,以单光子作为信息载体,使用极化编码,搭建了一个简单易行的实验装置,实现了自由空间传输的量子密钥分配,平均每脉冲光子数为0.1,粗码率12.7kbits/s,误码率4%左右。  相似文献   

20.
与单光子量子密钥分配采用单光子探测器不同,连续变量量子密钥分配采用平衡零拍测量技术.分析了由于参考光的真空噪声、分束器的透射率和反射率不相等引入的平衡零拍测量误差,以及平衡零拍测量探测器的电子噪声对连续变量量子密钥传输的最大安全距离的限制,给出了平衡零拍测量的探测噪声、电子噪声和密钥量之间的定量表达式.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号