首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Ding  Chao  Wang  Yijun  Zhang  Wei  Li  Zhou  Wu  Zijie  Zhang  Hang 《International Journal of Theoretical Physics》2021,60(4):1361-1373

We propose a novel multi-mode Gaussian modulated continuous variable measurement-device-independent quantum key distribution (MDI-CVQKD) protocol where Alice and Bob prepare independent and identically distributed Gaussian modulated coherent states in multiple independent modes respectively along with Charlie using a traditional noise homodyne detector to measure. Since it is completely handed over to an untrusted third party (Charlie) to measure, this protocol can effectively eliminate the defects of the actual detector. As well as, we also proved that the multi-mode MDI-CVQKD protocol can reduce electronic noise. The simulation results show that the multi-mode Gaussian modulated MDI-CVQKD protocol can indeed significantly improve the key rate of the original Gaussian modulated MDI-CVQKD protocol, and extend the maximum secure transmission distance of the secret key.

  相似文献   

2.
Four-state continuous-variable quantum key distribution (CVQKD) is one of the discretely modulated CVQKD which generates four nonorthogonal coherent states and exploits the sign of the measured quadrature of each state to encode information rather than uses the quadrature \(\hat {x}\) or \(\hat {p}\) itself. It has been proven that four-state CVQKD is more suitable than Gaussian modulated CVQKD in terms of transmission distance. In this paper, we propose an improved four-state CVQKD using an non-Gaussian operation, photon subtraction. A suitable photon-subtraction operation can be exploited to improve the maximal transmission of CVQKD in point-to-point quantum communication since it provides a method to enhance the performance of entanglement-based (EB) CVQKD. Photon subtraction not only can lengthen the maximal transmission distance by increasing the signal-to-noise rate but also can be easily implemented with existing technologies. Security analysis shows that the proposed scheme can lengthen the maximum transmission distance. Furthermore, by taking finite-size effect into account we obtain a tighter bound of the secure distance, which is more practical than that obtained in the asymptotic limit.  相似文献   

3.

Phase estimation and compensation is one of the enabling functionalities in continous-variable quantum key distribution (CVQKD). Recently, a novel CVQKD scheme has been independently proposed to combat the local oscillator (LO) side channel attacks. Furthermore, we have carried out a proof-of-principle experimental study on the feasibility of the CVQKD without sending a LO. However, this scheme contains a serious weakness: The phase noise caused by the two different lasers between the sender and the receiver would severely destroy the quantum signal and finally reduce the secure distance. In this paper, we investigate the optical phase noise and explore the optimal approach to estimate and compensate such kind of noise with appropriate data overhead. Numerical simulations show that our scheme can successfully reconstruct the phase drifts even at low signal-to-noise ratio conditions. We also suggest that a higher accuracy of phase estimation could be achieved by using the frequency division multiplexing scheme. This opens an opportunity to employ advanced pilot-aided phase estimation techniques in quantum communication system.

  相似文献   

4.
International Journal of Theoretical Physics - We propose a new scheme to strengthen the performance of the discrete-modulated continuous-variable measurement-device-independent quantum key...  相似文献   

5.
The intensities of signal and local oscillator (LO) can be elegantly manipulated for the noise-based quantum system while manipulating the wavelength-dependent modulation in source to increase the performance of the continuous-variable key distribution in terms of the secret key rate and maximal transmission distance. The source-based additional noises can be tuned and stabilized to the suitable values to eliminate the effect of the LO fluctuations and defeat the potential attacks in imperfect quantum channels. It is firmly proved that the secret key rate can be manipulated in source over imperfect channels by the intensities of signal and LO with different wavelengths, which have an effect on the optimal signal-to-noise ratio of the heterodyne detectors resulting from the detection efficiency and the additional electronic noise as well. Simulation results show that there is a nice balance between the secret key rate and the maximum transmission distance.  相似文献   

6.
We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect.  相似文献   

7.
8.
The secret key rate is one of the main obstacles to the practical application of continuous-variable quantum key distribution (CVQKD). In this paper, we propose a multiplexing scheme to increase the secret key rate of the CVQKD system with orbital angular momentum (OAM). The propagation characteristics of a typical vortex beam, involving the Laguerre–Gaussian (LG) beam, are analyzed in an atmospheric channel for the Kolmogorov turbulence model. Discrete modulation is utilized to extend the maximal transmission distance. We show the effect of the transmittance of the beam over the turbulent channel on the secret key rate and the transmission distance. Numerical simulations indicate that the OAM multiplexing scheme can improve the performance of the CVQKD system and hence has potential use for practical high-rate quantum communications.  相似文献   

9.
Imperfections in practical detectors,including limited detection efficiency,and inherent electronic noise,can seriously decrease the transmission distance of continuous-variable measurement-device-independent quantum key distribution systems.Owing to the difficulties inherent in realizing a high-efficiency fiber homodyne detector,challenges still exist in continuous-variable measurement-device-independent quantum key distribution system implementation.We offer an alternative approach in an attempt to solve these difficulties and improve the potential for system implementation.Here,a novel practical detector modeling method is utilized,which is combined with a one-time shot-noise-unit calibration method for the purpose of system realization.The new modeling method benefits greatly from taking advantage of one-time shot-noise-unit calibration methods,such as measuring electronic noise and shot noise directly to a novel shot-noise unit,so as to eliminate the statistical fluctuations found in previous methods;this makes the implementation of such systems simpler,and the calibration progress more accurate.We provide a simulation of the secret key rate versus distance with different parameters.In addition,the minimal detection efficiency required at each distance,as well as the contrast between the two methods,are also shown,so as to provide a reference in terms of system realization.  相似文献   

10.
相位调制器与振幅调制器是连续变量量子密钥分发中不可缺少的光调制器件.本文以量子安全通信系统的硬件为平台,设计了LiNbO3相位调制器的驱动电路,性能测试电路,同时给出了振幅调制器的性能监控电路.从理论与实验上对方案的可行性与可靠性进行了验证.  相似文献   

11.
Reconciliation is an essential procedure for continuous-variable quantum key distribution (CV-QKD). As the most commonly used reconciliation protocol in short-distance CV-QKD, the slice error correction (SEC) allows a system to distill more than 1 bit from each pulse. However, the quantization efficiency is greatly affected by the noisy channel with a low signal-to-noise ratio (SNR), which usually limits the secure distance to about 30 km. In this paper, an improved SEC protocol, named Rotated-SEC (RSEC), is proposed through performing a random orthogonal rotation on the raw data before quantization, and deducing a new estimator for the quantized sequences. Moreover, the RSEC protocol is implemented with polar codes. The experimental results show that the proposed protocol can reach up to a quantization efficiency of about 99%, and maintain at around 96% even at the relatively low SNRs (0.5,1), which theoretically extends the secure distance to about 45 km. When implemented with the polar codes with a block length of 16 Mb, the RSEC achieved a reconciliation efficiency of above 95%, which outperforms all previous SEC schemes. In terms of finite-size effects, we achieved a secret key rate of 7.83×103 bits/pulse at a distance of 33.93 km (the corresponding SNR value is 1). These results indicate that the proposed protocol significantly improves the performance of SEC and is a competitive reconciliation scheme for the CV-QKD system.  相似文献   

12.
We demonstrate a multicarrier QKD protocol for continuous-variables (CV) using the orthogonal frequency division multiplexing (OFDM) technique which was employed in frequency domain. The multicarrier communication formulates sub-channels from OFDM technique and physical quantum channel, each dedicated to the transmission of a subcarrier CV. In the OFDM-CVQKD scenario, the input quantum states of the legal parties are granulated into subcarrier CVs, at the receiver, the subcarriers are decoded by an unitary CV operation, which results in the recovered single-carrier CVs. Compared with the device of the multichannel parallel CVQKD protocol that utilizes N arrayed-waveguide gratings (AWG) in optical domain, this protocol shows better feasibility of implementation from both equipment and technique. We derive the formulas of the secret key rate, moreover, analyze the security in the finite-size through the OFDM-CVQKD scheme. Simulation results indicate that the OFDM-CVQKD scheme leads to improved secret key rates and higher tolerable excess noise in comparison to single-carrier CVQKD. Particularly, the secret key rate of the 64 subcarrier CVQKD has increased by roughly an order of magnitude of the single-channel CVQKD, whereas the tolerable excess noise can be controlled in a small range. The results reveal that the OFDM-CVQKD protocol provides a feasible framework for the experimental implementation of an unconditionally secure communication over standard telecommunication networks.  相似文献   

13.
In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that seriously threatens the security of practical QKD systems. In this paper, we propose a new quantum hacking attack on an integrated silicon photonic continuous-variable quantum key distribution (CVQKD) system, which is known as a power analysis attack. This attack can be implemented by analyzing the power originating from the integrated electrical control circuit in state preparation with the help of machine learning, where the state preparation is assumed to be perfect in initial security proofs. Specifically, we describe a possible power model and show a complete attack based on a support vector regression (SVR) algorithm. The simulation results show that the secret key information decreases with the increase of the accuracy of the attack, especially in a situation with less excess noise. In particular, Eve does not have to intrude into the transmitter chip (Alice), and may perform a similar attack in practical chip-based discrete-variable quantum key distribution (DVQKD) systems. To resist this attack, the electrical control circuit should be improved to randomize the corresponding power. In addition, the power can be reduced by utilizing the dynamic voltage and frequency scaling (DVFS) technology.  相似文献   

14.
Atmospheric continuous-variable quantum key distribution (ACVQKD) has been proven to be secure theoretically with the assumption that the signal source is well protected by the sender so that it cannot be compromised. However, this assumption is quite unpractical in realistic quantum communication system. In this work, we investigate a practical situation in which the signal source is no longer protected by the legitimate parts, but is exposed to the untrusted atmospheric channel. We show that the performance of ACVQKD is reduced by removing the assumption, especially when putting the untrusted source at the middle of the channel. To improve the performance of the ACVQKD with the untrusted source, a non-Gaussian operation, called photon subtraction, is subsequently introduced. Numerical analysis shows that the performance of ACVQKD with an untrusted source can be improved by properly adopting the photon subtraction operation. Moreover, a special situation where the untrusted source is located in the middle of the atmospheric channel is also considered. Under direct reconciliation, we find that its performance can be significantly improved when the photon subtraction operation is manipulated by the sender.  相似文献   

15.
Coherent source of continuous-variable quantum key distribution (CV QKD) system may become noisy in practical applications. The security of CV-QKD scheme with the noisy coherent source is investigated under realistic conditions of quantum channel and detector. In particular, two models are proposed to characterize the noisy coherent source through introducing a party (Fred) who induces the noise with an optical amplifier. When supposing the party Fred is untrusted, two lower security bounds to the noise of the coherent source are derived for reverse reconciliation and realistic homodyne and heterodyne detections. While supposing Fred is a neutral party, we derive two tight security bounds without knowing Fred’s exact state for ideal detections. Moreover, the simulation results show that the security of the reverse reconciliation CV-QKD protocols is very sensitive to the noise of coherent source for both the homodyne and heterodyne detections.  相似文献   

16.
The estimation of phase noise of continuous-variable quantum key distribution protocol with a local local oscillator (LLO CVQKD), as a major process in quantifying the secret key rate, is closely relevant to the intensity of the phase reference. However, the transmission of the phase reference through the insecure quantum channel is prone to be exploited by the eavesdropper (Eve) to mount attacks. Here, we introduce a polarization attack scheme against the phase reference. Presently, in a practical LLO CVQKD system, only part of the phase reference pulses are measured to compensate for the polarization drift of the quantum signal pulses in a compensation cycle due to the limited polarization measurement rate, while the other part of the phase reference pulses are not measured. We show that Eve can control the phase noise by manipulating the polarization direction of the unmeasured phase reference to hide her attack on the quantum signal. Simulations show that Eve can obtain partial or total key rates information shared between Alice and Bob as the transmission distance increases. Improving the polarization measurement rate to 100% or monitoring the phase reference intensity in real-time is of great importance to protect the LLO CVQKD from polarization attack.  相似文献   

17.
18.
Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to remove all imperfections originating from detection. However, there are still some inevitable imperfections in a practical CV-MDI QKD system. For example, there is a fluctuating channel transmittance in the complex communication environments. Here we investigate the security of the system under the effects of the fluctuating channel transmittance, where the transmittance is regarded as a fixed value related to communication distance in theory. We first discuss the parameter estimation in fluctuating channel transmittance based on these establishing of channel models, which has an obvious deviation compared with the estimated parameters in the ideal case. Then, we show the evaluated results when the channel transmittance respectively obeys the two-point distribution and the uniform distribution. In particular, the two distributions can be easily realized under the manipulation of eavesdroppers. Finally, we analyze the secret key rate of the system when the channel transmittance obeys the above distributions. The simulation analysis indicates that a slight fluctuation of the channel transmittance may seriously reduce the performance of the system, especially in the extreme asymmetric case. Furthermore, the communication between Alice, Bob and Charlie may be immediately interrupted. Therefore, eavesdroppers can manipulate the channel transmittance to complete a denial-of-service attack in a practical CV-MDI QKD system. To resist this attack, the Gaussian post-selection method can be exploited to calibrate the parameter estimation to reduce the deterioration of performance of the system.  相似文献   

19.
We study the impact of the imperfections and the finite-size effect on the continuous-variable quantum key distribution (CVQKD) protocol with the nondeterministic noiseless linear amplifier (NLA). The imperfections of the homodyne detector and the imperfect amplification process as well as the finite-size effect on parameter estimation procedure are considered. We can see that despite the imperfections of the homodyne detector, the maximum improved transmission distance can still reach the equivalence of 20log10g dB losses theoretically. Moreover, the analysis shows the imperfect amplification process of the NLA will slightly decrease the performance of the system. And we find the finite-size effect significantly influence the secret key rates of the NLA CVQKD protocol and the performance will approach the ideal asymptotic case with the increase of block size.  相似文献   

20.

Gaussian modulation is one of the key steps for the implementation of continuous-variable quantum key distribution (CVQKD) schemes. However, imperfection in the Gaussian modulation may introduce modulation noise that can deteriorate the performance of CVQKD systems. In this paper, we mainly investigate how to improve the performance of a CVQKD system from different aspects. First, we explore the several different origins, impacts and monitoring schemes for the modulation noise in detail. Then, we discuss the practical performance of a CVQKD system with an untrusted noise model and neutral party model, respectively. These analyses indicate that the neutral party model should be reasonably regarded as a general noise model, which will passively and greatly raise the performance of the system. Further, we propose a dynamic auto-bias control scheme to actively resist the modulation noise which comes from the drift of bias point of the amplitude modulator. Together these methods contribute to the improvement of the practical performance of CVQKD systems with imperfect Gaussian modulation.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号