共查询到20条相似文献,搜索用时 11 毫秒
1.
2.
近年来, PM2.5大气污染日益严重, 不仅影响空气质量与大气能见度, 而且还会对自由空间量子光信号的传输造成影响. 然而, 有关PM2.5与自由空间量子通信信道参数关系的研究, 迄今尚未展开. 本文根据PM2.5粒度谱分布函数及其化学成分的消光份额, 提出了PM2.5指数、大气湿度与自由空间量子信道衰减的关系; 针对幅值阻尼信道和退极化信道, 分别建立了PM2.5污染程度与信道容量、信道平均保真度、信道误码率的定量关系. 仿真结果表明, 当大气湿度为30%, PM2.5指数分别为50和300时, 自由空间量子通信信道容量、信道平均保真度、信道误码率分别依次为0.83和0.21, 0.91和0.56, 0.0048和0.0192. 由此可见, PM2.5污染程度对自由空间量子通信性能有显著的影响. 因此, 为了提高自由空间量子通信的可靠性, 应根据PM2.5大气污染状况, 自适应调整系统的各项参数. 相似文献
3.
In this paper, we propose an experimental scheme for unambiguous
quantum state comparison assisted by linear optical manipulations,
twin-photons produced from parametric down-conversion, and
postselection from the coincidence measurement. In this scheme the
preparation of the general two mixed qubit states with arbitrary
prior probabilities and the realization of the optimal POVMs for
unambiguous quantum state comparison are presented. This proposal is
feasible by current experimental technology, and may be used in
single-qubit quantum fingerprinting. 相似文献
4.
量子保密通信包括量子密钥分发、量子安全直接通信和量子秘密共享等主要形式.在量子密钥分发和秘密共享中,传输的是随机数而不是信息,要再经过一次经典通信才能完成信息的传输.在量子信道直接传输信息的量子通信形式是量子安全直接通信.基于量子隐形传态的量子通信(简称量子隐形传态通信)是否属于量子安全直接通信尚需解释.构造了一个量子隐形传态通信方案,给出了具体的操作步骤.与一般的量子隐形传态不同,量子隐形传态通信所传输的量子态是计算基矢态,大大简化了贝尔基测量和单粒子操作.分析结果表明,量子隐形传态通信等价于包含了全用型量子密钥分发和经典通信的复合过程,不是量子安全直接通信,其传输受到中间介质和距离的影响,所以不比量子密钥分发更有优势.将该方案与量子密钥分发、量子安全直接通信和经典一次性便笺密码方案进行对比,通过几个通信参数的比较给出各个方案的特点,还特别讨论了各方案在空间量子通信方面的特点. 相似文献
5.
基于差分编码方式提出一种改进方案.在Alice端用光纤马赫-曾德干涉仪产生双脉冲差分信号;在Bob端,用双法拉第反射式麦克尔逊干涉仪代替光纤马赫-曾德干涉仪,这种干涉仪能自动补偿环境引起的偏振抖动和光纤双折射引起的相位漂移,从而提高系统稳定性.双协议(即双脉冲差分协议联合BB84协议)的使用,增强了系统的安全性.该系统具有高效、安全、简洁、稳定等优点,在实验上实现了长期稳定的密钥分发和量子保密通信,误码率<5%,传输距离达80km. 相似文献
6.
Balancing four-state continuous-variable quantum key distribution with linear optics cloning machine 下载免费PDF全文
We show that the secret key generation rate can be balanced with the maximum secure distance of four-state continuous-variable quantum key distribution(CV-QKD) by using the linear optics cloning machine(LOCM). Benefiting from the LOCM operation, the LOCM-tuned noise can be employed by the reference partner of reconciliation to achieve higher secret key generation rates over a long distance. Simulation results show that the LOCM operation can flexibly regulate the secret key generation rate and the maximum secure distance and improve the performance of four-state CV-QKD protocol by dynamically tuning parameters in an appropriate range. 相似文献
7.
8.
9.
Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum key distribution protocol was proposed based on the qubits.Later on,it was found that quantum continuous variables can also be exploited for this target.The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse.In this article,we review the current status of the continuous variable quantum key distribution research,including its basic principle,experimental implementations,security and future directions;the experimental progress in this field made by our group is also presented. 相似文献
10.
11.
In this paper an efficient quantum secure direct communication (QSDC) scheme with
authentication is presented, which is based on quantum entanglement and
polarized single photons. The present protocol uses Einstein--Podolsky--Rosen
(EPR) pairs and polarized
single photons in batches. A particle of the EPR pairs is retained
in the sender's station, and the other is transmitted forth and back
between the sender and the receiver, similar to the `ping--pong'
QSDC protocol. According to the shared information beforehand, these
two kinds of quantum states are mixed and then transmitted via a
quantum channel. The EPR pairs are used to transmit secret messages
and the polarized single photons used for authentication and
eavesdropping check. Consequently, because of the dual contributions
of the polarized single photons, no classical information is needed.
The intrinsic efficiency and total efficiency are both 1 in this
scheme as almost all of the instances are useful and each EPR pair
can be used to carry two bits of information. 相似文献
12.
13.
14.
基于改造的弱相干态光源,提出了一种非正交编码被动诱骗态量子密钥分配方案.该方案不主动制备诱骗态,而是根据发送端探测器是否响应,将接收端的探测结果分为响应集合和未响应集合,以此分别作为信号态和诱骗态,并利用这两个集合来估计参量和生成密钥.数值仿真表明,非正交编码被动诱骗态方案的密钥生成效率和安全传输距离都优于现有的被动诱骗态方案,且性能非常接近主动无穷诱骗态方案的理论极限值;未响应集合对密钥生成的参与使方案性能免受发送端探测效率的影响,弥补了实际探测器探测效率低下的缺陷;由于不需要主动制备诱骗态,该方案实现非常简单,适用于高速量子密钥分配的场合.
关键词:
量子光学
量子密钥分配
被动诱骗态
密钥生成效率 相似文献
15.
Djeylan Aktas Bruno Fedrici Florian Kaiser Tommaso Lunghi Laurent Labont Sbastien Tanzilli 《Laser \u0026amp; Photonics Reviews》2016,10(3):451-457
Granting information privacy is of crucial importance in our society, notably in fiber communication networks. Quantum cryptography provides a unique means to establish, at remote locations, identical strings of genuine random bits, with a level of secrecy unattainable using classical resources. However, several constraints, such as non‐optimized photon number statistics and resources, detectors' noise, and optical losses, currently limit the performances in terms of both achievable secret key rates and distances. Here, these issues are addressed using an approach that combines both fundamental and off‐the‐shelves technological resources. High‐quality bipartite photonic entanglement is distributed over a 150 km fiber link, exploiting a wavelength demultiplexing strategy implemented at the end‐user locations. It is shown how coincidence rates scale linearly with the number of employed telecommunication channels, with values outperforming previous realizations by almost one order of magnitude. Thanks to its potential of scalability and compliance with device‐independent strategies, this system is ready for real quantum applications, notably entanglement‐based quantum cryptography.
16.
为了提高自由空间光通信系统的光纤耦合效率,介绍了一种新颖的基于盲优化波前校正的自适应光学系统。该系统不使用波前传感器,而是在信号进入接收端前,将畸变光信号分束后送入光电探测器,进行耦合效率计算;采用耦合效率的估计公式斯特列尔比为目标函数,用随机并行梯度优化算法最大化目标函数,以实时控制变形镜,从而使耦合进入单模光纤的光达到最优。数值结果表明,此系统能使光纤耦合效率从6%提高到约60%。 相似文献
17.
Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key 下载免费PDF全文
Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios,also have the problem of device imperfections like finite-length keys. In this paper, based on the WCP source which can be used for the passive decoy-state method, we obtain the expressions of single-photon error rates, single-photon counts, and phase error rates. According to the information of smooth min-entropy, we calculate the key generation rate under the condition of finite-length key. Key generation rates with different numbers of pulses are compared by numerical simulations. From the results, it can be seen that the passive decoy-state method can have good results if the total number of pulses reaches 1010. We also simulate the passive decoy-state method with different probabilities of choosing a pulse for parameter estimation when the number of pulses is fixed. 相似文献
18.
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty’s theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss. 相似文献
19.
Influence of multi-photon pulses on practical differential-phase-shift quantum key distribution 下载免费PDF全文
The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.[第一段] 相似文献
20.
提出了一种改进的基于时间和相位混合编码的量子密钥分发方案, 并进行了实验研究.在以BB84协议为基础的相位编码量子密钥分发系统上, 利用了系统中原来舍弃的脉冲进行时间编码, 使成码率提高为原方案的二倍. 系统同时获得时间编码密钥和相位编码密钥, 现在可以将两组密钥组合成新密钥, 提高了成码率和监测窃听灵敏度. 同时在系统的接收端用双FM反射式干涉仪代替传统的光纤M-Z干涉仪,提高了系统的稳定性. 实验上已实现90km光纤量子密钥分发, 实验表明本系统具有安全性高,稳定性好,成本低的优点.
关键词:
量子保密通信
量子密钥分发
相位编码
时间编码 相似文献