首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 71 毫秒
1.
随着水下无线通信的发展,关于海洋环境量子通信的研究也逐渐成为热点。其中,研究海洋气泡对光量子在水下传输的影响具有重要意义。为了研究海洋气泡对水下量子通信信道性能的影响,根据海洋气泡的粒径分布模型,研究了气泡的散射特性,并根据气泡的消光系数,分析了不同条件参数对链路衰减、纠缠度、信道容量以及信道误码率的影响,并进行了仿真实验。结果表明:气泡浓度和传输距离的增大,使链路衰减和误码率增加,对于幅值阻尼信道、退极化信道和比特翻转信道,其信道容量均有所减小;随着气泡半径的增大、深度的减小,信道纠缠度降低。由此可见,海洋气泡对量子通信性能的影响不可忽略,在实际应用中为了保障水下量子通信的传输效率,应适当调节水下量子通信相关参数,减小海洋气泡环境对通信系统的影响。  相似文献   

2.
为研究海冰对水下量子通信信道性能的影响,基于海冰在不同的密度、盐度下的吸收与散射特性,建立了海冰参数与消光系数之间的关系、光量子信号衰减模型;根据海冰在不同密度、盐度下的消光特性,分别建立海冰参数与信道利用率、量子密钥分配系统误码率、系统成码率之间的关系并进行数据仿真。理论分析与仿真结果可为海冰环境下的水下量子通信设计提供参考。  相似文献   

3.
张秀再  翟梦思  周丽娟 《光学学报》2021,41(11):191-199
为了研究黑碳气溶胶对星地量子通信性能及传输质量的影响,根据黑碳气溶胶的复折射率及米氏散射理论得到其消光效率因子,分析了黑碳气溶胶粒子数浓度对量子通信链路衰减、信道容量、信道生存函数以及信道误码率的影响,并进行了仿真实验.结果表明,当传输距离为2 km,黑碳气溶胶粒子数浓度由1.2×107 m-3增加至3.6×107 m...  相似文献   

4.
聂敏  潘越  杨光  孙爱晶  禹赛雅  张美玲  裴昌幸 《物理学报》2018,67(14):140305-140305
涌浪运动是非均匀水流中的一种非线性运动,是常见的海洋运动形式之一.在进行水下量子通信时,会对光量子信号的传输造成极大的影响.然而,有关涌浪运动造成量子通信信道参数变化的研究,迄今尚未展开.为了研究涌浪运动对水下量子通信性能的影响,首先对涌浪运动的传播建立了数学模型并分析了其频谱特性.针对退极化信道,提出了涌浪运动与水下量子通信信道纠缠和信道容量的定量关系,并对量子密钥分发过程中误码率的影响进行了分析.仿真结果表明,当海面风速在0—20.5 m/s变化时,随着传播周期逐渐增大,信道纠缠度由0.0012逐渐增加到0.8426,信道容量由0.8736减小到0.1024,密钥分发过程中,量子误码率由0.1651增加到0.4812.由此可见,涌浪运动对于水下量子通信性能有着明显的影响.因此,在进行水下量子通信时,应根据涌浪运动的不同程度,自适应调整系统参数.  相似文献   

5.
为了研究海洋非色素团聚颗粒对水下量子通信性能的影响,基于Mie散射理论和Gordon模型,分析了非色素团聚颗粒的散射与吸收特性。针对不同波长的光信号,建立了海洋非色素团聚颗粒质量浓度与链路衰减、量子安全密钥产生率、信道建立速率、幅值阻尼信道容量之间的关系模型并进行了仿真。结果表明,当采用波长为580 nm的光信号进行水下量子通信、传输距离为2 km、海洋非色素团聚颗粒的质量浓度为1.2 mg/L时,对应的链路衰减、量子安全密钥产生率和幅值阻尼信道容量分别为1.659、8.295×10-5和0.486;保真度为0.899时,量子信道建立速率为58.2 pair/s。该仿真结果可为海洋环境中量子通信系统的设计与优化提供参考依据。  相似文献   

6.
张秀再  徐茜  刘邦宇 《光学学报》2021,41(20):172-178
卷云对量子通信光信号的传输有极大的影响.根据卷云特性建立了卷云冰晶粒子的分布模型,研究了卷云的消光特性,并根据卷云的散射特性,分析了卷云冰水含量、传输距离、链路消光特性、信道容量和信道纠缠度衰减的定量关系,研究了噪声影响下隐形传态保真度的变化,并进行了仿真实验.实验结果表明,当传输距离为3 km时,在卷云冰水含量(体积质量)为0.4g·m-3的条件下,对应的链路衰减、信道容量和信道纠缠度分别为0.05 dB· km-1、0.94 dB· km-1和0.52,而在卷云冰水含量(体积质量)为0.1g·m-3的条件下,对应的链路衰减、信道容量和信道纠缠度分别为0.20 dB·km-1、0.82 dB· km-1和0.07.由实验结果可见,自南空间量子通信信道的性能在卷云的影响下均发生了不同程度的变化.因此,在进行量子通信时,需考虑卷云的影响,根据卷云的变化调整性能参数,以提高通信质量.  相似文献   

7.
8.
为了研究尘埃等离子体中带电尘埃的粒子半径、粒子浓度和带电荷数对量子通信性能的影响,首先根据Mie散射理论得到单个带电尘埃粒子的光散射截面;然后通过粒子浓度求出总的消光截面,得出链路衰减的数学模型,提出了带电粒子特性与量子纠缠度的关系;针对退极化信道,当单个尘埃粒子所吸附带电粒子的个数为50时,给出了尘埃粒子半径、粒子浓度与信道容量和量子误码率的定量关系.仿真结果表明,当量子信号的传输距离为10km时,尘埃粒子浓度从1×10~(10) m~(-3)增加到10×10~(10) m~(-3),信道容量从0.6726降低到0.1075;尘埃粒子半径从0.1μm增加到10μm时,量子误码率由1.334×10~(-3)增加到5.309×10~(-3).由此可见,尘埃等离子体中带电尘埃粒子的半径和浓度对量子卫星通信性能有显著的影响.因此,为确保量子通信的可靠性,应根据所探测到的等离子体环境的状况,调整卫星通信系统的各项指标参数.  相似文献   

9.
聂敏  任杰  杨光  张美玲  裴昌幸 《物理学报》2015,64(15):150301-150301
近年来, PM2.5大气污染日益严重, 不仅影响空气质量与大气能见度, 而且还会对自由空间量子光信号的传输造成影响. 然而, 有关PM2.5与自由空间量子通信信道参数关系的研究, 迄今尚未展开. 本文根据PM2.5粒度谱分布函数及其化学成分的消光份额, 提出了PM2.5指数、大气湿度与自由空间量子信道衰减的关系; 针对幅值阻尼信道和退极化信道, 分别建立了PM2.5污染程度与信道容量、信道平均保真度、信道误码率的定量关系. 仿真结果表明, 当大气湿度为30%, PM2.5指数分别为50和300时, 自由空间量子通信信道容量、信道平均保真度、信道误码率分别依次为0.83和0.21, 0.91和0.56, 0.0048和0.0192. 由此可见, PM2.5污染程度对自由空间量子通信性能有显著的影响. 因此, 为了提高自由空间量子通信的可靠性, 应根据PM2.5大气污染状况, 自适应调整系统的各项参数.  相似文献   

10.
量子卫星星舰通信是量子保密通信的重要应用场景之一,在海面上,由于不同风速所引起的气溶胶粒子浓度发生剧烈变化,而气溶胶粒子浓度的剧变,必然导致星舰量子链路性能的剧烈衰减.然而,有关不同海面风速与量子卫星星舰通信信道参数关系的研究,迄今尚未展开.本文根据海面风速与气溶胶的Gras模型,分别建立了风速与星舰量子信道误码率、信...  相似文献   

11.
Journal of Russian Laser Research - Quantum satellite communication has advantages of reliability and unconditional safety; it is very important in the field of national military security. When...  相似文献   

12.
为了研究混合粒子的不同混合方式对星地量子卫星通信的影响,根据灰霾粒子与水云粒子的谱分布函数,以及不同混合方式下的消光系数,提出了外混合方式中星地量子信道衰减的计算关系,建立了内混合方式中的Core-shell信道衰减模型;分析了在不同混合方式下,混合粒子的粒径比与信道平均保真度、信道误码率之间的定量关系.仿真结果表明,当混合粒子的粒径比分别为0.2和0.8时,外混合粒子对应信道容量、信道平均保真度、信道误码率分别为0.39和0.27,0.8和0.8,0.003和0.009;内混合粒子对应信道容量、信道平均保真度、信道误码率分别为0.8和0.21,0.94和0.81,0.018和0.021.由此可见,灰霾粒子和水云粒子的不同混合方式对量子卫星通信性能的影响有显著差别.因此,在实际的量子卫星通信系统中,应根据混合粒子的不同混合方式自适应调整系统的各项参量,以提高星地量子通信链路的可靠性.  相似文献   

13.
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel.  相似文献   

14.
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel, quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel  相似文献   

15.
Since the original Cai-Li protocol [Chin. Phys. Lett. 21 (2004)601] can be used only in an ideal quantum communication, we present the modified Cai-Li protocol that can be used in the a noisy quantum channel by using Calderbank-Shor-Steane (CSS) codes to correct errors. We also give a tight bound on the connection between information Eve eavesdropped with a measurement attack in line B → A and detection probability,which shows that the Cai-Li protocol can be used as a quasisecure direct quantum communication.  相似文献   

16.
In this paper, we propose a novel multi-user access in wireless optical communication based on the quantum detection of the coherent state. In this case, the coherent states are used as the signal carrier and a technique of quantum detection is applied to distinguish between signals from different users. To accomplish this task, two main quantum measurement methods are introduced; one is minimum error discrimination (MED), and the other is unambiguous state discrimination (USD). The theoretical derivation implies that the two methods can both distinguish between the signals from different users efficiently when the average photon number is large enough. Typically, the numerical result shows that in the two-user case, the channel capacity will approach the theoretical maximum limit when the average photon number is greater than 2.5 for MED and 5 for USD in the absence of noise. The MED gains more channel capacity than the USD at the same average photon number. However, the USD wins the error-correction scene with its free-error capability. Furthermore, the detection error probability and channel capacity for the USD with the thermal noise are examined. The result shows that increasing the signal average photon number can continue the USD’s advantage of error-free detection even if in the presence of thermal noise. In addition, compared with non-orthogonal multiple access (NOMA), the bit error rate (BER) against signal-to-noise rate (SNR) performance of USD has been improved.  相似文献   

17.
The creation of a quantum network is an important goal of quantum intormation processing. Long distance quantum communication with high fidelity is the main obstacle in achieving this goal. A scheme to transmit qubits without fidelity decrease over the noisy channel is presented. Using the idea of " time-bin entanglement" , the scheme works without any auxiliary particles and there is no resources increase with the length of the channel. The scheme is feasible with the current experimental technology.  相似文献   

18.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

19.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号