共查询到20条相似文献,搜索用时 15 毫秒
1.
We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect. 相似文献
2.
Atmospheric continuous-variable quantum key distribution (ACVQKD) has been proven to be secure theoretically with the assumption that the signal source is well protected by the sender so that it cannot be compromised. However, this assumption is quite unpractical in realistic quantum communication system. In this work, we investigate a practical situation in which the signal source is no longer protected by the legitimate parts, but is exposed to the untrusted atmospheric channel. We show that the performance of ACVQKD is reduced by removing the assumption, especially when putting the untrusted source at the middle of the channel. To improve the performance of the ACVQKD with the untrusted source, a non-Gaussian operation, called photon subtraction, is subsequently introduced. Numerical analysis shows that the performance of ACVQKD with an untrusted source can be improved by properly adopting the photon subtraction operation. Moreover, a special situation where the untrusted source is located in the middle of the atmospheric channel is also considered. Under direct reconciliation, we find that its performance can be significantly improved when the photon subtraction operation is manipulated by the sender. 相似文献
3.
Phase estimation and compensation is one of the enabling functionalities in continous-variable quantum key distribution (CVQKD). Recently, a novel CVQKD scheme has been independently proposed to combat the local oscillator (LO) side channel attacks. Furthermore, we have carried out a proof-of-principle experimental study on the feasibility of the CVQKD without sending a LO. However, this scheme contains a serious weakness: The phase noise caused by the two different lasers between the sender and the receiver would severely destroy the quantum signal and finally reduce the secure distance. In this paper, we investigate the optical phase noise and explore the optimal approach to estimate and compensate such kind of noise with appropriate data overhead. Numerical simulations show that our scheme can successfully reconstruct the phase drifts even at low signal-to-noise ratio conditions. We also suggest that a higher accuracy of phase estimation could be achieved by using the frequency division multiplexing scheme. This opens an opportunity to employ advanced pilot-aided phase estimation techniques in quantum communication system. 相似文献
4.
Journal of Statistical Physics - The subcarrier domain of multicarrier continuous-variable quantum key distribution (CVQKD) is defined. In a multicarrier CVQKD scheme, the information is granulated... 相似文献
5.
We propose a novel multi-mode Gaussian modulated continuous variable measurement-device-independent quantum key distribution (MDI-CVQKD) protocol where Alice and Bob prepare independent and identically distributed Gaussian modulated coherent states in multiple independent modes respectively along with Charlie using a traditional noise homodyne detector to measure. Since it is completely handed over to an untrusted third party (Charlie) to measure, this protocol can effectively eliminate the defects of the actual detector. As well as, we also proved that the multi-mode MDI-CVQKD protocol can reduce electronic noise. The simulation results show that the multi-mode Gaussian modulated MDI-CVQKD protocol can indeed significantly improve the key rate of the original Gaussian modulated MDI-CVQKD protocol, and extend the maximum secure transmission distance of the secret key. 相似文献
6.
Four-state continuous-variable quantum key distribution (CVQKD) is one of the discretely modulated CVQKD which generates four nonorthogonal coherent states and exploits the sign of the measured quadrature of each state to encode information rather than uses the quadrature \(\hat {x}\) or \(\hat {p}\) itself. It has been proven that four-state CVQKD is more suitable than Gaussian modulated CVQKD in terms of transmission distance. In this paper, we propose an improved four-state CVQKD using an non-Gaussian operation, photon subtraction. A suitable photon-subtraction operation can be exploited to improve the maximal transmission of CVQKD in point-to-point quantum communication since it provides a method to enhance the performance of entanglement-based (EB) CVQKD. Photon subtraction not only can lengthen the maximal transmission distance by increasing the signal-to-noise rate but also can be easily implemented with existing technologies. Security analysis shows that the proposed scheme can lengthen the maximum transmission distance. Furthermore, by taking finite-size effect into account we obtain a tighter bound of the secure distance, which is more practical than that obtained in the asymptotic limit. 相似文献
7.
We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of \(10^{-3}\) bits/pulse to \(10^{-1}\) bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about \(10^{-7}\). Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future. 相似文献
8.
Reconciliation is an essential procedure for continuous-variable quantum key distribution (CV-QKD). As the most commonly used reconciliation protocol in short-distance CV-QKD, the slice error correction (SEC) allows a system to distill more than 1 bit from each pulse. However, the quantization efficiency is greatly affected by the noisy channel with a low signal-to-noise ratio (SNR), which usually limits the secure distance to about 30 km. In this paper, an improved SEC protocol, named Rotated-SEC (RSEC), is proposed through performing a random orthogonal rotation on the raw data before quantization, and deducing a new estimator for the quantized sequences. Moreover, the RSEC protocol is implemented with polar codes. The experimental results show that the proposed protocol can reach up to a quantization efficiency of about 99%, and maintain at around 96% even at the relatively low SNRs , which theoretically extends the secure distance to about 45 km. When implemented with the polar codes with a block length of 16 Mb, the RSEC achieved a reconciliation efficiency of above 95%, which outperforms all previous SEC schemes. In terms of finite-size effects, we achieved a secret key rate of bits/pulse at a distance of 33.93 km (the corresponding SNR value is 1). These results indicate that the proposed protocol significantly improves the performance of SEC and is a competitive reconciliation scheme for the CV-QKD system. 相似文献
9.
International Journal of Theoretical Physics - We propose a new scheme to strengthen the performance of the discrete-modulated continuous-variable measurement-device-independent quantum key... 相似文献
10.
In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that seriously threatens the security of practical QKD systems. In this paper, we propose a new quantum hacking attack on an integrated silicon photonic continuous-variable quantum key distribution (CVQKD) system, which is known as a power analysis attack. This attack can be implemented by analyzing the power originating from the integrated electrical control circuit in state preparation with the help of machine learning, where the state preparation is assumed to be perfect in initial security proofs. Specifically, we describe a possible power model and show a complete attack based on a support vector regression (SVR) algorithm. The simulation results show that the secret key information decreases with the increase of the accuracy of the attack, especially in a situation with less excess noise. In particular, Eve does not have to intrude into the transmitter chip (Alice), and may perform a similar attack in practical chip-based discrete-variable quantum key distribution (DVQKD) systems. To resist this attack, the electrical control circuit should be improved to randomize the corresponding power. In addition, the power can be reduced by utilizing the dynamic voltage and frequency scaling (DVFS) technology. 相似文献
11.
The intensities of signal and local oscillator (LO) can be elegantly manipulated for the noise-based quantum system while manipulating the wavelength-dependent modulation in source to increase the performance of the continuous-variable key distribution in terms of the secret key rate and maximal transmission distance. The source-based additional noises can be tuned and stabilized to the suitable values to eliminate the effect of the LO fluctuations and defeat the potential attacks in imperfect quantum channels. It is firmly proved that the secret key rate can be manipulated in source over imperfect channels by the intensities of signal and LO with different wavelengths, which have an effect on the optimal signal-to-noise ratio of the heterodyne detectors resulting from the detection efficiency and the additional electronic noise as well. Simulation results show that there is a nice balance between the secret key rate and the maximum transmission distance. 相似文献
13.
Oneofthemostintriguingandexcitingrecentdevelopmentsinquantummechanicsisthepredictionanddemonstrationofacryptographickeydistri... 相似文献
14.
The secret key rate is one of the main obstacles to the practical application of continuous-variable quantum key distribution (CVQKD). In this paper, we propose a multiplexing scheme to increase the secret key rate of the CVQKD system with orbital angular momentum (OAM). The propagation characteristics of a typical vortex beam, involving the Laguerre–Gaussian (LG) beam, are analyzed in an atmospheric channel for the Kolmogorov turbulence model. Discrete modulation is utilized to extend the maximal transmission distance. We show the effect of the transmittance of the beam over the turbulent channel on the secret key rate and the transmission distance. Numerical simulations indicate that the OAM multiplexing scheme can improve the performance of the CVQKD system and hence has potential use for practical high-rate quantum communications. 相似文献
15.
We propose a quantum teleportation scheme for tripartite entangled coherent state (ECS) with continuous variable. Our scheme is feasible and economical in the sense that we need only linear optical devices such as beam splitters, phase shifters and photon detectors and employ three bipartite maximally ECSs as quantum channels. We also generalize the tripartite scheme into multipartite ease and calculate the minimum average fidelity for the schemes in tripartite and multipartite cases. 相似文献
16.
Imperfections in practical detectors,including limited detection efficiency,and inherent electronic noise,can seriously decrease the transmission distance of continuous-variable measurement-device-independent quantum key distribution systems.Owing to the difficulties inherent in realizing a high-efficiency fiber homodyne detector,challenges still exist in continuous-variable measurement-device-independent quantum key distribution system implementation.We offer an alternative approach in an attempt to solve these difficulties and improve the potential for system implementation.Here,a novel practical detector modeling method is utilized,which is combined with a one-time shot-noise-unit calibration method for the purpose of system realization.The new modeling method benefits greatly from taking advantage of one-time shot-noise-unit calibration methods,such as measuring electronic noise and shot noise directly to a novel shot-noise unit,so as to eliminate the statistical fluctuations found in previous methods;this makes the implementation of such systems simpler,and the calibration progress more accurate.We provide a simulation of the secret key rate versus distance with different parameters.In addition,the minimal detection efficiency required at each distance,as well as the contrast between the two methods,are also shown,so as to provide a reference in terms of system realization. 相似文献
17.
We characterize the efficiency of the practical continuous-variable quantum key distribution (CVQKD) while inserting the heralded noiseless linear amplifier (NLA) before detectors to increase the secret key rate and the maximum transmission distance in Gaussian channels. In the heralded NLA-based CVQKD system, the entanglement source is only placed in the middle while the two participants are unnecessary to trust their source. The intensities of source noise are sensitive to the tunable NLA with the parameter g in a suitable range and can be stabilized to the suitable constant values to eliminate the impact of channel noise and defeat the potential attacks. Simulation results show that there is a well balance between the secret key rate and the maximum transmission distance with the tunable NLA. 相似文献
18.
The estimation of phase noise of continuous-variable quantum key distribution protocol with a local local oscillator (LLO CVQKD), as a major process in quantifying the secret key rate, is closely relevant to the intensity of the phase reference. However, the transmission of the phase reference through the insecure quantum channel is prone to be exploited by the eavesdropper (Eve) to mount attacks. Here, we introduce a polarization attack scheme against the phase reference. Presently, in a practical LLO CVQKD system, only part of the phase reference pulses are measured to compensate for the polarization drift of the quantum signal pulses in a compensation cycle due to the limited polarization measurement rate, while the other part of the phase reference pulses are not measured. We show that Eve can control the phase noise by manipulating the polarization direction of the unmeasured phase reference to hide her attack on the quantum signal. Simulations show that Eve can obtain partial or total key rates information shared between Alice and Bob as the transmission distance increases. Improving the polarization measurement rate to 100% or monitoring the phase reference intensity in real-time is of great importance to protect the LLO CVQKD from polarization attack. 相似文献
19.
We demonstrate a multicarrier QKD protocol for continuous-variables (CV) using the orthogonal frequency division multiplexing (OFDM) technique which was employed in frequency domain. The multicarrier communication formulates sub-channels from OFDM technique and physical quantum channel, each dedicated to the transmission of a subcarrier CV. In the OFDM-CVQKD scenario, the input quantum states of the legal parties are granulated into subcarrier CVs, at the receiver, the subcarriers are decoded by an unitary CV operation, which results in the recovered single-carrier CVs. Compared with the device of the multichannel parallel CVQKD protocol that utilizes N arrayed-waveguide gratings (AWG) in optical domain, this protocol shows better feasibility of implementation from both equipment and technique. We derive the formulas of the secret key rate, moreover, analyze the security in the finite-size through the OFDM-CVQKD scheme. Simulation results indicate that the OFDM-CVQKD scheme leads to improved secret key rates and higher tolerable excess noise in comparison to single-carrier CVQKD. Particularly, the secret key rate of the 64 subcarrier CVQKD has increased by roughly an order of magnitude of the single-channel CVQKD, whereas the tolerable excess noise can be controlled in a small range. The results reveal that the OFDM-CVQKD protocol provides a feasible framework for the experimental implementation of an unconditionally secure communication over standard telecommunication networks. 相似文献
20.
相位调制器与振幅调制器是连续变量量子密钥分发中不可缺少的光调制器件.本文以量子安全通信系统的硬件为平台,设计了LiNbO3相位调制器的驱动电路,性能测试电路,同时给出了振幅调制器的性能监控电路.从理论与实验上对方案的可行性与可靠性进行了验证. 相似文献
|