首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A family of quantum key distribution protocols based on geometrically uniform states of laser radiation has been proposed. Their cryptographic strength against a unitary attack, a coherent-state-splitting attack, and an unambiguous measurement attack has been analyzed. A certain protocol can be chosen automatically depending on the parameters of a system and the required length of a communication channel.  相似文献   

2.
A quantum cryptography system based on a 4-basis protocol with geometrically uniform states is tested in a series of experiments. Quantum states of light transmitted through real fiber optic communication channels to a distance of 32 km in the presence of uncontrolled external actions are prepared, transformed, and measured. It is shown that the chosen algorithms of processing quantum information are adequate and can be used as foundations of practical devices in protected communication lines.1  相似文献   

3.
A quantum cryptosystem is proposed in which a pair of nonstationary states differing in their times of preparation is used as the information carriers. Pis’ma Zh. éksp. Teor. Fiz. 66, No. 11, 742–745 (10 December 1997)  相似文献   

4.
A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the protocol uses additional restrictions imposed by special relativity theory. Unlike all existing quantum key distribution protocols, this protocol ensures key secrecy for a not strictly one-photon source of quantum states and an arbitrary length of a quantum communication channel.  相似文献   

5.
Since a strictly single-photon source is not yet available, in quantum cryptography systems, one uses, as information quantum states, coherent radiation of a laser with an average number of photons of μ ≈ 0.1–0.5 in a pulse, attenuated to the quasi-single-photon level. The linear independence of a set of coherent quasi-single-photon information states leads to the possibility of unambiguous measurements that, in the presence of losses in the line, restrict the transmission range of secret keys. Starting from a certain value of critical loss (the length of the line), the eavesdropper knows the entire key, does not make errors, and is not detected—the distribution of secret keys becomes impossible. This problem is solved by introducing an additional reference state with an average number of photons of μcl ≈ 103–106, depending on the length of the communication line. It is shown that the use of a reference state does not allow the eavesdropper to carry out measurements with conclusive outcome while remaining undetected. A reference state guarantees detecting an eavesdropper in a channel with high losses. In this case, information states may contain a mesoscopic average number of photons in the range of μ q ≈ 0.5–102. The protocol proposed is easy to implement technically, admits flexible adjustment of parameters to the length of the communication line, and is simple and transparent for proving the secrecy of keys.  相似文献   

6.
The Raman and photoluminescence spectra of short-period C/SiC superlattices produced by RF magnetron sputtering are investigated. The Raman data indicate that, in 35-period Sitall/Ni/[C/SiC] superlattices with the C and SiC effective thicknesses of 3.5 and 3 Å, respectively, subjected to postgrowth avalanche annealing, the carbon layers assume the structure of multilayer graphene with 3–5 graphene sheets per superlattice period. A method for the fabrication of graphene-like carbon structures on the basis of short-period superlattices grown by RF sputtering is suggested and implemented.  相似文献   

7.
《Physics letters. A》1998,241(3):135-138
A scheme of cryptographic key agreement via classical noise is introduced. The principle underlying its security is similar to that of the two-state quantum cryptosystem, but it has the advantage that signal amplification can be applied. Radio and optical implementations of the scheme are suggested.  相似文献   

8.
A novel implementation of quantum-noise optical cryptography is proposed, which is based on a simplified architecture that allows long-haul, high-speed transmission in a fiber optical network. By using a single multiport encoder/decoder and 16 phase shifters, this new approach can provide the same confidentiality as other implementations of Yuen's encryption protocol, which use a larger number of phase or polarization coherent states. Data confidentiality and error probability for authorized and unauthorized receivers are carefully analyzed.  相似文献   

9.
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature. The single photon pulses are emitted on demand by a single nitrogen-vacancy color center in a diamond nanocrystal. The quantum bit error rate is less that 4.6% and the secure bit rate is 7700 bits/s. The overall performances of our system reaches a domain where single photons have a measurable advantage over an equivalent system based on attenuated light pulses.  相似文献   

10.
Towards practical quantum cryptography   总被引:5,自引:0,他引:5  
Quantum cryptography bases the security of quantum key exchange on the laws of quantum physics and is likely to become the first application employing quantum effects for communication. Here we present performance tests of a new design based on polarization encoding of attenuated, coherent light pulses. Our measurements show that this compact setup can achieve an effective key-bit rate in the kHz range with low alignment requirements and thus offers the tools for fast and user-friendly quantum key exchange. Received: 27 July 1999 / Revised version: 3 September 1999 / Published online: 10 November 1999  相似文献   

11.
The security of quantum cryptography based on time shifts has been mathematically proved. The procedures of preparing and measuring the most strongly localized states with a support in a finite frequency band are described. It has shown that measurements of states in the finite frequency band and a finite time window are sufficient for detecting any change in input states. The use of available multiplex fiber optic systems based on an arrayed waveguide grating for time-shift quantum cryptography is briefly discussed.  相似文献   

12.
S. N. Molotkov 《JETP Letters》2016,103(5):345-349
The trace distance is used as a security criterion in proofs of security of keys in quantum cryptography. Some authors doubted that this criterion can be reduced to criteria used in classical cryptography. The following question has been answered in this work. Let a quantum cryptography system provide an ε-secure key such that ½‖ρXE ? ρU ? ρE1 < ε, which will be repeatedly used in classical encryption algorithms. To what extent does the ε-secure key reduce the number of search steps (guesswork) as compared to the use of ideal keys? A direct relation has been demonstrated between the complexity of the complete consideration of keys, which is one of the main security criteria in classical systems, and the trace distance used in quantum cryptography. Bounds for the minimum and maximum numbers of search steps for the determination of the actual key have been presented.  相似文献   

13.
A comparison of two protocols for generating a cryptographic key composed from d-valued symbols, one using a string of independent qubits and another utilizing d-level systems prepared in states belonging to d + 1 mutually unbiased bases, is performed. The protocol based on qubits is shown to be optimal for quantum cryptography, since it provides higher security and a higher key generation rate.  相似文献   

14.
We propose a quantum transmission based on bi-photons, which are doubly-entangled both in polarisation and phase. This scheme finds a natural application in quantum cryptography, where we show that an eventual eavesdropper is bound to introduce a larger error on the quantum communication than for a single entangled bi-photon communication, when he steels the same information. Received 23 July 2001 / Received in final form 30 November 2001 Published online 24 September 2002  相似文献   

15.
Faraday-Michelson system for quantum cryptography   总被引:9,自引:0,他引:9  
Mo XF  Zhu B  Han ZF  Gui YZ  Guo GC 《Optics letters》2005,30(19):2632-2634
Quantum key distribution provides unconditional security for communication. Unfortunately, current experimental schemes are not suitable for long-distance fiber transmission because of phase drift or Rayleigh backscattering. In this Letter we present a unidirectional intrinsically stable scheme that is based on Michelson-Faraday interferometers, in which ordinary mirrors are replaced with 90 degree Faraday mirrors. With the scheme, a demonstration setup was built and excellent stability of interference fringe visibility was achieved over a fiber length of 175 km. Through a 125 km long commercial communication fiber cable between Beijing and Tianjin, the key exchange was performed with a quantum bit-error rate of less than 6%, which is to our knowledge the longest reported quantum key distribution experiment under field conditions.  相似文献   

16.
We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the "qubits" sent from the sender to the receiver. As we show, even quantum key distribution with perfect qubits might not be achievable over long distances when the other imperfections are taken into account. Furthermore, existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength. Finally we show that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart.  相似文献   

17.
S. N. Molotkov 《JETP Letters》1997,66(11):773-778
A quantum cryptosystem based on comparing an input signal from a communication channel with a reference state prepared at the receiving end is proposed. Pis’ma Zh. éksp. Teor. Fiz. 66, No. 11, 736–741 (10 December 1997)  相似文献   

18.
The physical principles of a quantum key distribution protocol using four-level optical systems are discussed. Quantum information is encoded into polarization states created by frequency-nondegenerate spontaneous parametric down-conversion in collinear geometry. In the scheme under analysis, the required nonorthogonal states are generated in a single nonlinear crystal. All states in the selected basis are measured deterministically. The results of initial experiments on transformation of the basis polarization states of a four-level optical system are discussed.  相似文献   

19.
Experimental quantum secret sharing and third-man quantum cryptography   总被引:1,自引:0,他引:1  
Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.  相似文献   

20.
M. Shalaby 《Optik》2012,123(20):1852-1857
We present two quantum cryptography protocols. The first one generalizes the concept of the two-way deterministic protocol to work with qudits in prime d-dimensional system where d is odd. The second protocol makes use of the tomographically complete set construction for odd d-dimensional systems where d = p1p2 to modify the BB84 protocol to work with qudits of such systems. The securities of the two protocols are analyzed according to the intercept and resend attack.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号