排序方式: 共有19条查询结果,搜索用时 15 毫秒
11.
12.
Finite-Key Analysis for a Practical High-Dimensional Quantum Key Distribution System Based on Time-Phase States
下载免费PDF全文
![点击此处可从《中国物理快报》网站下载免费的PDF全文](/ch/ext_images/free.gif)
High-dimensional quantum states key distribution(HD-QKD) can enable more than one bit per photon and tolerate more noise. Recently, a practical HD-QKD system based on time-phase states has provided a secret key at Mbps over metropolitan distances. For the purposes of further improving the secret key rate of a practical HD-QKD system, we make two main contributions in this work. Firstly, we present an improved parameter estimation for this system in the finite-key scenario based on the Chernoff bound and the improved Chernoff bound. Secondly, we analyze how the dimension d affects the performance of the practical HD-QKD system.We present numerical simulations about the secret key rate of the practical HD-QKD system based on different parameter estimation methods. It is found that using the improved Chernoff bound can improve the secret key rate and maximum channel loss of the practical HD-QKD system. In addition, a mixture of the 4-level and 8-level practical HD-QKD system can provide better performance in terms of the key generation rate over metropolitan distances. 相似文献
13.
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol. 相似文献
14.
15.
随着半导体行业测试技术不断提高,IC分选机技术不断升级,昂贵的集成电路测试设备是导致集成电路测试成本偏高的主要因素。如何最有效地使用好现有设备,充分利用设备资源,降低测试成本,提高测试效率,是工程技术人员需要探索的问题。从如何实现两台IC分选机并行测试展开具体的说明,详细介绍两台IC分选机与测试系统并行测试的通信原理,以及实际工作中的一些注意事项,避免出现质量事故,并通过试验说明并行测试的优越性。 相似文献
16.
嵌入式组件技术的研究及应用 总被引:1,自引:0,他引:1
嵌入式系统不断增大的复杂度和市场实效性的要求推动了基于组件的开发技术(Componet-based Development,CBD)向嵌入式软件领域的转移.通过深入分析通用组件的设计原则和嵌入式系统的特性要求,提出了符合嵌入式系统的组件设计原则,并且根据嵌入式组件的特点.提出了一种基于"组件树"的嵌入式软件开发方法,使组件技术的优点在嵌入式系统中得到了很好的体现,为CBD技术向嵌入式领域的转移提供了一种有效的途径. 相似文献
17.
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. 相似文献
18.
19.