首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   12篇
数学   1篇
物理学   10篇
无线电   7篇
  2022年   1篇
  2019年   1篇
  2018年   1篇
  2017年   3篇
  2016年   3篇
  2014年   2篇
  2012年   1篇
  2011年   1篇
  2010年   2篇
  2009年   2篇
  2001年   1篇
排序方式: 共有18条查询结果,搜索用时 375 毫秒
1.
GHz single-photon detector(SPD) is a crucial part in the practical high speed quantum key distribution(QKD) system.However, any imperfections in a practical QKD system may be exploited by an eavesdropper(Eve) to collect information about the key without being discovered. The sine wave gating SPD(SG-SPD) based on InGaAs/InP avalanche photodiode,one kind of practical high speed SPD, may also contain loopholes. In this paper, we study the principle and characteristic of the SG-SPD and find out the filtering loophole of the SG-SPD for the first time. What is more, the proof-of-principle experiment shows that Eve could blind and control Bob's SG-SPD by exploiting this loophole. We believe that giving enough attention to this loophole can improve the practical security of the existing QKD system.  相似文献   
2.
周淳  鲍皖苏  付向群 《电子学报》2012,40(10):2015-2020
 本文提出了态关联性不完美条件下诱骗态量子密钥分配(QKD)的安全性理论分析模型.借助于QKD的保密放大分析方法,采用实际QKD系统广泛使用的诱骗态编码方案,使相位误码的估计更加准确,进而给出了态关联性不完美条件下诱骗态QKD的最终安全密钥生成率的表达式,刻画了密钥生成率与态关联性不完美、探测器性能和密钥传输距离之间的关系.数值模拟表明,诱骗态QKD的最终安全密钥生成率对态关联性不完美的容忍程度,随着密钥传输距离的增大而逐渐减小,随着探测器探测性能的提升而逐渐增大,因而验证了所给表达式的正确性.  相似文献   
3.
外场16 km信标光捕获实验   总被引:1,自引:0,他引:1  
外场信标光的快速捕获是空间光通信的一项重要课题。提出了一种基于外场16 km信标光的自适应阈值分割方法,同时给出了系统的设计原理。引入开小窗技术,在感兴趣区域内对信标图像进行处理,实验数据表明其有效性。  相似文献   
4.
Yu Zhou 《中国物理 B》2022,31(8):80303-080303
High-dimensional quantum resources provide the ability to encode several bits of information on a single photon, which can particularly increase the secret key rate rate of quantum key distribution (QKD) systems. Recently, a practical four-dimensional QKD scheme based on time-bin quantum photonic state, only with two single-photon avalanche detectors as measurement setup, has been proven to have a superior performance than the qubit-based one. In this paper, we extend the results to our proposed eight-dimensional scheme. Then, we consider two main practical factors to improve its secret key bound. Concretely, we take the afterpulse effect into account and apply a finite-key analysis with the intensity fluctuations. Our secret bounds give consideration to both the intensity fluctuations and the afterpulse effect for the high-dimensional QKD systems. Numerical simulations show the bound of eight-dimensional QKD scheme is more robust to the intensity fluctuations but more sensitive to the afterpulse effect than the four-dimensional one.  相似文献   
5.
Compared with full device-independent quantum key distribution(DI-QKD), one-side device-independent QKD(1s DI-QKD) needs fewer requirements, which is much easier to meet. In this paper, by applying recently developed novel time–energy entropic uncertainty relations, we present a time–energy high-dimensional one-side device-independent quantum key distribution(HD-QKD) and provide the security proof against coherent attacks. Besides, we connect the security with the quantum steering. By numerical simulation, we obtain the secret key rate for Alice's different detection efficiencies. The results show that our protocol can performance much better than the original 1s DI-QKD. Furthermore, we clarify the relation among the secret key rate, Alice's detection efficiency, and the dispersion coefficient. Finally, we simply analyze its performance in the optical fiber channel.  相似文献   
6.
李源  鲍皖苏  李宏伟  周淳  汪洋 《中国物理 B》2016,25(1):10305-010305
Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios,also have the problem of device imperfections like finite-length keys. In this paper, based on the WCP source which can be used for the passive decoy-state method, we obtain the expressions of single-photon error rates, single-photon counts, and phase error rates. According to the information of smooth min-entropy, we calculate the key generation rate under the condition of finite-length key. Key generation rates with different numbers of pulses are compared by numerical simulations. From the results, it can be seen that the passive decoy-state method can have good results if the total number of pulses reaches 1010. We also simulate the passive decoy-state method with different probabilities of choosing a pulse for parameter estimation when the number of pulses is fixed.  相似文献   
7.
姚锐  周淳 《电子与封装》2010,10(3):32-35
在设备维修中分析的过程就是查找故障的过程,因此设备维修的关键就是懂得对设备故障如何进行分析,但是要想准确的对设备故障进行分析,就必须详细了解设备的硬件组成及各部分的工作原理。因此文章从简单介绍JC-3196测试系统的硬件组成及各部分的工作原理开始,然后再介绍几种设备常见故障,并通过这些故障的现象对其进行详细的检修分析。文章从四个方面对其进行说明:JC-3196测试系统的硬件组成、各部分源的主要功能及工作方式、故障分析、维修的注意事项。  相似文献   
8.
Similar to device-independent quantum key distribution(DI-QKD), semi-device-independent quantum key distribution(SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices.The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a oneway prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD.  相似文献   
9.
张海龙  周淳  史建红  鲍皖苏 《中国物理 B》2016,25(4):40304-040304
In this paper, from the original definition of fidelity in a pure state, we first give a well-defined expansion fidelity between two Gaussian mixed states. It is related to the variances of output and input states in quantum information processing. It is convenient to quantify the quantum teleportation(quantum clone) experiment since the variances of the input(output) state are measurable. Furthermore, we also give a conclusion that the fidelity of a pure input state is smaller than the fidelity of a mixed input state in the same quantum information processing.  相似文献   
10.
Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical multi-party quantum communication. In order to mitigate the experimental complexity of MDI-QCC and remove the key assumption(the sources are trusted) in MDI-QCC, we extend the framework of MDI-QKD with an untrusted source to MDI-QCC and give the rigorous security analysis of MDI-QCC with an untrusted source. What is more, in the security analysis we clearly provide a rigorous analytical method for parameters' estimation, which with simple modifications can be applied to not only MDI-QKD with an untrusted source but also arbitrary multi-party communication protocol with an untrusted source. The simulation results show that at reasonable distances the asymptotic key rates for the two cases(with trusted and untrusted sources) almost overlap, which indicates the feasibility of our protocol.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号