共查询到18条相似文献,搜索用时 234 毫秒
1.
2.
3.
4.
针对量子中继器短时间内难以应用于长距离量子密钥分配系统的问题, 提出了基于量子存储的长距离测量设备无关量子密钥分配协议, 分析了其密钥生成率与存储效率、信道传输效率和安全传输距离等参数间的关系, 研究了该协议中量子存储单元的退相干效应对最终密钥生成率的影响, 比较了经典测量设备无关量子密钥分配协议和基于量子存储的测量设备无关量子密钥分配协议的密钥生成率与安全传输距离的关系. 仿真结果表明, 添加量子存储单元后, 协议的安全传输距离由无量子存储的216 km增加至500 km, 且量子存储退相干效应带来的误码对最终的密钥生成率影响较小. 实验中可以采取调节信号光强度的方式提高测量设备无关量子密钥分配系统的密钥生成率, 为实用量子密钥分配实验提供了重要的理论参数. 相似文献
5.
为了进一步提高测量设备无关量子密钥分发(MDI-QKD)系统的传输距离和密钥率,将脉冲位置调制(PPM)技术引入到MDI-QKD中,利用弱光源中的空脉冲和高维编码技术,提出了一种高效的测量设备无关量子密钥分发,即PPM-MDI-QKD协议.协议中,通信双方首先将M个连续的弱脉冲构建成一个PPM帧,然后利用BB84极化编码和PPM编码方案实现高维编码,最后根据合法PPM帧、成功贝尔态测量结果以及匹配基筛选出安全密钥.数值计算结果表明,当光源平均光强小于0.13时,PPM-MDIQKD协议的性能优于MDI-QKD协议;与迄今为止报道的最远404km的MDI-QKD协议相比,在相同条件下,本协议最远传输距离能够达到480km,在404km传输距离上的密钥率可达5.4×10-4 bps. 相似文献
6.
基于通信速率和误码率在量子保密通信研究中的重要性, 采用1.55 μm上转换单光子探测器, 分析其量子效率随抽运功率的变化关系, 得出1.55 μm上转换单光子探测器较传统的铟镓砷二极管具有较高的量子效率和较低暗计数的优势, 并根据通信距离、上转换单光子探测器的量子效率和暗计数之间建立一种平衡, 得出每种距离上探测器的优化方案; 在考虑个体攻击无量子记忆的条件下, 比较BB84协议, BBM92协议和差分相移协议的量子密钥分配(QKD)系统的安全通信速率和误码率随通信距离的变化关系, 得出了差分相移键控协议的量子密钥分配系统是一个非常实用的, 通信距离大于200 km的很有吸引力的长距离量子密钥分配系统。 相似文献
7.
基于改造的弱相干态光源,提出了一种非正交编码被动诱骗态量子密钥分配方案.该方案不主动制备诱骗态,而是根据发送端探测器是否响应,将接收端的探测结果分为响应集合和未响应集合,以此分别作为信号态和诱骗态,并利用这两个集合来估计参量和生成密钥.数值仿真表明,非正交编码被动诱骗态方案的密钥生成效率和安全传输距离都优于现有的被动诱骗态方案,且性能非常接近主动无穷诱骗态方案的理论极限值;未响应集合对密钥生成的参与使方案性能免受发送端探测效率的影响,弥补了实际探测器探测效率低下的缺陷;由于不需要主动制备诱骗态,该方案实现非常简单,适用于高速量子密钥分配的场合.
关键词:
量子光学
量子密钥分配
被动诱骗态
密钥生成效率 相似文献
8.
9.
针对实用的量子密钥分配(QKD)系统是基于强衰减的弱激光脉冲作为单光子源, 光子数分束攻击极大限制了通信双方在非理想条件下QKD的传输距离和密钥生成率,采用大数定律对诱惑态协议中单光子的计数率、单光子增益和误码率分别进行统计涨落分析, 利用双诱惑态比较了1310 nm和1550 nm条件下,编码脉冲的长度为(N = 106-N = 1012)实际QKD协议中密钥的生成率与安全传输距离之间的关系、安全传输距离随编码长度的变化的关系, 得出脉冲编码长度增大到N = 1012时,密钥的最大安全传输距离为135 km. 相似文献
10.
基于预报单光子源,提出了一种相位匹配被动诱骗态量子密钥分配方案。在此方案中,通信双方仅需各产生单个强度的信号。根据通信双方本地探测器的响应情况,第三方的探测结果被分为四个集合,既起到信号态和诱骗态的作用,又共同参与参数估计和密钥生成,降低了系统实现的难度并改善了方案性能。仿真结果表明:相位匹配被动诱骗态方案的最大安全传输距离可达到552 km,性能趋近于现有的相位匹配主动诱骗态方案,且无需主动产生诱骗态;在一定程度上克服了相位匹配主动诱骗态方案严重依赖探测器探测效率的缺陷,性能更为稳定;随着数据长度的下降,方案的传输性能有所下降,但数据长度即使下降至10~7,方案的最大安全传输距离依然可以达到507 km。 相似文献
11.
《理论物理通讯》2017,(8)
The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the condition of ideal system, infinite light source system, untrusted light source and passive system. The influence of the fluctuation of transmission rate on the security characteristics of the system is discussed. Our numerical simulation results offer a useful reference for the practical QKD experiment. 相似文献
12.
Experimental long-distance decoy-state quantum key distribution based on polarization encoding 总被引:1,自引:0,他引:1
Peng CZ Zhang J Yang D Gao WB Ma HX Yin H Zeng HP Yang T Wang XB Pan JW 《Physical review letters》2007,98(1):010505
We demonstrate the decoy-state quantum key distribution (QKD) with one-way quantum communication in polarization space over 102 km. Further, we simplify the experimental setup and use only one detector to implement the one-way decoy-state QKD over 75 km, with the advantage to overcome the security loopholes due to the efficiency mismatch of detectors. Our experimental implementation can really offer the unconditionally secure final keys. We use 3 different intensities of 0, 0.2, and 0.6 for the light sources in our experiment. In order to eliminate the influences of polarization mode dispersion in the long-distance single-mode optical fiber, an automatic polarization compensation system is utilized to implement the active compensation. 相似文献
13.
《理论物理通讯》2017,(8)
Measurement-device-independent quantum key distribution(MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlie's mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations. 相似文献
14.
A long-distance quantum key distribution scheme based on pre-detection of optical pulse with auxiliary state 下载免费PDF全文
《中国物理 B》2015,(5)
We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be changed. The circuit can be treated as a pre-detection device. Equipping the pre-detection device in the front of the receiver of the quantum key distribution(QKD) can reduce the influence of the dark count of the detector, hence increasing the secure communication distance significantly. Simulation results show that the secure communication distance can reach 516 km and 479 km for QKD with perfect single photon source and decoy-state QKD with weak coherent photon source, respectively. 相似文献
15.
In quantum key distribution(QKD),the passive decoy-state method can simplify the intensity modulation and reduce some of side-channel information leakage and modulation errors.It is usually implemented with a heralded single-photon source.In Wang et al 2016(Phys.Rev.A 96032312),a novel passive decoy-state method is proposed by Wang et al,which uses two local detectors to generate more detection events for tightly estimating channel parameters.However,in the original scheme,the two local detectors are assumed to be identical,including the same detection efficiency and dark count rate,which is often not satisfied in the realistic experiment.In this paper,we construct a model for this passive decoy-state QKD scheme with two mismatched detectors and explore the effect on QKD performance with certain parameters.We also take the finite-size effect into consideration,showing the performance with statistical fluctuations.The results show that the efficiencies of local detectors affect the key rate more obviously than dark count rates. 相似文献
16.
Decoy-state reference-frame-independent quantum key distribution with both source errors and statistical fluctuations 下载免费PDF全文
Reference-frame-independent quantum key distribution(RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performance of decoystate RFI QKD with both source errors and statistical fluctuations is still missing until now. In this paper, we investigate the performance of decoy-state RFI QKD in practical scenarios with two kinds of light sources, the heralded single photon source(HSPS) and the weak coherent source(WCS), and also give clear comparison results of decoy-state RFI QKD with WCS and HSPS. Simulation results show that the secret key rates of decoy-state RFI QKD with WCS are higher than those with HSPS in short distance range, but the secret key rates of RFI QKD with HSPS outperform those with WCS in long distance range. 相似文献
17.
Polarization-Encoding-Based Measurement-Device-Independent Quantum Key Distribution with a Single Untrusted Source 下载免费PDF全文
《中国物理快报》2016,(10)
Measurement-device-independent quantum key distribution(MDI-QKD) can be immune to all detector sidechannel attacks and guarantee the information-theoretical security even with uncharacterized single photon detectors.MDI-QKD has been demonstrated in both laboratories and field-tests by using attenuated lasers combined with the decoy-state technique.However,it is a critical assumption that the sources used by legitimate participants are trusted in MDI-QKD.Hence,it is possible that a potential security risk exists.Here we propose a new scheme of polarization-encoding-based MDI-QKD with a single untrusted source,by which the complexity of the synchronization system can be reduced and the success rate of the Bell-state measurement can be improved.Meanwhile,the decoy-state method is employed to avoid the security issues introduced by a non-ideal single photon source.We also derive a security analysis of the proposed system.In addition,it seems to be a promising candidate for the implementation for QKD network in the near future. 相似文献
18.
Y. G. Tan Q. Y. Cai 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2010,56(3):449-455
In this paper, we consider the controllably secure quantum key distribution (QKD) with coherent
source, i.e., the practical decoy state QKD with finite
resource is studied within the scope of some controllable security
parameters. Our simulation shows the controllably secure QKD is more
resource-consuming compared with the practical decoy QKD with
relatively statistical fluctuation. However, further numerically
solutions show that both protocols agree well with each other in the
asymptotic limit, where the resource is large enough but not
infinite. Our work shows the dark counts will contribute apparently
to the transmission distance when communication distance approaches
to the asymptotic limit. It also shows that both the secure
transmission distance and the rate of the secure final key can be
increased apparently when the security estimation parameters are not
fixed but numerically optimized. 相似文献