期刊文献+

量子密钥诱骗态的经典仿真研究

Classical Simulation Study for Decoy-state of Quantum Cryptography
在线阅读 下载PDF
导出
摘要 该文提出了基于相干态的诱骗方案的仿真方法,并分析考察诱骗脉冲与信号脉冲的通过率比值,验证了诱骗方案对克服光子数分裂数攻击的有效性。将该比值作为考察量,仿真了以平均光子数为0,0.2,0.6分别作为真空信号,真实信号和诱骗信号。在信道损失参数为0.2dB/km,探测效率为20%,暗计数为10-5的情况下,安全通信距离可以达到140km。由于本仿真方法使用经典计算机仿真,为量子信息的研究提供了新的手段。 The simulation method of decoy-state based on coherent states was proposed in this paper.We analyze the yield ratio of decoy pulses and signal pulses at the output,and verified the effectiveness of decoy state in overcoming the photon-number-splitting(PNS) attack.In addition,we take the yield ratio as a threshold that used to examine whether there exist a PNS attack.We simulate the average photon number 0,0.2,0.6,as the vacuum,signal and decoy,respectively.In the case of the channel loss is 0.2dB/km,detection efficiency is 20%,and dark count is 10-5,the results of simulation show the secure communication distance is up to 140km.Due to the classical computer simulation,a new scheme for quantum information research is provided.
出处 《杭州电子科技大学学报(自然科学版)》 2011年第5期45-48,共4页 Journal of Hangzhou Dianzi University:Natural Sciences
基金 国家自然科学基金资助项目(60972071) 浙江省自然科学基金资助项目(Y6100421) 浙江省科技计划资助项目(C31060) 浙江省大学生科技创新资助项目(R408010)
关键词 经典仿真 光子分裂数攻击 诱骗态 安全通信 classical simulation PNS attack decoy state security communication
  • 相关文献

参考文献9

  • 1Zhao Y,Qi B,Ma X F,et.al.Experimental quantum key distribution with decoy states[J].Phys Rev Lett,2006,96(7):502-505.
  • 2Hwang W Y.Quantum Key Distribution with High Loss:Toward Global Secure Communication[J].Phys Rev Lett,2003,91(5):901-904.
  • 3Wang X B.Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography[J].Phys Rev Lett,2005,94(23):503-506.
  • 4Wang X B.Decoy-state protocol for quantum cryptography with four different intensities of coherent light[J].Phys Rev A,2005,72(1):322-327.
  • 5Lo H K,Ma X F,Chen K.Decoy State Quantum Key Distribution[J].Phys Rev Lett,2005,94(23):504-507.
  • 6Nielsen M A,Chuang I L.Quantum Computation and Quantum Information[M].Cambridge:Cambridge University Press,2004:110-111.
  • 7Ma X F,Qi B,Zhao Y,etal.Practical Decoy State for Quantum Key Distribution[J].Phys Rev A,2005,72(1):326-340.
  • 8邹佩琳,李晖.利用诱骗信号方案进行实用的量子密钥分发[J].量子光学学报,2008,14(1):24-29. 被引量:1
  • 9张忠祥,韩正甫,刘云,郭光灿.超导单光子探测技术[J].物理学进展,2007,27(1):1-8. 被引量:7

二级参考文献48

  • 1徐克尊 陈宏芳 等.近代物理学[M].高等教育出版社,1993.212.
  • 2Chen T C,Finkbeiner F M,Bier A,et.al.Supercond.Sci.Technol.1999.12:840-842.
  • 3Deiker S W,Doriese W,Hilton G C,et al.Appl.Phys.Lett.2004.85(11):2137-2139.
  • 4Skocpol W J,Beasley M R,Tinkham M.Journal of Appl.Phys.1974.45(9):4054-4066.
  • 5LLE Review.92:186-189.
  • 6Il'in D,Siegel M,Semenov A,et al.Phys.Stat.Sol.2005.2(5):1680-1687.
  • 7Il'in K,Lindgren M,Currie M,et al.Appl.Phys.Lett.2000.76(19):2752-2754.
  • 8Verekin A,Pearlman A,Slysz W,et al.Journal of Modern Optics 2004.51(9-10):1447-1458.
  • 9Gol'tsman G N,Okunev O,Chulkova G,et al.Appl.Phys.Lett.2001.79(6):705-707.
  • 10Korneev A,Kouminov A,Matvienko V,et al.Appl.Phys.Lett.2004.84(26):5338-5340.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部