期刊文献+
共找到2,028篇文章
< 1 2 102 >
每页显示 20 50 100
Mask-coding-assisted continuous-variable quantum direct communication with orbital angular momentum multiplexing
1
作者 Zhengwen Cao Yujie Wang +2 位作者 Geng Chai Xinlei Chen Yuan Lu 《Chinese Physics B》 2025年第2期64-72,共9页
Quantum secure direct communication(QSDC) is a communication method based on quantum mechanics and it is used to transmit secret messages. Unlike quantum key distribution, secret messages can be transmitted directly o... Quantum secure direct communication(QSDC) is a communication method based on quantum mechanics and it is used to transmit secret messages. Unlike quantum key distribution, secret messages can be transmitted directly on a quantum channel with QSDC. Higher channel capacity and noise suppression capabilities are key to achieving longdistance quantum communication. Here, we report a continuous-variable QSDC scheme based on mask-coding and orbital angular momentum, in which the mask-coding is employed to protect the security of the transmitting messages and to suppress the influence of excess noise. The combination of orbital angular momentum and information block transmission effectively improves the secrecy capacity. In the 800 information blocks ×1310 bits length 10-km experiment, the results show a statistical average bit error rate of 0.38%, a system excess noise value of 0.0184 SNU, and a final secrecy capacity of 6.319×10~6 bps. Therefore, this scheme reduces error bits while increasing secrecy capacity, providing a solution for long-distance large-scale quantum communication, which is capable of transmitting text, images and other information of reasonable size. 展开更多
关键词 continuous-variable quantum direct communication orbital angular momentum mask coding
原文传递
Quantum-accelerated active distribution network planning based on coherent photonic quantum computers
2
作者 Yu Xin Haipeng Xie Wei Fu 《iEnergy》 2025年第2期107-120,共14页
Active distribution network(ADN)planning is crucial for achieving a cost-effective transition to modern power systems,yet it poses significant challenges as the system scale increases.The advent of quantum computing o... Active distribution network(ADN)planning is crucial for achieving a cost-effective transition to modern power systems,yet it poses significant challenges as the system scale increases.The advent of quantum computing offers a transformative approach to solve ADN planning.To fully leverage the potential of quantum computing,this paper proposes a photonic quantum acceleration algorithm.First,a quantum-accelerated framework for ADN planning is proposed on the basis of coherent photonic quantum computers.The ADN planning model is then formulated and decomposed into discrete master problems and continuous subproblems to facilitate the quantum optimization process.The photonic quantum-embedded adaptive alternating direction method of multipliers(PQA-ADMM)algorithm is subsequently proposed to equivalently map the discrete master problem onto a quantum-interpretable model,enabling its deployment on a photonic quantum computer.Finally,a comparative analysis with various solvers,including Gurobi,demonstrates that the proposed PQA-ADMM algorithm achieves significant speedup on the modified IEEE 33-node and IEEE 123-node systems,highlighting its effectiveness. 展开更多
关键词 Active distribution network planning coherent photonic quantum computer photonic quantum-embedded adaptive ADMM algorithm quantum computing
在线阅读 下载PDF
Duality Computing in Quantum Computers 被引量:9
3
作者 LONG Gui-Lu LIU Yang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第12期1303-1306,共4页
In this letter,we propose a duality computing mode,which resembles particle-wave duality property whena quantum system such as a quantum computer passes through a double-slit.In this mode,computing operations arenot n... In this letter,we propose a duality computing mode,which resembles particle-wave duality property whena quantum system such as a quantum computer passes through a double-slit.In this mode,computing operations arenot necessarily unitary.The duality mode provides a natural link between classical computing and quantum computing.In addition,the duality mode provides a new tool for quantum algorithm design. 展开更多
关键词 duality computer duality quantum computer duality computing mode
在线阅读 下载PDF
Practical security of continuous-variable quantum key distribution under finite-dimensional effect of multi-dimensional reconciliation 被引量:2
4
作者 Yingming Zhou Xue-Qin Jiang +3 位作者 Weiqi Liu Tao Wang Peng Huang Guihua Zeng 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第5期101-107,共7页
The well-known multi-dimensional reconciliation is an effective method used in the continuous-variable quantum key distribution in the long-distance and the low signal-to-noise-ratio scenarios.The virtual channel empl... The well-known multi-dimensional reconciliation is an effective method used in the continuous-variable quantum key distribution in the long-distance and the low signal-to-noise-ratio scenarios.The virtual channel employed to exchange data is generally established by using a finite-dimensional rotation in the reconciliation procedure.In this paper,we found that the finite dimension of the multi-dimensional reconciliation inevitably leads to the mismatch of the signal-to-noise-ratio between the quantum channel and the virtual channel,which may be called the finite-dimension effect.Such an effect results in an overestimation on the secret key rate,and subsequently induces vital practical security loopholes. 展开更多
关键词 multi-dimensional reconciliation finite-dimensional effect continuous-variable quantum key distribution
原文传递
Finite-size analysis of continuous-variable quantum key distribution with entanglement in the middle 被引量:1
5
作者 Ying Guo Yu Su +2 位作者 Jian Zhou Ling Zhang Duan Huang 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第1期232-239,共8页
Continuous-variable quantum key distribution(CVQKD) protocols with entanglement in the middle(EM) enable long maximal transmission distances for quantum communications. For the security analysis of the protocols, it i... Continuous-variable quantum key distribution(CVQKD) protocols with entanglement in the middle(EM) enable long maximal transmission distances for quantum communications. For the security analysis of the protocols, it is usually assumed that Eve performs collective Gaussian attacks and there is a lack of finite-size analysis of the protocols. However,in this paper we consider the finite-size regime of the EM-based CVQKD protocols by exposing the protocol to collective attacks and coherent attacks. We differentiate between the collective attacks and the coherent attacks while comparing asymptotic key rate and the key rate in the finite-size scenarios. Moreover, both symmetric and asymmetric configurations are collated in a contrastive analysis. As expected, the derived results in the finite-size scenarios are less useful than those acquired in the asymptotic regime. Nevertheless, we find that CVQKD with entanglement in the middle is capable of providing fully secure secret keys taking the finite-size effects into account with transmission distances of more than 30 km. 展开更多
关键词 continuous-variable quantum key distribution ENTANGLEMENT in the middle FINITE-SIZE coherent attack
原文传递
Improving Continuous-Variable Measurement-Device-Independent Multipartite Quantum Communication with Optical Amplifiers 被引量:1
6
作者 郭迎 赵微 +3 位作者 李飞 黄端 廖骎 谢才浪 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第8期191-200,共10页
The developing tendency of continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is to cope with the practical issue of implementing sealable quantum networks. Up to now, most theoreti... The developing tendency of continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is to cope with the practical issue of implementing sealable quantum networks. Up to now, most theoretical and experimental researches on CV-MDI QKD are focused on two-party protocols. However, we suggest a CV-MDI multipartite quantum secret sharing (QSS) protocol use the EPR states coupled with optical amplifiers. More remarkable, QSS is the real application in multipartite CV-MDI QKD, in other words, is the concrete implementation method of multipartite CV-MDI QKD. It can implement a practical quantum network scheme, under which the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Even if there is a possibility that the relay may be completely tampered, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Additionally, we illustrate that the use of optical amplifiers can compensate the partial inherent imperfections of detectors and increase the transmission distance of the CV-MDI quantum system. 展开更多
关键词 continuous-variable quantum network Greenberger Horne Zeilinger state optical amplifier
原文传递
Rise of quantum correlations in non-Markovian environments in continuous-variable systems 被引量:1
7
作者 刘辛 吴薇 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第7期263-268,共6页
We investigate the time evolution of quantum correlations, which are measured by Gaussian quantum discord in a continuous-variable bipartite system subject to common and independent non-Markovian environments. Conside... We investigate the time evolution of quantum correlations, which are measured by Gaussian quantum discord in a continuous-variable bipartite system subject to common and independent non-Markovian environments. Considering an initial two-mode Gaussian symmetric squeezed thermal state, we show that quantum correlations can be created during the non-Markovian evolution, which is different from the Markovian process. Furthermore, we find that the temperature is a key factor during the evolution in non-Markovian environments. For common reservoirs, a maximum creation of quantum correlations may occur under an appropriate temperature. For independent reservoirs, the non-Markovianity of the total system corresponds to the subsystem whose temperature is higher. In both common and independent environments, the Gaussian quantum discord is influenced by the temperature and the photon number of each mode. 展开更多
关键词 quantum correlation non-Markovian environment continuous-variable systems
原文传递
Spherical reconciliation for a continuous-variable quantum key distribution 被引量:1
8
作者 卢钊 史建红 李风光 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第4期109-114,共6页
Information reconciliation is a significant step for a continuous-variable quantum key distribution(CV-QKD) system.We propose a reconciliation method that allows two authorized parties to extract a consistent and se... Information reconciliation is a significant step for a continuous-variable quantum key distribution(CV-QKD) system.We propose a reconciliation method that allows two authorized parties to extract a consistent and secure binary key in a CV-QKD protocol,which is based on Gaussian-modulated coherent states and homodyne detection.This method named spherical reconciliation is based on spherical quantization and non-binary low-density parity-check(LDPC) codes.With the suitable signal-to-noise ratio(SNR) and code rate of non-binary LDPC codes,spherical reconciliation algorithm has a high efficiency and can extend the transmission distance of CV-QKD. 展开更多
关键词 continuous-variable quantum key distribution QUANTIZATION spherical reconciliation
原文传递
Continuous-variable quantum key distribution based on continuous random basis choice 被引量:1
9
作者 Weiqi Liu Jinye Peng +3 位作者 Peng Huang Shiyu Wang Tao Wang Guihua Zeng 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第7期214-219,共6页
Gaussian-modulated coherent state quantum key distribution is gradually moving towards practical application. Generally, the involved scheme is based on the binary random basis choice. To improve the performance and s... Gaussian-modulated coherent state quantum key distribution is gradually moving towards practical application. Generally, the involved scheme is based on the binary random basis choice. To improve the performance and security, we present a scheme based on a continuous random basis choice. The results show that our scheme obviously improves the performance, such as the secure communication distance. Our scheme avoids comparing the measurement basis and discarding the key bits, and it can be easily implemented with current technology. Moreover, the imperfection of the basis choice can be well removed by the known phase compensation algorithm. 展开更多
关键词 continuous-variable quantum key distribution basis choice
原文传递
Security Simulation of Continuous-Variable Quantum Key Distribution over Air-to-Water Channel Using Monte Carlo Method 被引量:1
10
作者 Cai-Lang Xie Ying Guo +2 位作者 Yi-Jun Wang Duan Huang Ling Zhang 《Chinese Physics Letters》 SCIE CAS CSCD 2018年第9期10-13,共4页
Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of... Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of the absorp- tion and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously. Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle. 展开更多
关键词 QKD Security Simulation of continuous-variable quantum Key Distribution over Air-to-Water Channel Using Monte Carlo Method CV
原文传递
Practical Security of the Continuous-Variable Quantum Key Distribution with Locally-Generated Local Oscillators 被引量:1
11
作者 Biao Huang Yongjun Zhu +2 位作者 Pu Tang Yongmei Huang Zhenming Peng 《Journal of Applied Mathematics and Physics》 2019年第11期2751-2759,共9页
Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecu... Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecure quantum channel. In this paper, we propose a method of phase attack on reference pulses of the LLO-CVQKD with time-multiplexing. Under this phase attack, the phase drifts of reference pulses are manipulated by eavesdroppers, and then the phase compensation error is increased. Consequently, the secret key rate is reduced due to the imperfect phase compensation for quantum signals. Based on the noise model of imperfect phase compensation, the practical security of LLO-CVQKD under phase attack is analyzed. The simulation results show that the practical security is reduced due to the phase attack, yet it is still tight when system parameters are estimated by training signals. 展开更多
关键词 continuous-variable quantum Key Distribution Local Oscillator Reference Pulse PRACTICAL SECURITY Phase Attack
在线阅读 下载PDF
Quantum Inspired Adaptive Resource Management Algorithm for Scalable and Energy Efficient Fog Computing in Internet of Things(IoT)
12
作者 Sonia Khan Naqash Younas +3 位作者 Musaed Alhussein Wahib Jamal Khan Muhammad Shahid Anwar Khursheed Aurangzeb 《Computer Modeling in Engineering & Sciences》 2025年第3期2641-2660,共20页
Effective resource management in the Internet of Things and fog computing is essential for efficient and scalable networks.However,existing methods often fail in dynamic and high-demand environments,leading to resourc... Effective resource management in the Internet of Things and fog computing is essential for efficient and scalable networks.However,existing methods often fail in dynamic and high-demand environments,leading to resource bottlenecks and increased energy consumption.This study aims to address these limitations by proposing the Quantum Inspired Adaptive Resource Management(QIARM)model,which introduces novel algorithms inspired by quantum principles for enhanced resource allocation.QIARM employs a quantum superposition-inspired technique for multi-state resource representation and an adaptive learning component to adjust resources in real time dynamically.In addition,an energy-aware scheduling module minimizes power consumption by selecting optimal configurations based on energy metrics.The simulation was carried out in a 360-minute environment with eight distinct scenarios.This study introduces a novel quantum-inspired resource management framework that achieves up to 98%task offload success and reduces energy consumption by 20%,addressing critical challenges of scalability and efficiency in dynamic fog computing environments. 展开更多
关键词 quantum computing resource management energy efficiency fog computing Internet of Things
在线阅读 下载PDF
Quantum Computing Gamble Bets on Stealthy Majorana Qubits
13
作者 Chris Palmer 《Engineering》 2025年第12期8-10,共3页
With a paper published in the 19 February 2025 issue of Nature[1],Microsoft(Redmond,WA,USA)fanned the flames of its unique vision for quantum computing:a stable,error-resistant qubit based on the Majorana fermion,one ... With a paper published in the 19 February 2025 issue of Nature[1],Microsoft(Redmond,WA,USA)fanned the flames of its unique vision for quantum computing:a stable,error-resistant qubit based on the Majorana fermion,one of the strangest and most elusive particles in physics.The Microsoft Azure Quantum research team’s descriptions of a means to detect the as-yet theoretical particles[1]—called“an entirely new state of matter”by Microsoft’s chief executive officer[2]—and a design for a chip powered by them(Fig.1)[3]have refocused attention on the company’s ambition to build a topological quantum computer.The approach—if it works—could potentially leapfrog every other in the field. 展开更多
关键词 stealthy qubits topological quantum computer majorana fermions stable qubits majorana fermionone error resistant qubits quantum computing microsoft azure
在线阅读 下载PDF
Developing a Predictive Platform for Salmonella Antimicrobial Resistance Based on a Large Language Model and Quantum Computing
14
作者 Yujie You Kan Tan +1 位作者 Zekun Jiang Le Zhang 《Engineering》 2025年第5期174-184,共11页
As a common foodborne pathogen,Salmonella poses risks to public health safety,common given the emergence of antimicrobial-resistant strains.However,there is currently a lack of systematic platforms based on large lang... As a common foodborne pathogen,Salmonella poses risks to public health safety,common given the emergence of antimicrobial-resistant strains.However,there is currently a lack of systematic platforms based on large language models(LLMs)for Salmonella resistance prediction,data presentation,and data sharing.To overcome this issue,we firstly propose a two-step feature-selection process based on the chi-square test and conditional mutual information maximization to find the key Salmonella resistance genes in a pan-genomics analysis and develop an LLM-based Salmonella antimicrobial-resistance predictive(SARPLLM)algorithm to achieve accurate antimicrobial-resistance prediction,based on Qwen2 LLM and low-rank adaptation.Secondly,we optimize the time complexity to compute the sample distance from the linear to logarithmic level by constructing a quantum data augmentation algorithm denoted as QSMOTEN.Thirdly,we build up a user-friendly Salmonella antimicrobial-resistance predictive online platform based on knowledge graphs,which not only facilitates online resistance prediction for users but also visualizes the pan-genomics analysis results of the Salmonella datasets. 展开更多
关键词 Salmonella resistance prediction Pan-genomics Large language model quantum computing BIOINFORMATICS
在线阅读 下载PDF
Adiabatic holonomic quantum computation in decoherence-free subspace with two-body interaction
15
作者 Xiaoyu Sun Lei Qiao Peizi Zhao 《Chinese Physics B》 2025年第9期97-102,共6页
Adiabatic holonomic gates possess the geometric robustness of adiabatic geometric phases,i.e.,dependence only on the evolution path of the parameter space but not on the evolution details of the quantum system,which,w... Adiabatic holonomic gates possess the geometric robustness of adiabatic geometric phases,i.e.,dependence only on the evolution path of the parameter space but not on the evolution details of the quantum system,which,when coordinated with decoherence-free subspaces,permits additional resilience to the collective dephasing environment.However,the previous scheme[Phys.Rev.Lett.95130501(2005)]of adiabatic holonomic quantum computation in decoherence-free subspaces requires four-body interaction that is challenging in practical implementation.In this work,we put forward a scheme to realize universal adiabatic holonomic quantum computation in decoherence-free subspaces using only realistically available two-body interaction,thereby avoiding the difficulty of implementing four-body interaction.Furthermore,an arbitrary one-qubit gate in our scheme can be realized by a single-shot implementation,which eliminates the need to combine multiple gates for realizing such a gate. 展开更多
关键词 adiabatic evolution holonomic quantum computation decoherence-free subspaces
原文传递
Scaled Up Chip Pushes Quantum Computing a Bit Closer to Reality
16
作者 Chris Palmer 《Engineering》 2025年第7期6-8,共3页
In the 9 December 2024 issue of Nature[1],a team of Google engineers reported breakthrough results using“Willow”,their lat-est quantum computing chip(Fig.1).By meeting a milestone“below threshold”reduction in the ... In the 9 December 2024 issue of Nature[1],a team of Google engineers reported breakthrough results using“Willow”,their lat-est quantum computing chip(Fig.1).By meeting a milestone“below threshold”reduction in the rate of errors that plague super-conducting circuit-based quantum computing systems(Fig.2),the work moves the field another step towards its promised super-charged applications,albeit likely still many years away.Areas expected to benefit from quantum computing include,among others,drug discovery,materials science,finance,cybersecurity,and machine learning. 展开更多
关键词 materials science BREAKTHROUGH drug discovery willow chip quantum computing superconducting circuits error reduction applications
在线阅读 下载PDF
From portfolio optimization to quantum blockchain and security: a systematic review of quantum computing in finance
17
作者 Abha Satyavan Naik Esra Yeniaras +2 位作者 Gerhard Hellstern Grishma Prasad Sanjay Kumar Lalta Prasad Vishwakarma 《Financial Innovation》 2025年第1期2536-2602,共67页
The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the explo... The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas. 展开更多
关键词 Portfolio optimization Fraud detection Derivative pricing Risk calculation Monte carlo quantum blockchain quantum-resistant blockchain Digital signature algorithms Post-quantum cryptography SECURITY Privacy-preserving blockchain quantum computing
在线阅读 下载PDF
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
18
作者 马鸿鑫 鲍皖苏 +1 位作者 李宏伟 周淳 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第8期65-70,共6页
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy ... We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. 展开更多
关键词 quantum hacking two-way continuous-variable quantum key distribution Trojan-horse
原文传递
Temperature effects on atmospheric continuous-variable quantum key distribution
19
作者 Shu-Jing Zhang Hong-Xin Ma +3 位作者 Xiang Wang Chun Zhou Wan-Su Bao Hai-Long Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第8期56-61,共6页
Compared with the fiber channel,the atmospheric channel offers the possibility of a broader geographical coverage and more flexible transmission for continuous-variable quantum key distribution(CVQKD).However,the fluc... Compared with the fiber channel,the atmospheric channel offers the possibility of a broader geographical coverage and more flexible transmission for continuous-variable quantum key distribution(CVQKD).However,the fluctuation of atmospheric conditions will lead to the loss of performance in atmospheric quantum communication.In this paper,we study how temperature affects atmospheric CVQKD.We mainly consider the temperature effects on the transmittance and interruption probability.From the numerical simulation analysis,it can be shown that the performance of atmospheric CVQKD is improved as temperature increases,with the other factors fixed.Moreover,the results in this work can be used to evaluate the feasibility of the experimental implementation of the atmospheric CVQKD protocols. 展开更多
关键词 ATMOSPHERIC continuous-variable quantum KEY distribution temperature effects performance SECRET KEY rate
原文传递
Performance analysis of continuous-variable measurement-device-independent quantum key distribution under diverse weather conditions
20
作者 Shu-Jing Zhang Chen Xiao +4 位作者 Chun Zhou Xiang Wang Jian-Shu Yao Hai-Long Zhang Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第2期100-106,共7页
The effects of weather conditions are ubiquitous in practical wireless quantum communication links.Here in this work,the performances of atmospheric continuous-variable measurement-device-independent quantum key distr... The effects of weather conditions are ubiquitous in practical wireless quantum communication links.Here in this work,the performances of atmospheric continuous-variable measurement-device-independent quantum key distribution(CV-MDI-QKD)under diverse weather conditions are analyzed quantitatively.According to the Mie scattering theory and atmospheric CV-MDI-QKD model,we numerically simulate the relationship between performance of CV-MDI-QKD and the rainy and foggy conditions,aiming to get close to the actual combat environment in the future.The results show that both rain and fog will degrade the performance of the CV-MDI-QKD protocol.Under the rainy condition,the larger the raindrop diameter,the more obvious the extinction effect is and the lower the secret key rate accordingly.In addition,we find that the secret key rate decreases with the increase of spot deflection distance and the fluctuation of deflection.Under the foggy condition,the results illustrate that the transmittance decreases with the increase of droplet radius or deflection distance,which eventually yields the decrease in the secret key rate.Besides,in both weather conditions,the increase of transmission distance also leads the secret key rate to deteriorate.Our work can provide a foundation for evaluating the performance evaluation and successfully implementing the atmospheric CV-MDI-QKD in the future field operation environment under different weather conditions. 展开更多
关键词 weather conditions atmospheric continuous-variable measurement-device-independent quantum key distribution(CV-MDI-QKD) performance
原文传递
上一页 1 2 102 下一页 到第
使用帮助 返回顶部