期刊文献+
共找到221篇文章
< 1 2 12 >
每页显示 20 50 100
Spherical reconciliation for a continuous-variable quantum key distribution 被引量:1
1
作者 卢钊 史建红 李风光 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第4期109-114,共6页
Information reconciliation is a significant step for a continuous-variable quantum key distribution(CV-QKD) system.We propose a reconciliation method that allows two authorized parties to extract a consistent and se... Information reconciliation is a significant step for a continuous-variable quantum key distribution(CV-QKD) system.We propose a reconciliation method that allows two authorized parties to extract a consistent and secure binary key in a CV-QKD protocol,which is based on Gaussian-modulated coherent states and homodyne detection.This method named spherical reconciliation is based on spherical quantization and non-binary low-density parity-check(LDPC) codes.With the suitable signal-to-noise ratio(SNR) and code rate of non-binary LDPC codes,spherical reconciliation algorithm has a high efficiency and can extend the transmission distance of CV-QKD. 展开更多
关键词 continuous-variable quantum key distribution QUANTIZATION spherical reconciliation
原文传递
Security Simulation of Continuous-Variable Quantum Key Distribution over Air-to-Water Channel Using Monte Carlo Method 被引量:1
2
作者 Cai-Lang Xie Ying Guo +2 位作者 Yi-Jun Wang Duan Huang Ling Zhang 《Chinese Physics Letters》 SCIE CAS CSCD 2018年第9期10-13,共4页
Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of... Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of the absorp- tion and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously. Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle. 展开更多
关键词 QKD Security Simulation of continuous-variable quantum key distribution over Air-to-Water Channel Using Monte Carlo Method CV
原文传递
Continuous-variable quantum key distribution based on continuous random basis choice 被引量:1
3
作者 Weiqi Liu Jinye Peng +3 位作者 Peng Huang Shiyu Wang Tao Wang Guihua Zeng 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第7期214-219,共6页
Gaussian-modulated coherent state quantum key distribution is gradually moving towards practical application. Generally, the involved scheme is based on the binary random basis choice. To improve the performance and s... Gaussian-modulated coherent state quantum key distribution is gradually moving towards practical application. Generally, the involved scheme is based on the binary random basis choice. To improve the performance and security, we present a scheme based on a continuous random basis choice. The results show that our scheme obviously improves the performance, such as the secure communication distance. Our scheme avoids comparing the measurement basis and discarding the key bits, and it can be easily implemented with current technology. Moreover, the imperfection of the basis choice can be well removed by the known phase compensation algorithm. 展开更多
关键词 continuous-variable quantum key distribution basis choice
原文传递
Short-wave infrared continuous-variable quantum key distribution over satellite-to-submarine channels
4
作者 Qingquan Peng Qin Liao +2 位作者 Hai Zhong Junkai Hu Ying Guo 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期211-220,共10页
The trans-media transmission of quantum pulse is one of means of free-space transmission which can be applied in continuous-variable quantum key distribution(CVQKD)system.In traditional implementations for atmospheric... The trans-media transmission of quantum pulse is one of means of free-space transmission which can be applied in continuous-variable quantum key distribution(CVQKD)system.In traditional implementations for atmospheric channels,the 1500-to-1600-nm pulse is regarded as an ideal quantum pulse carrier.However,the underwater transmission of this pulses tends to suffer from severe attenuation,which inevitably deteriorates the security of the whole CVQKD system.In this paper,we propose an alternative scheme for implementations of CVQKD over satellite-to-submarine channels.We estimate the parameters of the trans-media channels,involving atmosphere,sea surface and seawater and find that the shortwave infrared performs well in the above channels.The 450-nm pulse is used for generations of quantum signal carriers to accomplish quantum communications through atmosphere,sea surface and seawater channels.Numerical simulations show that the proposed scheme can achieve the transmission distance of 600 km.In addition,we demonstrate that non-Gaussian operations can further lengthen its maximal transmission distance,which contributes to the establishment of practical global quantum networks. 展开更多
关键词 continuous-variable quantum key distribution(CVQKD) short-wave infrared satellite-to-submarine
原文传递
Finite-size analysis of eight-state continuous-variable quantum key distribution with the linear optics cloning machine
5
作者 Hang Zhang Yu Mao +3 位作者 Duan Huang Ying Guo Xlaodong Wu and Ling Zhang* 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第9期205-212,共8页
We propose a method to improve the secret key rate of an eight-state continuous-variable quantum key distribution(CVQKD) by using a linear optics cloning machine(LOCM). In the proposed scheme, an LOCM is exploited... We propose a method to improve the secret key rate of an eight-state continuous-variable quantum key distribution(CVQKD) by using a linear optics cloning machine(LOCM). In the proposed scheme, an LOCM is exploited to compensate for the imperfections of Bob's apparatus, so that the generated secret key rate of the eight-state protocol could be well enhanced. We investigate the security of our proposed protocol in a finite-size scenario so as to further approach the practical value of a secret key rate. Numeric simulation shows that the LOCM with reasonable tuning gain λ and transmittance τcan effectively improve the secret key rate of eight-state CVQKD in both an asymptotic limit and a finite-size regime.Furthermore, we obtain the tightest bound of the secure distance by taking the finite-size effect into account, which is more practical than that obtained in the asymptotic limit. 展开更多
关键词 continuous-variable quantum key distribution linear optics cloning machine FINITE-SIZE
原文传递
Practical security of continuous-variable quantum key distribution under finite-dimensional effect of multi-dimensional reconciliation 被引量:2
6
作者 Yingming Zhou Xue-Qin Jiang +3 位作者 Weiqi Liu Tao Wang Peng Huang Guihua Zeng 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第5期101-107,共7页
The well-known multi-dimensional reconciliation is an effective method used in the continuous-variable quantum key distribution in the long-distance and the low signal-to-noise-ratio scenarios.The virtual channel empl... The well-known multi-dimensional reconciliation is an effective method used in the continuous-variable quantum key distribution in the long-distance and the low signal-to-noise-ratio scenarios.The virtual channel employed to exchange data is generally established by using a finite-dimensional rotation in the reconciliation procedure.In this paper,we found that the finite dimension of the multi-dimensional reconciliation inevitably leads to the mismatch of the signal-to-noise-ratio between the quantum channel and the virtual channel,which may be called the finite-dimension effect.Such an effect results in an overestimation on the secret key rate,and subsequently induces vital practical security loopholes. 展开更多
关键词 multi-dimensional reconciliation finite-dimensional effect continuous-variable quantum key distribution
原文传递
Finite-size analysis of continuous-variable quantum key distribution with entanglement in the middle 被引量:1
7
作者 Ying Guo Yu Su +2 位作者 Jian Zhou Ling Zhang Duan Huang 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第1期232-239,共8页
Continuous-variable quantum key distribution(CVQKD) protocols with entanglement in the middle(EM) enable long maximal transmission distances for quantum communications. For the security analysis of the protocols, it i... Continuous-variable quantum key distribution(CVQKD) protocols with entanglement in the middle(EM) enable long maximal transmission distances for quantum communications. For the security analysis of the protocols, it is usually assumed that Eve performs collective Gaussian attacks and there is a lack of finite-size analysis of the protocols. However,in this paper we consider the finite-size regime of the EM-based CVQKD protocols by exposing the protocol to collective attacks and coherent attacks. We differentiate between the collective attacks and the coherent attacks while comparing asymptotic key rate and the key rate in the finite-size scenarios. Moreover, both symmetric and asymmetric configurations are collated in a contrastive analysis. As expected, the derived results in the finite-size scenarios are less useful than those acquired in the asymptotic regime. Nevertheless, we find that CVQKD with entanglement in the middle is capable of providing fully secure secret keys taking the finite-size effects into account with transmission distances of more than 30 km. 展开更多
关键词 continuous-variable quantum key distribution ENTANGLEMENT in the middle FINITE-SIZE coherent attack
原文传递
Practical Security of the Continuous-Variable Quantum Key Distribution with Locally-Generated Local Oscillators 被引量:1
8
作者 Biao Huang Yongjun Zhu +2 位作者 Pu Tang Yongmei Huang Zhenming Peng 《Journal of Applied Mathematics and Physics》 2019年第11期2751-2759,共9页
Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecu... Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecure quantum channel. In this paper, we propose a method of phase attack on reference pulses of the LLO-CVQKD with time-multiplexing. Under this phase attack, the phase drifts of reference pulses are manipulated by eavesdroppers, and then the phase compensation error is increased. Consequently, the secret key rate is reduced due to the imperfect phase compensation for quantum signals. Based on the noise model of imperfect phase compensation, the practical security of LLO-CVQKD under phase attack is analyzed. The simulation results show that the practical security is reduced due to the phase attack, yet it is still tight when system parameters are estimated by training signals. 展开更多
关键词 continuous-variable quantum key distribution Local Oscillator Reference Pulse PRACTICAL SECURITY Phase Attack
在线阅读 下载PDF
Temperature effects on atmospheric continuous-variable quantum key distribution
9
作者 Shu-Jing Zhang Hong-Xin Ma +3 位作者 Xiang Wang Chun Zhou Wan-Su Bao Hai-Long Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第8期56-61,共6页
Compared with the fiber channel,the atmospheric channel offers the possibility of a broader geographical coverage and more flexible transmission for continuous-variable quantum key distribution(CVQKD).However,the fluc... Compared with the fiber channel,the atmospheric channel offers the possibility of a broader geographical coverage and more flexible transmission for continuous-variable quantum key distribution(CVQKD).However,the fluctuation of atmospheric conditions will lead to the loss of performance in atmospheric quantum communication.In this paper,we study how temperature affects atmospheric CVQKD.We mainly consider the temperature effects on the transmittance and interruption probability.From the numerical simulation analysis,it can be shown that the performance of atmospheric CVQKD is improved as temperature increases,with the other factors fixed.Moreover,the results in this work can be used to evaluate the feasibility of the experimental implementation of the atmospheric CVQKD protocols. 展开更多
关键词 ATMOSPHERIC continuous-variable quantum key distribution temperature effects performance SECRET key rate
原文传递
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
10
作者 马鸿鑫 鲍皖苏 +1 位作者 李宏伟 周淳 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第8期65-70,共6页
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy ... We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. 展开更多
关键词 quantum hacking two-way continuous-variable quantum key distribution Trojan-horse
原文传递
Improving continuous-variable quantum key distribution under local oscillator intensity attack using entanglement in the middle
11
作者 杨芳丽 郭迎 +2 位作者 石金晶 王焕礼 潘矜矜 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第10期54-60,共7页
A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy A... A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator (LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection. 展开更多
关键词 continuous-variable quantum key distribution local oscillator intensity attack entanglement in the middle
原文传递
Practical security analysis of continuous-variable quantum key distribution with an unbalanced heterodyne detector
12
作者 Lingzhi Kong Weiqi Liu +1 位作者 Fan Jing Chen He 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第7期119-126,共8页
When developing a practical continuous-variable quantum key distribution(CVQKD),the detector is necessary at the receiver's side.We investigate the practical security of the CVQKD system with an unbalanced heterod... When developing a practical continuous-variable quantum key distribution(CVQKD),the detector is necessary at the receiver's side.We investigate the practical security of the CVQKD system with an unbalanced heterodyne detector.The results show that unbalanced heterodyne detector introduces extra excess noise into the system and decreases the lower bound of the secret key rate without awareness of the legitimate communicators,which leaves loopholes for Eve to attack the system.In addition,we find that the secret key rate decreases more severely with the increase in the degree of imbalance and the excess noise induced by the imbalance is proportional to the intensity of the local oscillator(LO)under the same degree of imbalance.Finally,a countermeasure is proposed to resist these kinds of effects. 展开更多
关键词 continuous-variable quantum key distribution heterodyne detector
原文传递
Continuous-variable quantum key distribution based on photon addition operation
13
作者 Xiao-Ting Chen Lu-Ping Zhang +2 位作者 Shou-Kang Chang Huan Zhang Li-Yun Hu 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第6期126-132,共7页
It is shown that the non-Gaussian operations can not only be used to prepare the nonclassical states, but also to improve the entanglement degree between Gaussian states. Thus these operations are naturally considered... It is shown that the non-Gaussian operations can not only be used to prepare the nonclassical states, but also to improve the entanglement degree between Gaussian states. Thus these operations are naturally considered to enhance the performance of continuous variable quantum key distribution(CVQKD), in which the non-Gaussian operations are usually placed on the right-side of the entangled source. Here we propose another scheme for further improving the performance of CVQKD with the entangled-based scheme by operating photon-addition operation on the left-side of the entangled source.It is found that the photon-addition operation on the left-side presents both higher success probability and better secure key rate and transmission distance than the photon subtraction on the right-side, although they share the same maximal tolerable noise. In addition, compared to both photon subtraction and photon addition on the right-side, our scheme shows the best performance and the photon addition on the right-side is the worst. 展开更多
关键词 non-Gaussian operations continuous variable quantum key distribution photon-addition operation
原文传递
Balancing four-state continuous-variable quantum key distribution with linear optics cloning machine
14
作者 吴晓东 廖骎 +2 位作者 黄端 吴湘华 郭迎 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第11期97-103,共7页
We show that the secret key generation rate can be balanced with the maximum secure distance of four-state continuous-variable quantum key distribution(CV-QKD) by using the linear optics cloning machine(LOCM). Ben... We show that the secret key generation rate can be balanced with the maximum secure distance of four-state continuous-variable quantum key distribution(CV-QKD) by using the linear optics cloning machine(LOCM). Benefiting from the LOCM operation, the LOCM-tuned noise can be employed by the reference partner of reconciliation to achieve higher secret key generation rates over a long distance. Simulation results show that the LOCM operation can flexibly regulate the secret key generation rate and the maximum secure distance and improve the performance of four-state CV-QKD protocol by dynamically tuning parameters in an appropriate range. 展开更多
关键词 four states linear optics cloning machine quantum key distribution
原文传递
Pilot-reference-free continuous-variable quantum key distribution with efficient decoy-state analysis
15
作者 ANRAN JIN XINGJIAN ZHANG +2 位作者 LIANG JIANG RICHARD VPENTY PEI ZENG 《Photonics Research》 2025年第8期2013-2032,共20页
Continuous-variable quantum key distribution(CV QKD)using optical coherent detectors is practically favorable due to its low implementation cost,flexibility of wavelength division multiplexing,and compatibility with s... Continuous-variable quantum key distribution(CV QKD)using optical coherent detectors is practically favorable due to its low implementation cost,flexibility of wavelength division multiplexing,and compatibility with standard coherent communication technologies.However,the security analysis and parameter estimation of CV QKD are complicated due to the infinite-dimensional latent Hilbert space.Also,the transmission of strong reference pulses undermines the security and complicates the experiments.In this work,we tackle these two problems by presenting a time-bin-encoding CV protocol with a simple phase-error-based security analysis valid under general coherent attacks.With the key encoded into the relative intensity between two optical modes,the need for global references is removed.Furthermore,phase randomization can be introduced to decouple the security analysis of different photon-number components.We can hence tag the photon number for each round,effectively estimate the associated privacy using a carefully designed coherent-detection method,and independently extract encryption keys from each component.Simulations manifest that the protocol using multi-photon components increases the key rate by two orders of magnitude compared to the one using only the single-photon component.Meanwhile,the protocol with four-intensity decoy analysis is sufficient to yield tight parameter estimation with a short-distance key-rate performance comparable to the best Bennett-Brassard-1984 implementation. 展开更多
关键词 security analysis continuous variable quantum key distribution cv qkd transmission strong reference pulses pilot reference free optical coherent detectors parameter estimation standard coherent communication technologieshoweverthe
原文传递
Multi-protocol quantum key distribution decoding chip
16
作者 Chun-Xue Zhang Jian-Guang Li +3 位作者 Yue Wang Wei Chen Jia-Shun Zhang Jun-Ming An 《Chinese Physics B》 2025年第5期34-41,共8页
Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,sca... Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks. 展开更多
关键词 quantum key distribution(QKD) secure key rate decoding chip quantum bit error rate
原文传递
Effect of pseudo-random number on the security of quantum key distribution protocol
17
作者 Xiao-Liang Yang Yu-Qing Li Hong-Wei Li 《Chinese Physics B》 2025年第2期41-46,共6页
In the process of quantum key distribution(QKD), the communicating parties need to randomly determine quantum states and measurement bases. To ensure the security of key distribution, we aim to use true random sequenc... In the process of quantum key distribution(QKD), the communicating parties need to randomly determine quantum states and measurement bases. To ensure the security of key distribution, we aim to use true random sequences generated by true random number generators as the source of randomness. In practical systems, due to the difficulty of obtaining true random numbers, pseudo-random number generators are used instead. Although the random numbers generated by pseudorandom number generators are statistically random, meeting the requirements of uniform distribution and independence,they rely on an initial seed to generate corresponding pseudo-random sequences. Attackers may predict future elements from the initial elements of the random sequence, posing a security risk to quantum key distribution. This paper analyzes the problems existing in current pseudo-random number generators and proposes corresponding attack methods and applicable scenarios based on the vulnerabilities in the pseudo-random sequence generation process. Under certain conditions, it is possible to obtain the keys of the communicating parties with very low error rates, thus effectively attacking the quantum key system. This paper presents new requirements for the use of random numbers in quantum key systems, which can effectively guide the security evaluation of quantum key distribution protocols. 展开更多
关键词 quantum key distribution PSEUDO-RANDOM SECURITY
原文传递
Mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states
18
作者 Zhigang Shen Yuting Lu +1 位作者 Yang Yu Shengmei Zhao 《Chinese Physics B》 2025年第9期57-64,共8页
A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralde... A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack. 展开更多
关键词 mode-pairing quantum key distribution heralded pair-coherent source passive decoy-state key generation rate
原文传递
Improving the performance of reference-frame-independent measurement-device-independent quantum key distribution in hybrid channels
19
作者 Yan-Mei Zhao Chun Zhou +8 位作者 Xiao-Lei Jiang Yi-Fei Lu Yu Zhou Hai-Tao Wang Yang Wang Jia-Ji Li Yan-Yang Zhou Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 2025年第5期26-32,共7页
The robustness of reference-frame-independent measurement-device-independent quantum key distribution(RFIMDI-QKD)against detection system vulnerabilities and its tolerance to reference frame drifts make it an ideal ch... The robustness of reference-frame-independent measurement-device-independent quantum key distribution(RFIMDI-QKD)against detection system vulnerabilities and its tolerance to reference frame drifts make it an ideal choice for hybrid channels.However,the impact of atmospheric turbulence on transmittance fluctuations remains a significant challenge for enhancing the performance of RFI-MDI-QKD.In this paper,we apply prefixed-threshold real-time selection and advantage distillation techniques to RFI-MDI-QKD in a hybrid channels scenario.Then,we analytically derive formulas for secret key rate in hybrid channels.Simulation results show that our modified scheme has apparent advances in both maximum tolerant loss and secure key rate compared to the fiber-only channel.Specifically,the result demonstrates that the maximum transmission distance can be improved by 15 km and 28 km when N=10^(12)and 10^(11).Our work not only provides a more robust key distribution protocol but also establishes a solid theoretical foundation for enhancing the performance of RFI-MDI-QKD in hybrid channels. 展开更多
关键词 quantum key distribution measurement-device-independent hybrid channels
原文传递
Mode-pairing quantum key distribution with multi-step advantage distillation
20
作者 Shizhuo Li Xin Liu +1 位作者 Zhenrong Zhang Kejin Wei 《Chinese Physics B》 2025年第9期85-95,共11页
The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)prot... The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate. 展开更多
关键词 mode-pairing quantum key distribution multi-step advantage distillation secret key rate
原文传递
上一页 1 2 12 下一页 到第
使用帮助 返回顶部