期刊文献+
共找到227篇文章
< 1 2 12 >
每页显示 20 50 100
Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources 被引量:1
1
作者 古亚彬 鲍皖苏 +1 位作者 汪洋 周淳 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第4期1-5,共5页
The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD h... The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD has become a focus recently. To improve the practieM performance of the two-way QKD, we present a security analysis of a two-way QKD protocol based on the decoy method with heralded single-photon sources (HSPSs). We make use of two approaches to calculate the yield and the quantum bit error rate of single-photon and two-photon pulses. Then we present the secret key generation rate based on the GLLP formula. The numerical simulation shows that the protocol with HSPSs has an advantage in the secure distance compared with weak coherent state sources. In addition, we present the final secret key by considering the statistical fluctuation of the yield generation rate of the LM05 protocol with finite resources and the error rate. 展开更多
关键词 QKD in IS on of Security of the Decoy State two-way quantum key distribution with Finite Resources with
原文传递
Practical 15 Mb/s Quantum Key Distribution Using Compact Single-Photon Detectors
2
作者 Tingting Shi Zhengyu Yan +4 位作者 Yuanbin Fan Lai Zhou Yuanfei Gao Davide G.Marangon Zhiliang Yuan 《Chinese Physics Letters》 2025年第12期172-177,共6页
Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key r... Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key rate(SKR),which is a critical factor for real-world applications.Herein,we report a practical QKD system,equipped with compact gated InGaAs/InP single-photon detectors(SPDs),that can generate a high SKR of 15.2 Mb/s with a channel loss of 2 dB.This exceptional performance stems from the ultra-low afterpulsing probability of the SPDs,which significantly reduces the bit error rate in the QKD system.The typical quantum bit error rate is 1.3%.The results validate the feasibility of an integrated,practical QKD system and offer a reliable solution for the future development of real-world QKD networks. 展开更多
关键词 quantum key distribution qkd afterpulsing probability secure key rate quantum key distribution single photon detectors secure key rate skr which bit error rate
原文传递
Multi-protocol quantum key distribution decoding chip
3
作者 Chun-Xue Zhang Jian-Guang Li +3 位作者 Yue Wang Wei Chen Jia-Shun Zhang Jun-Ming An 《Chinese Physics B》 2025年第5期34-41,共8页
Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,sca... Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks. 展开更多
关键词 quantum key distribution(QKD) secure key rate decoding chip quantum bit error rate
原文传递
Effect of pseudo-random number on the security of quantum key distribution protocol
4
作者 Xiao-Liang Yang Yu-Qing Li Hong-Wei Li 《Chinese Physics B》 2025年第2期41-46,共6页
In the process of quantum key distribution(QKD), the communicating parties need to randomly determine quantum states and measurement bases. To ensure the security of key distribution, we aim to use true random sequenc... In the process of quantum key distribution(QKD), the communicating parties need to randomly determine quantum states and measurement bases. To ensure the security of key distribution, we aim to use true random sequences generated by true random number generators as the source of randomness. In practical systems, due to the difficulty of obtaining true random numbers, pseudo-random number generators are used instead. Although the random numbers generated by pseudorandom number generators are statistically random, meeting the requirements of uniform distribution and independence,they rely on an initial seed to generate corresponding pseudo-random sequences. Attackers may predict future elements from the initial elements of the random sequence, posing a security risk to quantum key distribution. This paper analyzes the problems existing in current pseudo-random number generators and proposes corresponding attack methods and applicable scenarios based on the vulnerabilities in the pseudo-random sequence generation process. Under certain conditions, it is possible to obtain the keys of the communicating parties with very low error rates, thus effectively attacking the quantum key system. This paper presents new requirements for the use of random numbers in quantum key systems, which can effectively guide the security evaluation of quantum key distribution protocols. 展开更多
关键词 quantum key distribution PSEUDO-RANDOM SECURITY
原文传递
Mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states
5
作者 Zhigang Shen Yuting Lu +1 位作者 Yang Yu Shengmei Zhao 《Chinese Physics B》 2025年第9期57-64,共8页
A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralde... A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack. 展开更多
关键词 mode-pairing quantum key distribution heralded pair-coherent source passive decoy-state key generation rate
原文传递
Improving the performance of reference-frame-independent measurement-device-independent quantum key distribution in hybrid channels
6
作者 Yan-Mei Zhao Chun Zhou +8 位作者 Xiao-Lei Jiang Yi-Fei Lu Yu Zhou Hai-Tao Wang Yang Wang Jia-Ji Li Yan-Yang Zhou Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 2025年第5期26-32,共7页
The robustness of reference-frame-independent measurement-device-independent quantum key distribution(RFIMDI-QKD)against detection system vulnerabilities and its tolerance to reference frame drifts make it an ideal ch... The robustness of reference-frame-independent measurement-device-independent quantum key distribution(RFIMDI-QKD)against detection system vulnerabilities and its tolerance to reference frame drifts make it an ideal choice for hybrid channels.However,the impact of atmospheric turbulence on transmittance fluctuations remains a significant challenge for enhancing the performance of RFI-MDI-QKD.In this paper,we apply prefixed-threshold real-time selection and advantage distillation techniques to RFI-MDI-QKD in a hybrid channels scenario.Then,we analytically derive formulas for secret key rate in hybrid channels.Simulation results show that our modified scheme has apparent advances in both maximum tolerant loss and secure key rate compared to the fiber-only channel.Specifically,the result demonstrates that the maximum transmission distance can be improved by 15 km and 28 km when N=10^(12)and 10^(11).Our work not only provides a more robust key distribution protocol but also establishes a solid theoretical foundation for enhancing the performance of RFI-MDI-QKD in hybrid channels. 展开更多
关键词 quantum key distribution measurement-device-independent hybrid channels
原文传递
Mode-pairing quantum key distribution with multi-step advantage distillation
7
作者 Shizhuo Li Xin Liu +1 位作者 Zhenrong Zhang Kejin Wei 《Chinese Physics B》 2025年第9期85-95,共11页
The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)prot... The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate. 展开更多
关键词 mode-pairing quantum key distribution multi-step advantage distillation secret key rate
原文传递
Asymmetric mode-pairing quantum key distribution with advantage distillation
8
作者 Hai-Tao Wang Chun Zhou +5 位作者 Yi-Fei Lu Chen-Peng Hao Yan-Mei Zhao Yan-Yang Zhou Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 2025年第4期109-115,共7页
Mode-pairing quantum key distribution(MP-QKD)is an excellent scheme that can exceed the repeaterless ratetransmittance bound without complex phase locking.Nevertheless,MP-QKD usually needs to ensure that the communica... Mode-pairing quantum key distribution(MP-QKD)is an excellent scheme that can exceed the repeaterless ratetransmittance bound without complex phase locking.Nevertheless,MP-QKD usually needs to ensure that the communication distances of the two channels are equal.To address the problem,the asymmetric MP-QKD protocol is proposed.In this paper,we enhance the performance of the asymmetric MP-QKD protocol based on the advantage distillation(AD)method without modifying the quantum process.The simulation results show that the AD method can extend the communication distance by about 70 km in the case of asymmetry.And we observe that as the misalignment error increases,the AD method further increases the expandable communication distance.Our work can further enhance the robustness and promote the practical application of the asymmetric MP-QKD. 展开更多
关键词 quantum key distribution asymmetric mode-pairing advantage distillation
原文传递
Improved reference-frame-independent quantum key distribution with intensity fluctuations
9
作者 Zi-Qi Chen Hao-Bing Sun +1 位作者 Ming-Shuo Sun Qin Wang 《Chinese Physics B》 2025年第2期48-52,共5页
Reference-frame-independent quantum key distribution(RFI-QKD)can avoid real-time calibration operation of reference frames and improve the efficiency of the communication process.However,due to imperfections of optica... Reference-frame-independent quantum key distribution(RFI-QKD)can avoid real-time calibration operation of reference frames and improve the efficiency of the communication process.However,due to imperfections of optical devices,there will inevitably exist intensity fluctuations in the source side of the QKD system,which will affect the final secure key rate.To reduce the influence of intensity fluctuations,an improved 3-intensity RFI-QKD scheme is proposed in this paper.After considering statistical fluctuations and implementing global parameter optimization,we conduct corresponding simulation analysis.The results show that our present work can present both higher key rate and a farther transmission distance than the standard method. 展开更多
关键词 quantum key distribution intensity fluctuations decoy-state method
原文传递
Intensity correlation distribution in gain-switched semiconductor laser for quantum key distribution
10
作者 Yuanfei Gao Tao Wang +1 位作者 Yixin Wang Zhiliang Yuan 《Journal of Semiconductors》 2025年第6期80-85,共6页
In the implementation of quantum key distribution,Security certification is a prerequisite for social deployment.Trans-mitters in decoy-BB84 systems typically employ gain-switched semiconductor lasers(GSSLs)to generat... In the implementation of quantum key distribution,Security certification is a prerequisite for social deployment.Trans-mitters in decoy-BB84 systems typically employ gain-switched semiconductor lasers(GSSLs)to generate optical pulses for encod-ing quantum information.However,the working state of the laser may violate the assumption of pulse independence.Here,we explored the dependence of intensity fluctuation and high-order correlation distribution of optical pulses on driving cur-rents at 2.5 GHz.We found the intensity correlation distribution had a significant dependence on the driving currents,which would affect the final key rate.By utilizing rate equations in our simulation,we confirmed the fluctuation and correlation origi-nated from the instability of gain-switched laser driven at a GHz-repetitive frequency.Finally,we evaluated the impact of inten-sity fluctuation on the secure key rate.This work will provide valuable insights for assessing whether the transmitter is operat-ing at optimal state in practice. 展开更多
关键词 intensity correlation gain-switched laser quantum key distribution
在线阅读 下载PDF
Protection path and security-metric-based resource allocation algorithm in quantum key distribution optical networks
11
作者 Li Liu Shengtong Zhai +1 位作者 Yao Pu Xu Zhang 《Chinese Physics B》 2025年第9期73-83,共11页
Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problem... Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks. 展开更多
关键词 quantum key distribution(QKD) optical network security metric protection path
原文传递
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
12
作者 马鸿鑫 鲍皖苏 +1 位作者 李宏伟 周淳 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第8期65-70,共6页
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy ... We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. 展开更多
关键词 quantum hacking two-way continuous-variable quantum key distribution Trojan-horse
原文传递
Reference-frame-independent quantum key distribution with two-way classical communication
13
作者 Chun Zhou Hai-Tao Wang +9 位作者 Yi-Fei Lu Xiao-Lei Jiang Yan-Mei Zhao Yu Zhou Yang Wang Jia-Ji Li Yan-Yang Zhou Xiang Wang Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期146-152,共7页
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In... The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest. 展开更多
关键词 quantum key distribution reference-frame-independent two-way classical communication
原文传递
Simultaneous two-way classical communication and measurement-deviceindependent quantum key distribution on oceanic quantum channels
14
作者 Hongyang Hu Hai Zhong +1 位作者 Wei Ye Ying Guo 《Communications in Theoretical Physics》 SCIE CAS CSCD 2022年第12期21-34,共14页
Simultaneous two-way classical and quantum(STCQ)communication combines both continuous classical coherent optical communication and continuous-variable quantum key distribution(CVQKD),which eliminates all detection-re... Simultaneous two-way classical and quantum(STCQ)communication combines both continuous classical coherent optical communication and continuous-variable quantum key distribution(CVQKD),which eliminates all detection-related imperfections by being measurement-device-independent(MDI).In this paper,we propose a protocol relying on STCQ communication on the oceanic quantum channel,in which the superposition-modulation-based coherent states depend on the information bits of both the secret key and the classical communication ciphertext.We analyse the encoding combination in classical communication and consider the probability distribution transmittance under seawater turbulence with various interference factors.Our numerical simulations of various practical scenarios demonstrate that the proposed protocol can simultaneously enable two-way classical communication and CV-MDI QKD with just a slight performance degradation transmission distance compared to the original CV-MDI QKD scheme.Moreover,the asymmetric situation outperforms the symmetric case in terms of transmission distance and optical modulation variance.We further take into consideration the impact of finite-size effects to illustrate the applicability of the proposed scheme in practical scenarios.The results show the feasibility of the underwater STCQ scheme,which contributes toward developing a global quantum communication network in free space. 展开更多
关键词 continuous-variable quantum key distribution measurement-device-independent SIMULTANEOUS oceanic turbulence channel transmittance
原文传递
A practical two-way system of quantum key distribution with untrusted source
15
作者 陈明娟 刘翔 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第10期40-45,共6页
The most severe problem of a two-way "plug-and-play" (p &: p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an "untrusted source". ... The most severe problem of a two-way "plug-and-play" (p &: p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an "untrusted source". This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered. 展开更多
关键词 statistic fluctuation untrusted source quantum key distribution
原文传递
Quantum key distribution and controlled quantum direct communication applying product state of qutrit 被引量:20
16
作者 ZHU Ai-dong ZHANG Shou 《量子电子学报》 CAS CSCD 北大核心 2007年第3期316-322,共7页
On basis of the nonlocality without entanglement proposed by Bennett,the properties of an orthogonal set of product states of two qutrits are revealed,i.e.,the transformation among different composite spaces can be re... On basis of the nonlocality without entanglement proposed by Bennett,the properties of an orthogonal set of product states of two qutrits are revealed,i.e.,the transformation among different composite spaces can be realized by using three unitary operations,and the correlation between two composite spaces is found.These properties can be used to quantum communication and quantum cryptography.As examples,we propose a scheme of controlled quantum secure direct communication and one of quantum key distribution.It is shown that applying the product state of qutrit to quantum information processing not only is of the advantages of large capacity and high efficiency,but ensures the security. 展开更多
关键词 quantum information NONLOCALITY QUTRIT product state quantum communication quantum key distribution
在线阅读 下载PDF
Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum 被引量:20
17
作者 王乐 赵生妹 +1 位作者 巩龙延 程维文 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第12期238-245,共8页
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc... In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. 展开更多
关键词 measurement-device-independent quantum key distribution orbital angular momentum atmospheric turbulence decoy states
原文传递
Fast implementation of length-adaptive privacy amplification in quantum key distribution 被引量:7
18
作者 张春梅 李默 +8 位作者 黄靖正 Patcharapong Treeviriyanupab 李宏伟 李芳毅 王川 银振强 陈巍 Keattisak Sripimanwat 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第9期112-117,共6页
Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is use... Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems. 展开更多
关键词 length-adaptive privacy amplification multiplication algorithms quantum key distribution
原文传递
Efficient error estimation in quantum key distribution 被引量:5
19
作者 李默 Patcharapong Treeviriyanupab +3 位作者 张春梅 银振强 陈巍 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第1期153-156,共4页
In a quantum key distribution(QKD) system, the error rate needs to be estimated for determining the joint probability distribution between legitimate parties, and for improving the performance of key reconciliation.... In a quantum key distribution(QKD) system, the error rate needs to be estimated for determining the joint probability distribution between legitimate parties, and for improving the performance of key reconciliation. We propose an efficient error estimation scheme for QKD, which is called parity comparison method(PCM). In the proposed method, the parity of a group of sifted keys is practically analysed to estimate the quantum bit error rate instead of using the traditional key sampling. From the simulation results, the proposed method evidently improves the accuracy and decreases revealed information in most realistic application situations. 展开更多
关键词 error estimation parity comparison quantum key distribution
原文传递
Quantum Key Distribution Scheme Based on Dense Encoding in Entangled States 被引量:4
20
作者 ZHANGXiao-Long ZHANGYue-Xia GAOKe-Lin 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第4期627-630,共4页
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the f... A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss. 展开更多
关键词 quantum key distribution dense coding quantum entanglement
在线阅读 下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部