The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD h...The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD has become a focus recently. To improve the practieM performance of the two-way QKD, we present a security analysis of a two-way QKD protocol based on the decoy method with heralded single-photon sources (HSPSs). We make use of two approaches to calculate the yield and the quantum bit error rate of single-photon and two-photon pulses. Then we present the secret key generation rate based on the GLLP formula. The numerical simulation shows that the protocol with HSPSs has an advantage in the secure distance compared with weak coherent state sources. In addition, we present the final secret key by considering the statistical fluctuation of the yield generation rate of the LM05 protocol with finite resources and the error rate.展开更多
Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key r...Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key rate(SKR),which is a critical factor for real-world applications.Herein,we report a practical QKD system,equipped with compact gated InGaAs/InP single-photon detectors(SPDs),that can generate a high SKR of 15.2 Mb/s with a channel loss of 2 dB.This exceptional performance stems from the ultra-low afterpulsing probability of the SPDs,which significantly reduces the bit error rate in the QKD system.The typical quantum bit error rate is 1.3%.The results validate the feasibility of an integrated,practical QKD system and offer a reliable solution for the future development of real-world QKD networks.展开更多
Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,sca...Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks.展开更多
In the process of quantum key distribution(QKD), the communicating parties need to randomly determine quantum states and measurement bases. To ensure the security of key distribution, we aim to use true random sequenc...In the process of quantum key distribution(QKD), the communicating parties need to randomly determine quantum states and measurement bases. To ensure the security of key distribution, we aim to use true random sequences generated by true random number generators as the source of randomness. In practical systems, due to the difficulty of obtaining true random numbers, pseudo-random number generators are used instead. Although the random numbers generated by pseudorandom number generators are statistically random, meeting the requirements of uniform distribution and independence,they rely on an initial seed to generate corresponding pseudo-random sequences. Attackers may predict future elements from the initial elements of the random sequence, posing a security risk to quantum key distribution. This paper analyzes the problems existing in current pseudo-random number generators and proposes corresponding attack methods and applicable scenarios based on the vulnerabilities in the pseudo-random sequence generation process. Under certain conditions, it is possible to obtain the keys of the communicating parties with very low error rates, thus effectively attacking the quantum key system. This paper presents new requirements for the use of random numbers in quantum key systems, which can effectively guide the security evaluation of quantum key distribution protocols.展开更多
A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralde...A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack.展开更多
The robustness of reference-frame-independent measurement-device-independent quantum key distribution(RFIMDI-QKD)against detection system vulnerabilities and its tolerance to reference frame drifts make it an ideal ch...The robustness of reference-frame-independent measurement-device-independent quantum key distribution(RFIMDI-QKD)against detection system vulnerabilities and its tolerance to reference frame drifts make it an ideal choice for hybrid channels.However,the impact of atmospheric turbulence on transmittance fluctuations remains a significant challenge for enhancing the performance of RFI-MDI-QKD.In this paper,we apply prefixed-threshold real-time selection and advantage distillation techniques to RFI-MDI-QKD in a hybrid channels scenario.Then,we analytically derive formulas for secret key rate in hybrid channels.Simulation results show that our modified scheme has apparent advances in both maximum tolerant loss and secure key rate compared to the fiber-only channel.Specifically,the result demonstrates that the maximum transmission distance can be improved by 15 km and 28 km when N=10^(12)and 10^(11).Our work not only provides a more robust key distribution protocol but also establishes a solid theoretical foundation for enhancing the performance of RFI-MDI-QKD in hybrid channels.展开更多
The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)prot...The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate.展开更多
Mode-pairing quantum key distribution(MP-QKD)is an excellent scheme that can exceed the repeaterless ratetransmittance bound without complex phase locking.Nevertheless,MP-QKD usually needs to ensure that the communica...Mode-pairing quantum key distribution(MP-QKD)is an excellent scheme that can exceed the repeaterless ratetransmittance bound without complex phase locking.Nevertheless,MP-QKD usually needs to ensure that the communication distances of the two channels are equal.To address the problem,the asymmetric MP-QKD protocol is proposed.In this paper,we enhance the performance of the asymmetric MP-QKD protocol based on the advantage distillation(AD)method without modifying the quantum process.The simulation results show that the AD method can extend the communication distance by about 70 km in the case of asymmetry.And we observe that as the misalignment error increases,the AD method further increases the expandable communication distance.Our work can further enhance the robustness and promote the practical application of the asymmetric MP-QKD.展开更多
Reference-frame-independent quantum key distribution(RFI-QKD)can avoid real-time calibration operation of reference frames and improve the efficiency of the communication process.However,due to imperfections of optica...Reference-frame-independent quantum key distribution(RFI-QKD)can avoid real-time calibration operation of reference frames and improve the efficiency of the communication process.However,due to imperfections of optical devices,there will inevitably exist intensity fluctuations in the source side of the QKD system,which will affect the final secure key rate.To reduce the influence of intensity fluctuations,an improved 3-intensity RFI-QKD scheme is proposed in this paper.After considering statistical fluctuations and implementing global parameter optimization,we conduct corresponding simulation analysis.The results show that our present work can present both higher key rate and a farther transmission distance than the standard method.展开更多
In the implementation of quantum key distribution,Security certification is a prerequisite for social deployment.Trans-mitters in decoy-BB84 systems typically employ gain-switched semiconductor lasers(GSSLs)to generat...In the implementation of quantum key distribution,Security certification is a prerequisite for social deployment.Trans-mitters in decoy-BB84 systems typically employ gain-switched semiconductor lasers(GSSLs)to generate optical pulses for encod-ing quantum information.However,the working state of the laser may violate the assumption of pulse independence.Here,we explored the dependence of intensity fluctuation and high-order correlation distribution of optical pulses on driving cur-rents at 2.5 GHz.We found the intensity correlation distribution had a significant dependence on the driving currents,which would affect the final key rate.By utilizing rate equations in our simulation,we confirmed the fluctuation and correlation origi-nated from the instability of gain-switched laser driven at a GHz-repetitive frequency.Finally,we evaluated the impact of inten-sity fluctuation on the secure key rate.This work will provide valuable insights for assessing whether the transmitter is operat-ing at optimal state in practice.展开更多
Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problem...Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks.展开更多
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy ...We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
Simultaneous two-way classical and quantum(STCQ)communication combines both continuous classical coherent optical communication and continuous-variable quantum key distribution(CVQKD),which eliminates all detection-re...Simultaneous two-way classical and quantum(STCQ)communication combines both continuous classical coherent optical communication and continuous-variable quantum key distribution(CVQKD),which eliminates all detection-related imperfections by being measurement-device-independent(MDI).In this paper,we propose a protocol relying on STCQ communication on the oceanic quantum channel,in which the superposition-modulation-based coherent states depend on the information bits of both the secret key and the classical communication ciphertext.We analyse the encoding combination in classical communication and consider the probability distribution transmittance under seawater turbulence with various interference factors.Our numerical simulations of various practical scenarios demonstrate that the proposed protocol can simultaneously enable two-way classical communication and CV-MDI QKD with just a slight performance degradation transmission distance compared to the original CV-MDI QKD scheme.Moreover,the asymmetric situation outperforms the symmetric case in terms of transmission distance and optical modulation variance.We further take into consideration the impact of finite-size effects to illustrate the applicability of the proposed scheme in practical scenarios.The results show the feasibility of the underwater STCQ scheme,which contributes toward developing a global quantum communication network in free space.展开更多
The most severe problem of a two-way "plug-and-play" (p &: p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an "untrusted source". ...The most severe problem of a two-way "plug-and-play" (p &: p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an "untrusted source". This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered.展开更多
On basis of the nonlocality without entanglement proposed by Bennett,the properties of an orthogonal set of product states of two qutrits are revealed,i.e.,the transformation among different composite spaces can be re...On basis of the nonlocality without entanglement proposed by Bennett,the properties of an orthogonal set of product states of two qutrits are revealed,i.e.,the transformation among different composite spaces can be realized by using three unitary operations,and the correlation between two composite spaces is found.These properties can be used to quantum communication and quantum cryptography.As examples,we propose a scheme of controlled quantum secure direct communication and one of quantum key distribution.It is shown that applying the product state of qutrit to quantum information processing not only is of the advantages of large capacity and high efficiency,but ensures the security.展开更多
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc...In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.展开更多
Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is use...Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.展开更多
In a quantum key distribution(QKD) system, the error rate needs to be estimated for determining the joint probability distribution between legitimate parties, and for improving the performance of key reconciliation....In a quantum key distribution(QKD) system, the error rate needs to be estimated for determining the joint probability distribution between legitimate parties, and for improving the performance of key reconciliation. We propose an efficient error estimation scheme for QKD, which is called parity comparison method(PCM). In the proposed method, the parity of a group of sifted keys is practically analysed to estimate the quantum bit error rate instead of using the traditional key sampling. From the simulation results, the proposed method evidently improves the accuracy and decreases revealed information in most realistic application situations.展开更多
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the f...A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.展开更多
基金Supported by the National Basic Research Program of China under Grant No 2013CB338002the National Natural Science Foundation of China under Grant Nos 11304397 and 61505261
文摘The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD has become a focus recently. To improve the practieM performance of the two-way QKD, we present a security analysis of a two-way QKD protocol based on the decoy method with heralded single-photon sources (HSPSs). We make use of two approaches to calculate the yield and the quantum bit error rate of single-photon and two-photon pulses. Then we present the secret key generation rate based on the GLLP formula. The numerical simulation shows that the protocol with HSPSs has an advantage in the secure distance compared with weak coherent state sources. In addition, we present the final secret key by considering the statistical fluctuation of the yield generation rate of the LM05 protocol with finite resources and the error rate.
基金supported by the Innovation Program for Quantum Science and Technology(Grant No.2024ZD0302500)the National Natural Science Foundation of China(Grant No.62250710162)the Beijing Natural Science Foundation(Grant No.Z230005)。
文摘Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key rate(SKR),which is a critical factor for real-world applications.Herein,we report a practical QKD system,equipped with compact gated InGaAs/InP single-photon detectors(SPDs),that can generate a high SKR of 15.2 Mb/s with a channel loss of 2 dB.This exceptional performance stems from the ultra-low afterpulsing probability of the SPDs,which significantly reduces the bit error rate in the QKD system.The typical quantum bit error rate is 1.3%.The results validate the feasibility of an integrated,practical QKD system and offer a reliable solution for the future development of real-world QKD networks.
基金supported by the Innovation Program for Quantum Science and Technology(Grant No.2021ZD0300701)the National Key Research and Development Program of China(Grant No.2018YFA0306403)the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDB43000000).
文摘Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks.
文摘In the process of quantum key distribution(QKD), the communicating parties need to randomly determine quantum states and measurement bases. To ensure the security of key distribution, we aim to use true random sequences generated by true random number generators as the source of randomness. In practical systems, due to the difficulty of obtaining true random numbers, pseudo-random number generators are used instead. Although the random numbers generated by pseudorandom number generators are statistically random, meeting the requirements of uniform distribution and independence,they rely on an initial seed to generate corresponding pseudo-random sequences. Attackers may predict future elements from the initial elements of the random sequence, posing a security risk to quantum key distribution. This paper analyzes the problems existing in current pseudo-random number generators and proposes corresponding attack methods and applicable scenarios based on the vulnerabilities in the pseudo-random sequence generation process. Under certain conditions, it is possible to obtain the keys of the communicating parties with very low error rates, thus effectively attacking the quantum key system. This paper presents new requirements for the use of random numbers in quantum key systems, which can effectively guide the security evaluation of quantum key distribution protocols.
基金Project supported by the National Natural Science Foundation of China(Grant No.62375140)the Postgraduate Research&Practice Innovation Program of Jiangsu Province,China(Grant No.KYCX241191 and SJCX250315)the Open Research Fund of the National Laboratory of Solid State Microstructures(Grant No.M36055)。
文摘A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack.
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410534)。
文摘The robustness of reference-frame-independent measurement-device-independent quantum key distribution(RFIMDI-QKD)against detection system vulnerabilities and its tolerance to reference frame drifts make it an ideal choice for hybrid channels.However,the impact of atmospheric turbulence on transmittance fluctuations remains a significant challenge for enhancing the performance of RFI-MDI-QKD.In this paper,we apply prefixed-threshold real-time selection and advantage distillation techniques to RFI-MDI-QKD in a hybrid channels scenario.Then,we analytically derive formulas for secret key rate in hybrid channels.Simulation results show that our modified scheme has apparent advances in both maximum tolerant loss and secure key rate compared to the fiber-only channel.Specifically,the result demonstrates that the maximum transmission distance can be improved by 15 km and 28 km when N=10^(12)and 10^(11).Our work not only provides a more robust key distribution protocol but also establishes a solid theoretical foundation for enhancing the performance of RFI-MDI-QKD in hybrid channels.
基金supported by the National Natural Science Foundation of China(Grant Nos.62171144and 62031024)Guangxi Science Foundation(Grant Nos.2025GXNSFAA069137 and GXR-1BGQ2424005)Innovation Project of Guangxi Graduate Education(Grant No.YCBZ2025064)。
文摘The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘Mode-pairing quantum key distribution(MP-QKD)is an excellent scheme that can exceed the repeaterless ratetransmittance bound without complex phase locking.Nevertheless,MP-QKD usually needs to ensure that the communication distances of the two channels are equal.To address the problem,the asymmetric MP-QKD protocol is proposed.In this paper,we enhance the performance of the asymmetric MP-QKD protocol based on the advantage distillation(AD)method without modifying the quantum process.The simulation results show that the AD method can extend the communication distance by about 70 km in the case of asymmetry.And we observe that as the misalignment error increases,the AD method further increases the expandable communication distance.Our work can further enhance the robustness and promote the practical application of the asymmetric MP-QKD.
基金financial support from the Industrial Prospect and Key Core Technology Projects of Jiangsu Provincial Key R&D Program(Grant No.BE2022071)the Natural Science Foundation of Jiangsu Province(Grant No.BK20192001)+1 种基金the National Natural Science Foundation of China(Grant No.12074194)the Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX220954)。
文摘Reference-frame-independent quantum key distribution(RFI-QKD)can avoid real-time calibration operation of reference frames and improve the efficiency of the communication process.However,due to imperfections of optical devices,there will inevitably exist intensity fluctuations in the source side of the QKD system,which will affect the final secure key rate.To reduce the influence of intensity fluctuations,an improved 3-intensity RFI-QKD scheme is proposed in this paper.After considering statistical fluctuations and implementing global parameter optimization,we conduct corresponding simulation analysis.The results show that our present work can present both higher key rate and a farther transmission distance than the standard method.
基金support from the National Natural Science Foundation of China(62250710162).
文摘In the implementation of quantum key distribution,Security certification is a prerequisite for social deployment.Trans-mitters in decoy-BB84 systems typically employ gain-switched semiconductor lasers(GSSLs)to generate optical pulses for encod-ing quantum information.However,the working state of the laser may violate the assumption of pulse independence.Here,we explored the dependence of intensity fluctuation and high-order correlation distribution of optical pulses on driving cur-rents at 2.5 GHz.We found the intensity correlation distribution had a significant dependence on the driving currents,which would affect the final key rate.By utilizing rate equations in our simulation,we confirmed the fluctuation and correlation origi-nated from the instability of gain-switched laser driven at a GHz-repetitive frequency.Finally,we evaluated the impact of inten-sity fluctuation on the secure key rate.This work will provide valuable insights for assessing whether the transmitter is operat-ing at optimal state in practice.
基金funded by Youth Program of Shaanxi Provincial Department of Science and Technology(Grant No.2024JC-YBQN-0630)。
文摘Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks.
基金supported by the National Basic Research Program of China(Grant No.2013CB338002)the National Natural Science Foundation of China(Grant Nos.11304397 and 61505261)
文摘We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金supported by the National Natural Science Foundation of China (Grant No. 61871407)the Natural Science Foundation of Hunan Province (Grant No. 2021JJ30878)+2 种基金the Key Project of Research and Development Plan of Hunan Province (Grant Nos. 2020GK4063, 2022GK2016)the support from the Optoelectronic Information Center of Central South UniversityHunan Railway Engineering Machinery Electrohydraulic Control Engineering Technology Research Center
文摘Simultaneous two-way classical and quantum(STCQ)communication combines both continuous classical coherent optical communication and continuous-variable quantum key distribution(CVQKD),which eliminates all detection-related imperfections by being measurement-device-independent(MDI).In this paper,we propose a protocol relying on STCQ communication on the oceanic quantum channel,in which the superposition-modulation-based coherent states depend on the information bits of both the secret key and the classical communication ciphertext.We analyse the encoding combination in classical communication and consider the probability distribution transmittance under seawater turbulence with various interference factors.Our numerical simulations of various practical scenarios demonstrate that the proposed protocol can simultaneously enable two-way classical communication and CV-MDI QKD with just a slight performance degradation transmission distance compared to the original CV-MDI QKD scheme.Moreover,the asymmetric situation outperforms the symmetric case in terms of transmission distance and optical modulation variance.We further take into consideration the impact of finite-size effects to illustrate the applicability of the proposed scheme in practical scenarios.The results show the feasibility of the underwater STCQ scheme,which contributes toward developing a global quantum communication network in free space.
基金supported by the National Natural Science Foundation of China (Grant No. 11074072)
文摘The most severe problem of a two-way "plug-and-play" (p &: p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an "untrusted source". This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered.
基金Supported by National Natural Sciences Foundation of China under Grant No.60667001
文摘On basis of the nonlocality without entanglement proposed by Bennett,the properties of an orthogonal set of product states of two qutrits are revealed,i.e.,the transformation among different composite spaces can be realized by using three unitary operations,and the correlation between two composite spaces is found.These properties can be used to quantum communication and quantum cryptography.As examples,we propose a scheme of controlled quantum secure direct communication and one of quantum key distribution.It is shown that applying the product state of qutrit to quantum information processing not only is of the advantages of large capacity and high efficiency,but ensures the security.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61271238 and 61475075)the Specialized Research Fund for the Doctoral Program of Higher Education of China(Grant No.20123223110003)+7 种基金the Natural Science Research Foundation for Universities of Jiangsu Province of China(Grant No.11KJA510002)the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network TechnologyMinistry of EducationChina(Grant No.NYKL2015011)the Innovation Program of Graduate Education of Jiangsu ProvinceChina(Grant No.KYLX0810)partially supported by Qinglan Project of Jiangsu ProvinceChina
文摘In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.
基金supported by the National Basic Research Program of China(Grant Nos.2011CBA00200 and 2011CB921200)the National Natural Science Foundation of China(Grant Nos.60921091 and 61101137)
文摘Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.
基金Project supported by the National Basic Research Program of China(Grant Nos.2011CBA00200 and 2011CB921200)the National Natural Science Foundation of China(Grant Nos.61101137,61201239,and 61205118)
文摘In a quantum key distribution(QKD) system, the error rate needs to be estimated for determining the joint probability distribution between legitimate parties, and for improving the performance of key reconciliation. We propose an efficient error estimation scheme for QKD, which is called parity comparison method(PCM). In the proposed method, the parity of a group of sifted keys is practically analysed to estimate the quantum bit error rate instead of using the traditional key sampling. From the simulation results, the proposed method evidently improves the accuracy and decreases revealed information in most realistic application situations.
文摘A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.