期刊文献+
共找到251篇文章
< 1 2 13 >
每页显示 20 50 100
Practical 15 Mb/s Quantum Key Distribution Using Compact Single-Photon Detectors
1
作者 Tingting Shi Zhengyu Yan +4 位作者 Yuanbin Fan Lai Zhou Yuanfei Gao Davide G.Marangon Zhiliang Yuan 《Chinese Physics Letters》 2025年第12期172-177,共6页
Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key r... Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key rate(SKR),which is a critical factor for real-world applications.Herein,we report a practical QKD system,equipped with compact gated InGaAs/InP single-photon detectors(SPDs),that can generate a high SKR of 15.2 Mb/s with a channel loss of 2 dB.This exceptional performance stems from the ultra-low afterpulsing probability of the SPDs,which significantly reduces the bit error rate in the QKD system.The typical quantum bit error rate is 1.3%.The results validate the feasibility of an integrated,practical QKD system and offer a reliable solution for the future development of real-world QKD networks. 展开更多
关键词 quantum key distribution qkd afterpulsing probability secure key rate quantum key distribution single photon detectors secure key rate skr which bit error rate
原文传递
Multi-protocol quantum key distribution decoding chip
2
作者 Chun-Xue Zhang Jian-Guang Li +3 位作者 Yue Wang Wei Chen Jia-Shun Zhang Jun-Ming An 《Chinese Physics B》 2025年第5期34-41,共8页
Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,sca... Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks. 展开更多
关键词 quantum key distribution(QKD) secure key rate decoding chip quantum bit error rate
原文传递
Mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states
3
作者 Zhigang Shen Yuting Lu +1 位作者 Yang Yu Shengmei Zhao 《Chinese Physics B》 2025年第9期57-64,共8页
A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralde... A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack. 展开更多
关键词 mode-pairing quantum key distribution heralded pair-coherent source passive decoy-state key generation rate
原文传递
Multicast-oriented key provision in hybrid DV/CV multi-domain quantum networks
4
作者 Xinyu Chen Yuan Cao +6 位作者 Yuxiang Lu Yue Chen Kunpeng Zheng Xiaosong Yu Yongli Zhao Jie Zhang Qin Wang 《Chinese Physics B》 2025年第9期22-36,共15页
As the cornerstone of future information security,quantum key distribution(QKD)is evolving towards large-scale hybrid discrete-variable/continuous-variable(DV/CV)multi-domain quantum networks.Meanwhile,multicast-orien... As the cornerstone of future information security,quantum key distribution(QKD)is evolving towards large-scale hybrid discrete-variable/continuous-variable(DV/CV)multi-domain quantum networks.Meanwhile,multicast-oriented multi-party key negotiation is attracting increasing attention in quantum networks.However,the efficient key provision for multicast services over hybrid DV/CV multi-domain quantum networks remains challenging,due to the limited probability of service success and the inefficient utilization of key resources.Targeting these challenges,this study proposes two key-resource-aware multicast-oriented key provision strategies,namely the link distance-resource balanced key provision strategy and the maximum shared link key provision strategy.The proposed strategies are applicable to hybrid DV/CV multi-domain quantum networks,which are typically implemented by GG02-based intra-domain connections and BB84-based inter-domain connections.Furthermore,the multicast-oriented key provision model is formulated,based on which two heuristic algorithms are designed,i.e.,the shared link distance-resource(SLDR)dependent and the maximum shared link distance-resource(MSLDR)dependent multicast-oriented key provision algorithms.Simulation results verify the applicability of the designed algorithms across different multi-domain quantum networks,and demonstrate their superiority over the benchmark algorithms in terms of the success probability of multicast service requests,the number of shared links,and the key resource utilization. 展开更多
关键词 quantum networks discrete-variable(DV) continuous-variable(CV) key provision multicast services
原文传递
Effect of pseudo-random number on the security of quantum key distribution protocol
5
作者 Xiao-Liang Yang Yu-Qing Li Hong-Wei Li 《Chinese Physics B》 2025年第2期41-46,共6页
In the process of quantum key distribution(QKD), the communicating parties need to randomly determine quantum states and measurement bases. To ensure the security of key distribution, we aim to use true random sequenc... In the process of quantum key distribution(QKD), the communicating parties need to randomly determine quantum states and measurement bases. To ensure the security of key distribution, we aim to use true random sequences generated by true random number generators as the source of randomness. In practical systems, due to the difficulty of obtaining true random numbers, pseudo-random number generators are used instead. Although the random numbers generated by pseudorandom number generators are statistically random, meeting the requirements of uniform distribution and independence,they rely on an initial seed to generate corresponding pseudo-random sequences. Attackers may predict future elements from the initial elements of the random sequence, posing a security risk to quantum key distribution. This paper analyzes the problems existing in current pseudo-random number generators and proposes corresponding attack methods and applicable scenarios based on the vulnerabilities in the pseudo-random sequence generation process. Under certain conditions, it is possible to obtain the keys of the communicating parties with very low error rates, thus effectively attacking the quantum key system. This paper presents new requirements for the use of random numbers in quantum key systems, which can effectively guide the security evaluation of quantum key distribution protocols. 展开更多
关键词 quantum key distribution PSEUDO-RANDOM SECURITY
原文传递
Mode-pairing quantum key distribution with multi-step advantage distillation
6
作者 Shizhuo Li Xin Liu +1 位作者 Zhenrong Zhang Kejin Wei 《Chinese Physics B》 2025年第9期85-95,共11页
The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)prot... The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate. 展开更多
关键词 mode-pairing quantum key distribution multi-step advantage distillation secret key rate
原文传递
Protection path and security-metric-based resource allocation algorithm in quantum key distribution optical networks
7
作者 Li Liu Shengtong Zhai +1 位作者 Yao Pu Xu Zhang 《Chinese Physics B》 2025年第9期73-83,共11页
Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problem... Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks. 展开更多
关键词 quantum key distribution(QKD) optical network security metric protection path
原文传递
Improving the performance of reference-frame-independent measurement-device-independent quantum key distribution in hybrid channels
8
作者 Yan-Mei Zhao Chun Zhou +8 位作者 Xiao-Lei Jiang Yi-Fei Lu Yu Zhou Hai-Tao Wang Yang Wang Jia-Ji Li Yan-Yang Zhou Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 2025年第5期26-32,共7页
The robustness of reference-frame-independent measurement-device-independent quantum key distribution(RFIMDI-QKD)against detection system vulnerabilities and its tolerance to reference frame drifts make it an ideal ch... The robustness of reference-frame-independent measurement-device-independent quantum key distribution(RFIMDI-QKD)against detection system vulnerabilities and its tolerance to reference frame drifts make it an ideal choice for hybrid channels.However,the impact of atmospheric turbulence on transmittance fluctuations remains a significant challenge for enhancing the performance of RFI-MDI-QKD.In this paper,we apply prefixed-threshold real-time selection and advantage distillation techniques to RFI-MDI-QKD in a hybrid channels scenario.Then,we analytically derive formulas for secret key rate in hybrid channels.Simulation results show that our modified scheme has apparent advances in both maximum tolerant loss and secure key rate compared to the fiber-only channel.Specifically,the result demonstrates that the maximum transmission distance can be improved by 15 km and 28 km when N=10^(12)and 10^(11).Our work not only provides a more robust key distribution protocol but also establishes a solid theoretical foundation for enhancing the performance of RFI-MDI-QKD in hybrid channels. 展开更多
关键词 quantum key distribution measurement-device-independent hybrid channels
原文传递
Asymmetric mode-pairing quantum key distribution with advantage distillation
9
作者 Hai-Tao Wang Chun Zhou +5 位作者 Yi-Fei Lu Chen-Peng Hao Yan-Mei Zhao Yan-Yang Zhou Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 2025年第4期109-115,共7页
Mode-pairing quantum key distribution(MP-QKD)is an excellent scheme that can exceed the repeaterless ratetransmittance bound without complex phase locking.Nevertheless,MP-QKD usually needs to ensure that the communica... Mode-pairing quantum key distribution(MP-QKD)is an excellent scheme that can exceed the repeaterless ratetransmittance bound without complex phase locking.Nevertheless,MP-QKD usually needs to ensure that the communication distances of the two channels are equal.To address the problem,the asymmetric MP-QKD protocol is proposed.In this paper,we enhance the performance of the asymmetric MP-QKD protocol based on the advantage distillation(AD)method without modifying the quantum process.The simulation results show that the AD method can extend the communication distance by about 70 km in the case of asymmetry.And we observe that as the misalignment error increases,the AD method further increases the expandable communication distance.Our work can further enhance the robustness and promote the practical application of the asymmetric MP-QKD. 展开更多
关键词 quantum key distribution asymmetric mode-pairing advantage distillation
原文传递
Improved reference-frame-independent quantum key distribution with intensity fluctuations
10
作者 Zi-Qi Chen Hao-Bing Sun +1 位作者 Ming-Shuo Sun Qin Wang 《Chinese Physics B》 2025年第2期48-52,共5页
Reference-frame-independent quantum key distribution(RFI-QKD)can avoid real-time calibration operation of reference frames and improve the efficiency of the communication process.However,due to imperfections of optica... Reference-frame-independent quantum key distribution(RFI-QKD)can avoid real-time calibration operation of reference frames and improve the efficiency of the communication process.However,due to imperfections of optical devices,there will inevitably exist intensity fluctuations in the source side of the QKD system,which will affect the final secure key rate.To reduce the influence of intensity fluctuations,an improved 3-intensity RFI-QKD scheme is proposed in this paper.After considering statistical fluctuations and implementing global parameter optimization,we conduct corresponding simulation analysis.The results show that our present work can present both higher key rate and a farther transmission distance than the standard method. 展开更多
关键词 quantum key distribution intensity fluctuations decoy-state method
原文传递
Intensity correlation distribution in gain-switched semiconductor laser for quantum key distribution
11
作者 Yuanfei Gao Tao Wang +1 位作者 Yixin Wang Zhiliang Yuan 《Journal of Semiconductors》 2025年第6期80-85,共6页
In the implementation of quantum key distribution,Security certification is a prerequisite for social deployment.Trans-mitters in decoy-BB84 systems typically employ gain-switched semiconductor lasers(GSSLs)to generat... In the implementation of quantum key distribution,Security certification is a prerequisite for social deployment.Trans-mitters in decoy-BB84 systems typically employ gain-switched semiconductor lasers(GSSLs)to generate optical pulses for encod-ing quantum information.However,the working state of the laser may violate the assumption of pulse independence.Here,we explored the dependence of intensity fluctuation and high-order correlation distribution of optical pulses on driving cur-rents at 2.5 GHz.We found the intensity correlation distribution had a significant dependence on the driving currents,which would affect the final key rate.By utilizing rate equations in our simulation,we confirmed the fluctuation and correlation origi-nated from the instability of gain-switched laser driven at a GHz-repetitive frequency.Finally,we evaluated the impact of inten-sity fluctuation on the secure key rate.This work will provide valuable insights for assessing whether the transmitter is operat-ing at optimal state in practice. 展开更多
关键词 intensity correlation gain-switched laser quantum key distribution
在线阅读 下载PDF
Quantum key distribution and controlled quantum direct communication applying product state of qutrit 被引量:20
12
作者 ZHU Ai-dong ZHANG Shou 《量子电子学报》 CAS CSCD 北大核心 2007年第3期316-322,共7页
On basis of the nonlocality without entanglement proposed by Bennett,the properties of an orthogonal set of product states of two qutrits are revealed,i.e.,the transformation among different composite spaces can be re... On basis of the nonlocality without entanglement proposed by Bennett,the properties of an orthogonal set of product states of two qutrits are revealed,i.e.,the transformation among different composite spaces can be realized by using three unitary operations,and the correlation between two composite spaces is found.These properties can be used to quantum communication and quantum cryptography.As examples,we propose a scheme of controlled quantum secure direct communication and one of quantum key distribution.It is shown that applying the product state of qutrit to quantum information processing not only is of the advantages of large capacity and high efficiency,but ensures the security. 展开更多
关键词 quantum information NONLOCALITY QUTRIT product state quantum communication quantum key distribution
在线阅读 下载PDF
Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum 被引量:20
13
作者 王乐 赵生妹 +1 位作者 巩龙延 程维文 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第12期238-245,共8页
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc... In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. 展开更多
关键词 measurement-device-independent quantum key distribution orbital angular momentum atmospheric turbulence decoy states
原文传递
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
14
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua... The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 展开更多
关键词 ergodic matrix tensor problem resist quantum key exchange protocol ENCRYPTION
在线阅读 下载PDF
Fast implementation of length-adaptive privacy amplification in quantum key distribution 被引量:7
15
作者 张春梅 李默 +8 位作者 黄靖正 Patcharapong Treeviriyanupab 李宏伟 李芳毅 王川 银振强 陈巍 Keattisak Sripimanwat 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第9期112-117,共6页
Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is use... Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems. 展开更多
关键词 length-adaptive privacy amplification multiplication algorithms quantum key distribution
原文传递
Efficient error estimation in quantum key distribution 被引量:5
16
作者 李默 Patcharapong Treeviriyanupab +3 位作者 张春梅 银振强 陈巍 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第1期153-156,共4页
In a quantum key distribution(QKD) system, the error rate needs to be estimated for determining the joint probability distribution between legitimate parties, and for improving the performance of key reconciliation.... In a quantum key distribution(QKD) system, the error rate needs to be estimated for determining the joint probability distribution between legitimate parties, and for improving the performance of key reconciliation. We propose an efficient error estimation scheme for QKD, which is called parity comparison method(PCM). In the proposed method, the parity of a group of sifted keys is practically analysed to estimate the quantum bit error rate instead of using the traditional key sampling. From the simulation results, the proposed method evidently improves the accuracy and decreases revealed information in most realistic application situations. 展开更多
关键词 error estimation parity comparison quantum key distribution
原文传递
Quantum Key Distribution Scheme Based on Dense Encoding in Entangled States 被引量:4
17
作者 ZHANGXiao-Long ZHANGYue-Xia GAOKe-Lin 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第4期627-630,共4页
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the f... A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss. 展开更多
关键词 quantum key distribution dense coding quantum entanglement
在线阅读 下载PDF
The queueing model for quantum key distribution network 被引量:3
18
作者 温浩 韩正甫 +1 位作者 郭光灿 洪佩琳 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第1期46-50,共5页
This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of... This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of the QKD system. Furthermore, it proposes a key buffering policy which could effectively improve the delay performance in practice. The results will be helpful for quality of service in practical QKD systems. 展开更多
关键词 quantum key distribution quantum cryptography quantum network queueing model
原文传递
Quantum election scheme based on anonymous quantum key distribution 被引量:4
19
作者 周瑞瑞 杨理 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第8期23-30,共8页
An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement st... An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. 展开更多
关键词 quantum election quantum key distribution conjugate coding
原文传递
Quantum key distribution series network protocol with M-classical Bobs 被引量:4
20
作者 张现周 公伟贵 +2 位作者 谭勇刚 任振忠 郭笑天 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2143-2148,共6页
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu... Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack. 展开更多
关键词 quantum key distribution symmetrical attack network protocol
原文传递
上一页 1 2 13 下一页 到第
使用帮助 返回顶部