期刊文献+

量子密钥误码系数分析及对密钥分配的影响 被引量:6

Analysis of the coefficient of QBER and its influence
原文传递
导出
摘要 分析了基于微弱相干脉冲量子密钥分配的误码系数,结果表明,误码系数并非为一固定常数,而是随着传输距离增加而变化。根据实验数据对误码系数与传输距离之间的关系进行了函数拟合,3个实验小组数据拟合出能够很好地符合同一指数函数形式。利用拟合的误码系数对诱惑态下BB84量子密钥分配方案的平均光子数进行了优化,根据优化结果,利用GYS的实验参数分析了Lo等人提出的诱惑态量子密钥效率表达式,结果表明,误码系数修正后的表达式具有更高的密钥生成效率空间。 The quantum bit error rate(QBER) based on the weak coherent pulse′s quantum key distribution is analyzed.It is indicates that the coefficient of QBER is not a constant but is increased exponentially with the transmission distances.Based on the three experiments data,the function fitting has been done.We discover that these fitting functions have the same function form.Subsequently we use these functions to optimize the mean photon number for the BB84 quantum key distribution with decoy states.It is shown that the optimized mean photon number depends on the transmission distances.Based on these results and the GYS′s experimental parameters we compared the key generation rates proposed by Lo et al with the modified one.We find that the latter is superior to the former within a certain distance.
作者 赵峰 李静玲
出处 《光电子.激光》 EI CAS CSCD 北大核心 2010年第9期1383-1385,共3页 Journal of Optoelectronics·Laser
基金 陕西省教育厅自然科学基金资助项目(09JK382) 陕西理工学院科研基金资助项目(SLGQD0901)
关键词 量子密钥分配 量子密钥误码率(QBER) 误码系数 quantum key distribution quantum bit error rate(QBER) coefficient of error
  • 相关文献

参考文献12

  • 1Gottesman D,Lo H K,Lutkenhaus N,et al. Security of quantum key distribution with imperfect devices[J].Quantum Information and Computation,2005,4(5) :325-360.
  • 2Stucki D, Walenta N, Vannel F, et al. High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres[J].New Journal of Physics, 2009,11(7) : 075003.
  • 3李新刚,贾振红.带身份认证的四量子纠缠量子密钥分发协议[J].光电子.激光,2008,19(9):1227-1230. 被引量:4
  • 4王睿,苗昂,王松,黄永清.光外差法测量光探测器频率响应的系统校准[J].光电子.激光,2008,19(9):1220-1222. 被引量:3
  • 5黄宇娴,梁瑞生,胡华鹏,路轶群,王金东,刘颂豪.安全稳定实用的差分量子密钥分配实验研究[J].光电子.激光,2008,19(11):1521-1525. 被引量:6
  • 6雒伟伟,黄永清,黄辉,苗昂,王琦,任晓敏.一种改进光探测器高速性能的新方法[J].光电子.激光,2009,20(5):567-570. 被引量:8
  • 7Gobby C,Yuan Z L,Shields A J,et al. Quantum key distribution over 122 km of standard telecom fiber[J]. Applied Physics Letter,2004,84(19) :3762-3764.
  • 8Lutkenhaus N. Security against individual attacks for realistic quantum key distribution[J]. Physical Review A, 2000,61( 5 ):052304.
  • 9Lo H K,Ma X F,Ohen K. Decoy state quantum key distribution [J]. Physical Review Letter, 2005,94 ( 23 ) : 230504.
  • 10Ma X F,Qi B,Zhao Y,et al. Practical decoy state for quantum key distribution[J]. Physical Review A, 2005,72 (1) : 012326.

二级参考文献20

共引文献17

同被引文献73

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部