期刊文献+

基于态关联性不完美的诱骗态量子密钥分配 被引量:3

Decoy-State Quantum Key Distribution Based on State-Dependent Imperfections
下载PDF
导出
摘要 本文提出了态关联性不完美条件下诱骗态量子密钥分配(QKD)的安全性理论分析模型.借助于QKD的保密放大分析方法,采用实际QKD系统广泛使用的诱骗态编码方案,使相位误码的估计更加准确,进而给出了态关联性不完美条件下诱骗态QKD的最终安全密钥生成率的表达式,刻画了密钥生成率与态关联性不完美、探测器性能和密钥传输距离之间的关系.数值模拟表明,诱骗态QKD的最终安全密钥生成率对态关联性不完美的容忍程度,随着密钥传输距离的增大而逐渐减小,随着探测器探测性能的提升而逐渐增大,因而验证了所给表达式的正确性. This paper proposes models for analyzing the security of decoy-state quantum key dislribution (QKD) with state dependent imperfections. With the privacy amplification method of QKD' s post-processing techniques, we introduce the decoy-state method used widely in QKD system to estimate the phase error rate more accurately than the case without decoy-state method. Based on this, we obtain the formula of secret key generation rates for decoy-state QKD with state-dependent imperfections, and characterize the relationship among key generation rates, state dependent parameter, detection efficiency and transmission distance. Numerical simulations indicate that the secure key generation rates' tolerance to state-dependent imperfections decreases with the growing distance,but increases with the improving detection efficiency, which,to some extent,show the validity of the formula we obtain.
出处 《电子学报》 EI CAS CSCD 北大核心 2012年第10期2015-2020,共6页 Acta Electronica Sinica
关键词 量子密钥分配 态关联性不完美 诱骗态 实际安全性 quantum key distribution state-dependent imperfections decoy state practical security
  • 相关文献

参考文献20

二级参考文献64

  • 1YAN FengLi1, GAO Ting2 & LI YouCheng1 1 College of Physics and Information Engineering, Hebei Normal University, Shijiazhuang 050016, China,2 College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050016, China.Quantum secret sharing between multiparty and multiparty with four states[J].Science China(Physics,Mechanics & Astronomy),2007,50(5):572-580. 被引量:18
  • 2GUOFen-zhuo,WENQiao-yan,ZHUFu-chen.Quantum Secret Sharing Based on Multi-Particle Entanglement[J].The Journal of China Universities of Posts and Telecommunications,2005,12(1):15-19. 被引量:5
  • 3秦素娟,刘太琳,温巧燕.基于纠缠交换和局域操作的量子秘密共享[J].北京邮电大学学报,2005,28(4):74-77. 被引量:8
  • 4Bennett C H,Brassard G.An update on quantum cryptography[A].Advances in Cryptology:Proceedings of Crypto 84[C].USA:ACPC,Springer-Verlag,1984.475.
  • 5Zeng Guihua,Zhang Weiping.Identity verification in quantum cryptography[J].Phys Rev A,2000,61(2):022303/1-5.
  • 6Dusek M,Haderka O,Hendrych M,Myski R.Quantum identification system [J].Physics Review A,1999,60(1):149.
  • 7Zeng Guihua,Keitel Christoph H.An arbitrated quantum signature algorithm [J].Physics Review A,2002,65(4):042312.
  • 8Barnum H,Crepeau C,et al.Authentication of quantum messages [J].Physics Review A,2002,66(1):021037/1-6.
  • 9Leung D W.Quantum Vernam algorithm,Quantum information and computation [J],2001,2(3):37-45.
  • 10G Brassard,et al.An update on quantum cryptography[A].Advances in Cryptology-CRYPT′84[C].Berlin:Springer Verlag,1984,475-480.

共引文献82

同被引文献15

  • 1Hillery M, Buzek V, Betthiaume A. Quantum secret sharing [J] .Phys Rev A, 1999,59(3):1829- 1834.
  • 2Cleve R, Gottesman D, Lo H-K. How to share a quantum secret [J] .Plays Rev Lett, 1999,83:648 - 651.
  • 3Gottesman D. Theory of quantum secret sharing[J]. Phys Rev A,2000,61:042311.
  • 4Smith A. Quantum secret sharing for general access slructures [DB/OL]. http://arxiv, org/abs/quant-ph/0001087.pdf, 2000 -01 -24.
  • 5Imai H,Muller-Quade J,Nascimento A,et al.A quantum infor-marion theoretical model for quantum secret sharing schemes [ J]. Quantum Inf Comput, 2005,5 (1) : 69 - 80.
  • 6Helwig W, Cui W, et al. Absolute maximal entanglement and quantum secret sharing[J]. Phys Rev A, 2012,86: 052335.
  • 7Du Yu-tao, Bao Wan-su. Multiparty quantum secret sharing scheme based on the phase shift operations[J]. Optics Cornmu- nications, 2013,308 ( 1 ) : 159 - 163.
  • 8Gao Gan. Improvement of efficient multiparty quantum secret sharing based on bell states and continuous variable operations [J]. International Journal of Theoretical Physics, 2014:1 - 5.
  • 9Wang Ming-ming, et al. Quantum secret sharing for general access structure based on multiparticle entanglemem [J]. Quantum Information Processing, 2014,13( 2 ) .. 429 - 443.
  • 10Fortescue B, Gour G. Reducing the quantum communication cost of quantum secret Sharing[J]. IEEE Trans Inform Theo- ry, 2012,58(10) : 6659 - 6666.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部