期刊文献+

一种B92协议量子电路设计与仿真 被引量:4

Design and simulation of quantum circuits of B92 QKD protocol
下载PDF
导出
摘要 量子安全通信作为量子信息的重要分支之一,是量子力学在通信领域极为重要的应用。着重研究B92量子密钥分配协议的量子电路模型及其后续仿真,基于Qcircuit仿真软件设计出一种全新的B92量子密钥分配协议的量子电路模型,通过引入误码率(BER)和协议可靠率r_(sec)两个指标,仿真分析了在不同噪声信道模型下B92量子密钥分配协议的有效性和安全性。仿真结果表明,这种全新的电路设计实现了B92密钥分配协议的功能,并具有普遍意义,可运用于构造其他密钥分配协议的量子电路模型。 Quantum communication is one of the most important branches of quantum information, which is the combination of quantum mechanics and information theory. The security of B92 quantum key distri- bution protocol was analyzed in the non-ideal circumstances. A new quantumcircuit model of B92 quantum key distribution protocol was raised to design simulation models under different noise channel models using the QCircuit. Two indicators of BER and r^c were introduced, and then the circuit models were designed to simulate and analyze the effectiveness and security of B92 key distribution protocol under different noise channel models. The experimental results show the new circuit design achieves the purpose of B92 key distribution protocol and the design approach is more universal significant. It can be used to construct more quantum simulation models of different quantum key distribution protocols.
出处 《量子电子学报》 CAS CSCD 北大核心 2016年第1期51-55,共5页 Chinese Journal of Quantum Electronics
基金 国家自然科学基金 61271122~~
关键词 量子信息 量子密钥分配 量子电路 B92协议 噪声信道 quantum information quantum key distribution quantum circuit B92 protocol noise Channels
  • 相关文献

参考文献16

  • 1Wiesner S.Conjugate coding[J].ACM Sigact News, 1983, 15(1):78-88.
  • 2Bennett CH, Brassard G.Quantum cryptography: Public key distribution and coin tossing[J].Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984, 175(150):8.
  • 3Bennett, Charles H.Quantum cryptography using any two nonorthogonal states[J].Physical Review Letters, 1992, 68(21):3121-3124.
  • 4Tamaki K, Lütkenhaus N.Unconditional security of the Bennett 1992 quantum key-distribution over lossy and noisy channel[J].arXiv preprint quant-ph/0308048, 2003, :-.
  • 5Aggarwal R, Sharma H, Gupta D.Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol[J].International Journal of Computer Applications, 2011, 20:-.
  • 6Dehmani M, Ez-Zahraouy H, Benyoussef A.Quantum Cryptography with Several Cloning Attacks[J].Journal of Computer Science, 2010, 6(7):684-688.
  • 7Pereszlenyi A.Simulation of quantum key distribution with noisy channels [C].Telecommunications, 2005 ConTEL 2005 Proceedings of the 8th International Conference on; 2005 June 15-17, 2005; 2005. p. 203-10..8th International Conference on Telecommunications, 2005, 1:203-210.
  • 8Eastin, B.and S. T. Flammia (2004). "Q-circuit tutorial [J]." arXiv preprint quant-ph/0406003.
  • 9Shen Y. Experimental study on discretely modulated continuous-variable quantum key distribution [J]. Phys Rev. A, 2010, 82: 022317.
  • 10Leverrier A, Grangier P. Unconditional security proof of long-distance continuous-variable quantum key distribu- tion with a discrete modulation [J]. Phys. Rev. Left., 2009, 102: 180504.

同被引文献32

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部