期刊文献+

标记单光子源在量子密钥分发中的应用 被引量:2

Overview of applications of heralded single photon source in quantum key distribution
下载PDF
导出
摘要 本文主要介绍标记单光子源的制备、特性,及其在3种主流量子密钥分发(BB84,测量设备无关,双场)协议中的应用与发展,同时通过对比标记单光子源和基于弱相干态光源在同类协议中的性能,分析讨论不同光源的优缺点.此外,针对双场量子密钥分发协议中对单光子干涉特性的要求,分析了标记单光子源在双场协议应用中的局限性,并讨论了可能的解决方案,对今后发展实用化量子保密通信系统将起到有价值的指导和推进作用. In this paper,we mainly introduce the preparation and physical properties of the heralded single-photon source,the development history and its applications in three typical quantum key distribution protocols,including BB84,measurement-device-independent and twin-field quantum key distribution protocols.Moreover,we make comparisons of the above quantum key distribution protocols between using heralded single-photon source and using weak coherent sources,and analyze their advantages and disadvantages.Besides,according to the characteristics of single-photon interference in twin-field quantum key distributions,the limitations of separately applying heralded single-photon sources to twin-field quantum key distributions are revealed,and possible solutions are discussed.Therefore,this work may provide valuable references and help for the practical implementation of quantum secure communication in the near future.
作者 孟杰 徐乐辰 张成峻 张春辉 王琴 Meng Jie;Xu Le-Chen;Zhang Cheng-Jun;Zhang Chun-Hui;Wang Qin(Institute of Quantum Information and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,China;Key Laboratory of Broadband Wireless Communication and Sensor Network of Ministry of Education,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)
出处 《物理学报》 SCIE EI CAS CSCD 北大核心 2022年第17期94-104,共11页 Acta Physica Sinica
基金 国家重点研究发展计划(批准号:2018YFA0306400,2017YFA0304100) 国家自然科学基金(批准号:12074194,12104240) 江苏省自然科学基金(批准号:BK20192001,BK20210582)资助的课题.
关键词 量子密钥分发 标记单光子源 弱相干态光源 被动式诱骗态 quantum key distribution heralded single photon source weak coherent state light source passive decoy state
  • 相关文献

参考文献1

二级参考文献25

  • 1D Mayers. Unconditional security in quantum cryptography [J]. J ACM, 2001, 48(3): 351-406.
  • 2P W Shor, J Preskill. Simple proof of security of the BB84 quantum key distribution protocol [J]. Phys Rev Lett, 2000, 85 (2) : 441-444.
  • 3C H Bennett, G Brassard. Quantum cryptography: public key distribution and coin tossing [ C ]. Proceeding of IEEE International Conference on Computers, Systems, and Signal Processing, 1984. 175-179.
  • 4B Huttner, N Imoto, N Gisin, et al.. Quantum cryptography with coherent states [J]. Phys Rev A, 1995, 51(3): 1863- 1869.
  • 5O Brassard, N Lutkenhaus, T Mor, et al.. Limitations on practical quantum cryptography [J]. Phys Rev Lett, 2000, 85 (6) : 1330-1333.
  • 6B Qi, C H F Fung, H K Lo, et al.. Time-shift attack in practical quantum cryptosystems [J]. Quantum Inf Comput, 2007, 7: 073-082.
  • 7Y Zhao, C H F Fung, B Qi, et al.. Quantum hacking: experimental demonstration of time-shift attack against practical quantumkey-distribution systems [J]. Phys Rev A, 2008, 78 (4) :042333.
  • 8V Makarov, A Anisimov, J Skaar. Effects of detector efficiency mismatch on security of quanlum cryptosystems [J]. Phys Rev A, 2006, 74(2): 022313.
  • 9C H F Fung, B Qi, K Tamaki, et al.. Phase-remapping attack in practical quantum-key-distribution systems [J]. Phys Rev A, 75 (3) : 032314.
  • 10W Y Hwang. Quantum key distribution with high loss: toward global secure communication [J]. Phys Rev Lett, 2003, 91 (5): 057901.

共引文献17

同被引文献20

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部