期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
1
作者 徐乐辰 张春辉 +1 位作者 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期204-208,共5页
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi... Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources. 展开更多
关键词 quantum key distribution heralded single-photon source decoy-state method
下载PDF
Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key 被引量:1
2
作者 李源 鲍皖苏 +2 位作者 李宏伟 周淳 汪洋 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第1期452-459,共8页
Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this paper, based on the ... Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this paper, based on the WCP source which can be used for the passive decoy-state method, we obtain the expressions of single-photon error rates, single-photon counts, and phase error rates. According to the information of smooth min-entropy, we calculate the key generation rate under the condition of finite-length key. Key generation rates with different numbers of pulses are compared by numerical simulations. From the results, it can be seen that the passive decoy-state method can have good results if the total number of pulses reaches 1010. We also simulate the passive decoy-state method with different probabilities of choosing a pulse for parameter estimation when the number of pulses is fixed. 展开更多
关键词 quantum key distribution passive decoy-state finite-length key weak coherent pulses
下载PDF
Passive Decoy-State Reference-Frame-Independent Quantum Key Distribution with Heralded Single-Photon Source
3
作者 李家骥 汪洋 +6 位作者 李宏伟 彭朋 周淳 江木生 马鸿鑫 冯林溪 鲍皖苏 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第12期1-5,共5页
Reference-frame-independent(RFI)quantum key distribution(QKD)is a protocol which can share unconditional secret keys between two remote users without the alignment of slowly varying reference frames.We propose a p... Reference-frame-independent(RFI)quantum key distribution(QKD)is a protocol which can share unconditional secret keys between two remote users without the alignment of slowly varying reference frames.We propose a passive decoy-state RFI-QKD protocol with heralded single-photon source(HSPS)and present its security analysis.Compared with RFI QKD using a weak coherent pulse source(WCPS),numerical simulations show that the passive decoy-state RFI QKD with HSPS performs better not only in secret key rate but also in secure transmission distance.Moreover,our protocol is robust against the relative motion of the reference frames as well as RFI QKD with the WCPS.In addition,we also exploit Hoeffding's inequality to investigate the finite-key effect on the security of the protocol. 展开更多
关键词 QKD Passive decoy-state Reference-Frame-Independent Quantum Key Distribution with Heralded Single-Photon Source RFI
下载PDF
Practical decoy-state quantum secure direct communication 被引量:3
4
作者 Xin Liu Zijian Li +6 位作者 Di Luo Chunfeng Huang Di Ma Minming Geng Junwei Wang Zhenrong Zhang Kejin Wei 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2021年第12期68-75,共8页
Quantum secure direct communication(QSDC) has been demonstrated in both fiber-based and free-space channels using attenuated lasers. Decoy-state QSDC by exploiting four decoy states has been proposed to address the pr... Quantum secure direct communication(QSDC) has been demonstrated in both fiber-based and free-space channels using attenuated lasers. Decoy-state QSDC by exploiting four decoy states has been proposed to address the problem of photon-numbersplitting attacks caused by the use of attenuated lasers. In this study, we present an analysis of the practical aspects of decoy-state QSDC. First, we design a two-decoy-state protocol that only requires two decoy states, thereby significantly reducing experimental complexity. Second, we successfully perform full parameter optimization for a real-life QSDC system by introducing a genetic algorithm. Our simulation results show that the two-decoy-state protocol could be the best choice for developing a practical QSDC system. Furthermore, full optimization is crucial for a high-performance QSDC system. Our work serves as a major step toward the further development of practical decoy-state QSDC systems. 展开更多
关键词 quantum secure direct communication decoy-state method full parameter optimization
原文传递
Decoy-state measurement-device-independent quantum key distribution with mismatched-basis statistics 被引量:1
5
作者 ZHANG ChunMei LI Mo +3 位作者 YIN ZhenQiang LI HongWei CHEN Wei HAN ZhengFu 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2015年第9期1-4,共4页
Measurement-device-independent quantum key distribution(MDI-QKD) is aimed at removing all detector side channel attacks,while its security relies on the assumption that the encoding systems including sources are fully... Measurement-device-independent quantum key distribution(MDI-QKD) is aimed at removing all detector side channel attacks,while its security relies on the assumption that the encoding systems including sources are fully characterized by the two legitimate parties. By exploiting the mismatched-basis statistics in the security analysis, MDI-QKD even with uncharacterized qubits can generate secret keys. In this paper, considering the finite size effect, we study the decoy-state MDI-QKD protocol with mismatchedbasis events statistics by performing full parameter optimization, and the simulation result shows that this scheme is very practical. 展开更多
关键词 decoy-state method MDI-QKD full parameter optimization mismatched-basis statistics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部