期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Security analysis of satellite-to-ground reference-frame-independent quantum key distribution with beam wandering
1
作者 周淳 赵燕美 +11 位作者 杨晓亮 陆宜飞 周雨 姜晓磊 汪海涛 汪洋 李家骥 江木生 汪翔 张海龙 李宏伟 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期192-201,共10页
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance... The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks. 展开更多
关键词 quantum key distribution satellite-to-ground beam wandering
下载PDF
Phase-matching quantum key distribution with imperfect sources
2
作者 张晓旭 陆宜飞 +5 位作者 汪洋 江木生 李宏伟 周淳 周雨 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期288-296,共9页
The huge discrepancies between actual devices and theoretical assumptions severely threaten the security of quantum key distribution.Recently,a general new framework called the reference technique has attracted wide a... The huge discrepancies between actual devices and theoretical assumptions severely threaten the security of quantum key distribution.Recently,a general new framework called the reference technique has attracted wide attention in defending against the imperfect sources of quantum key distribution.Here,the state preparation flaws,the side channels of mode dependencies,the Trojan horse attacks,and the pulse classical correlations are studied by using the reference technique on the phase-matching protocol.Our simulation results highlight the importance of the actual secure parameters choice for transmitters,which is necessary to achieve secure communication.Increasing the single actual secure parameter will reduce the secure key rate.However,as long as the parameters are set properly,the secure key rate is still high.Considering the influences of multiple actual secure parameters will significantly reduce the secure key rate.These actual secure parameters must be considered when scientists calibrate transmitters.This work is an important step towards the practical and secure implementation of phase-matching protocol.In the future,it is essential to study the main parameters,find out their maximum and general values,classify the multiple parameters as the same parameter,and give countermeasures. 展开更多
关键词 quantum key distribution reference technique imperfect sources PHASE-MATCHING
下载PDF
Effect of weak randomness flaws on security evaluation of practical quantum key distribution with distinguishable decoy states
3
作者 周雨 李宏伟 +5 位作者 周淳 汪洋 陆宜飞 江木生 张晓旭 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期254-260,共7页
Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections... Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation. 展开更多
关键词 weak randomness quantum key distribution distinguishable decoy state
下载PDF
Finite-key analysis of practical time-bin high-dimensional quantum key distribution with afterpulse effect 被引量:1
4
作者 Yu Zhou Chun Zhou +4 位作者 Yang Wang Yi-Fei Lu mu-sheng jiang Xiao-Xu Zhang Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第8期234-240,共7页
High-dimensional quantum resources provide the ability to encode several bits of information on a single photon,which can particularly increase the secret key rate rate of quantum key distribution(QKD) systems. Recent... High-dimensional quantum resources provide the ability to encode several bits of information on a single photon,which can particularly increase the secret key rate rate of quantum key distribution(QKD) systems. Recently, a practical four-dimensional QKD scheme based on time-bin quantum photonic state, only with two single-photon avalanche detectors as measurement setup, has been proven to have a superior performance than the qubit-based one. In this paper, we extend the results to our proposed eight-dimensional scheme. Then, we consider two main practical factors to improve its secret key bound. Concretely, we take the afterpulse effect into account and apply a finite-key analysis with the intensity fluctuations.Our secret bounds give consideration to both the intensity fluctuations and the afterpulse effect for the high-dimensional QKD systems. Numerical simulations show the bound of eight-dimensional QKD scheme is more robust to the intensity fluctuations but more sensitive to the afterpulse effect than the four-dimensional one. 展开更多
关键词 HIGH-DIMENSIONAL time-bin finite-key analysis intensity fluctuations afterpulse effect
下载PDF
Round-Robin Differential Phase Shift with Heralded Single-Photon Source 被引量:1
5
作者 Ying-Ying Zhang Wan-Su Bao +3 位作者 Chun Zhou Hong-Wei Li Yang Wang mu-sheng jiang 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第4期1-4,共4页
Round-robin differential phase shift (RRDPS) is a novel quantum key distribution protocol which can bound information leakage without monitoring signal disturbance. In this work, to decrease the effect of the vacuum... Round-robin differential phase shift (RRDPS) is a novel quantum key distribution protocol which can bound information leakage without monitoring signal disturbance. In this work, to decrease the effect of the vacuum component in a weak coherent pulses source, we employ a practical decoy-state scheme with heralded singlephoton source for the RRDPS protocol and analyze the performance of this method. In this scheme, only two decoy states are needed and the yields of single-photon state and multi-photon states, as well as the bit error rates of each photon states, can be estimated. The final key rate of this scheme is bounded and simulated over transmission distance. The results show that the two-decoy-state method with heralded single-photon source performs better than the two-decoy-state method with weak coherent pulses. 展开更多
关键词 Round-Robin Differential Phase Shift with Heralded Single-Photon Source WCP
下载PDF
Research on co-propagation of QKD and classical communication by reducing the classical optical power
6
作者 Ru-Shi He mu-sheng jiang +3 位作者 Yang Wang Ya-Hui Gan Chun Zhou Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第4期70-75,共6页
We investigate the crosstalk noise, especially the spontaneous Raman scattering, in the optical fiber of a copropagation system between quantum key distribution(QKD) and classical communications. Although many methods... We investigate the crosstalk noise, especially the spontaneous Raman scattering, in the optical fiber of a copropagation system between quantum key distribution(QKD) and classical communications. Although many methods have been proposed, such as increasing the wavelength spacing and narrowband filtering technique, to suppress Raman scattering noise, these methods greatly affect the performance of QKD. One way to solve the obstacle restricting the coexistence is to decrease the classical signal power. Based on the high gain of the gated avalanche photodiode and pulse position modulation, we demonstrate that the co-propagation system works effectively with only a small effect on long-haul fibers, which has great significance for the practical widespread commercialization of QKD. 展开更多
关键词 QKD co-propagation SPONTANEOUS Raman scattering GATED APD modulation formats
下载PDF
Finite-Key Analysis for a Practical High-Dimensional Quantum Key Distribution System Based on Time-Phase States
7
作者 Ya-Hui Gan Yang Wang +3 位作者 Wan-Su Bao Ru-Shi He Chun Zhou mu-sheng jiang 《Chinese Physics Letters》 SCIE CAS CSCD 2019年第4期5-9,共5页
High-dimensional quantum states key distribution(HD-QKD) can enable more than one bit per photon and tolerate more noise. Recently, a practical HD-QKD system based on time-phase states has provided a secret key at Mbp... High-dimensional quantum states key distribution(HD-QKD) can enable more than one bit per photon and tolerate more noise. Recently, a practical HD-QKD system based on time-phase states has provided a secret key at Mbps over metropolitan distances. For the purposes of further improving the secret key rate of a practical HD-QKD system, we make two main contributions in this work. Firstly, we present an improved parameter estimation for this system in the finite-key scenario based on the Chernoff bound and the improved Chernoff bound. Secondly, we analyze how the dimension d affects the performance of the practical HD-QKD system.We present numerical simulations about the secret key rate of the practical HD-QKD system based on different parameter estimation methods. It is found that using the improved Chernoff bound can improve the secret key rate and maximum channel loss of the practical HD-QKD system. In addition, a mixture of the 4-level and 8-level practical HD-QKD system can provide better performance in terms of the key generation rate over metropolitan distances. 展开更多
关键词 HIGH-DIMENSIONAL quantum STATES KEY distribution CONTRIBUTIONS PRACTICAL
下载PDF
Measurement-device-independent quantum cryptographic conferencing with an untrusted source
8
作者 Rui-Ke Chen Wan-Su Bao +4 位作者 Yang Wang Hai-Ze Bao Chun Zhou mu-sheng jiang Hong-Wei Li 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第1期115-124,共10页
Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practic... Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical multi-party quantum communication. In order to mitigate the experimental complexity of MDI-QCC and remove the key assumption(the sources are trusted) in MDI-QCC, we extend the framework of MDI-QKD with an untrusted source to MDI-QCC and give the rigorous security analysis of MDI-QCC with an untrusted source. What is more, in the security analysis we clearly provide a rigorous analytical method for parameters' estimation, which with simple modifications can be applied to not only MDI-QKD with an untrusted source but also arbitrary multi-party communication protocol with an untrusted source. The simulation results show that at reasonable distances the asymptotic key rates for the two cases(with trusted and untrusted sources) almost overlap, which indicates the feasibility of our protocol. 展开更多
关键词 quantum cryptographic conferencing measurement-device-independent quantum key distribution untrusted source
下载PDF
Controlling a sine wave gating single-photon detector by exploiting its filtering loophole
9
作者 Lin-Xi Feng mu-sheng jiang +3 位作者 Wan-Su Bao Hong-Wei Li Chun Zhou Yang Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期124-129,共6页
GHz single-photon detector (SPD) is a crucial part in the practical high speed quantum key distribution (QKD) system. However, any imperfections in a practical QKD system may be exploited by an eavesdropper (Eve... GHz single-photon detector (SPD) is a crucial part in the practical high speed quantum key distribution (QKD) system. However, any imperfections in a practical QKD system may be exploited by an eavesdropper (Eve) to collect information about the key without being discovered. The sine wave gating SPD (SG-SPD) based on InGaAs/InP avalanche photodiode, one kind of practical high speed SPD, may also contain loopholes. In this paper, we study the principle and characteristic of the SG-SPD and find out the filtering loophole of the SG-SPD for the first time. What is more, the proof-of-principle experiment shows that Eve could blind and control Bob's SG-SPD by exploiting this loophole. We believe that giving enough attention to this loophole can improve the practical security of the existing QKD system. GHz single-photon detector (SPD) is a crucial part in the practical high speed quantum key distribution (QKD) system. However, any imperfections in a practical QKD system may be exploited by an eavesdropper (Eve) to collect information about the key without being discovered. The sine wave gating SPD (SG-SPD) based on InGaAs/InP avalanche photodiode, one kind of practical high speed SPD, may also contain loopholes. In this paper, we study the principle and characteristic of the SG-SPD and find out the filtering loophole of the SG-SPD for the first time. What is more, the proof-of-principle experiment shows that Eve could blind and control Bob's SG-SPD by exploiting this loophole. We believe that giving enough attention to this loophole can improve the practical security of the existing QKD system. 展开更多
关键词 quantum key distribution sine wave gating single-photon detector quantum hacking practicalsecurity
下载PDF
Pulse-gated mode of commercial superconducting nanowire single photon detectors
10
作者 Fan Liu mu-sheng jiang +2 位作者 Yi-Fei Lu Yang Wang Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第4期144-150,共7页
High detection efficiency and low intrinsic dark count rate are two advantages of superconducting nanowire single photon detectors(SNSPDs).However,the stray photons penetrated into the fiber would cause the extrinsic ... High detection efficiency and low intrinsic dark count rate are two advantages of superconducting nanowire single photon detectors(SNSPDs).However,the stray photons penetrated into the fiber would cause the extrinsic dark count rate,owing to the free running mode of SNSPDs.In order to improve the performance of SNSPDs in realistic scenarios,stray photons should be investigated and suppression methods should be adopted.In this study,we demonstrate the pulsegated mode,with 500 kHz gating frequency,of a commercial SNSPD system for suppressing the response of stray photons about three orders of magnitude than its free-running counterpart on the extreme test conditions.When we push the gating frequency to 8 MHz,the dark count rate still keeps under 4% of free-running mode.In experiments,the intrinsic dark count rate is also suppressed to 4.56 × 10^(-2) counts per second with system detection efficiency of 76.4372%.Furthermore,the time-correlated single-photon counting analysis also approves the validity of our mode in suppressing the responses of stray photons. 展开更多
关键词 quantum detector superconducting nanowire pulse gated dark count rate
下载PDF
Round-robin differential quadrature phase-shift quantum key distribution
11
作者 Chun Zhou Ying-Ying Zhang +3 位作者 Wan-Su Bao Hong-Wei Li Yang Wang mu-sheng jiang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期63-67,共5页
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas... Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol. 展开更多
关键词 round-robin differential phase-shift protocol quantum key distribution intercept-resend attack beam-splitting attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部