Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections...Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.展开更多
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance...The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
The huge discrepancies between actual devices and theoretical assumptions severely threaten the security of quantum key distribution.Recently,a general new framework called the reference technique has attracted wide a...The huge discrepancies between actual devices and theoretical assumptions severely threaten the security of quantum key distribution.Recently,a general new framework called the reference technique has attracted wide attention in defending against the imperfect sources of quantum key distribution.Here,the state preparation flaws,the side channels of mode dependencies,the Trojan horse attacks,and the pulse classical correlations are studied by using the reference technique on the phase-matching protocol.Our simulation results highlight the importance of the actual secure parameters choice for transmitters,which is necessary to achieve secure communication.Increasing the single actual secure parameter will reduce the secure key rate.However,as long as the parameters are set properly,the secure key rate is still high.Considering the influences of multiple actual secure parameters will significantly reduce the secure key rate.These actual secure parameters must be considered when scientists calibrate transmitters.This work is an important step towards the practical and secure implementation of phase-matching protocol.In the future,it is essential to study the main parameters,find out their maximum and general values,classify the multiple parameters as the same parameter,and give countermeasures.展开更多
High-dimensional quantum resources provide the ability to encode several bits of information on a single photon,which can particularly increase the secret key rate rate of quantum key distribution(QKD) systems. Recent...High-dimensional quantum resources provide the ability to encode several bits of information on a single photon,which can particularly increase the secret key rate rate of quantum key distribution(QKD) systems. Recently, a practical four-dimensional QKD scheme based on time-bin quantum photonic state, only with two single-photon avalanche detectors as measurement setup, has been proven to have a superior performance than the qubit-based one. In this paper, we extend the results to our proposed eight-dimensional scheme. Then, we consider two main practical factors to improve its secret key bound. Concretely, we take the afterpulse effect into account and apply a finite-key analysis with the intensity fluctuations.Our secret bounds give consideration to both the intensity fluctuations and the afterpulse effect for the high-dimensional QKD systems. Numerical simulations show the bound of eight-dimensional QKD scheme is more robust to the intensity fluctuations but more sensitive to the afterpulse effect than the four-dimensional one.展开更多
High detection efficiency and low intrinsic dark count rate are two advantages of superconducting nanowire single photon detectors(SNSPDs).However,the stray photons penetrated into the fiber would cause the extrinsic ...High detection efficiency and low intrinsic dark count rate are two advantages of superconducting nanowire single photon detectors(SNSPDs).However,the stray photons penetrated into the fiber would cause the extrinsic dark count rate,owing to the free running mode of SNSPDs.In order to improve the performance of SNSPDs in realistic scenarios,stray photons should be investigated and suppression methods should be adopted.In this study,we demonstrate the pulsegated mode,with 500 kHz gating frequency,of a commercial SNSPD system for suppressing the response of stray photons about three orders of magnitude than its free-running counterpart on the extreme test conditions.When we push the gating frequency to 8 MHz,the dark count rate still keeps under 4% of free-running mode.In experiments,the intrinsic dark count rate is also suppressed to 4.56 × 10^(-2) counts per second with system detection efficiency of 76.4372%.Furthermore,the time-correlated single-photon counting analysis also approves the validity of our mode in suppressing the responses of stray photons.展开更多
In vivo monitoring of bioelectrical and biochemical signals with implanted electrodes has received great interest over the past decades.However,this faces huge challenges because of the severe mechanical mismatch betw...In vivo monitoring of bioelectrical and biochemical signals with implanted electrodes has received great interest over the past decades.However,this faces huge challenges because of the severe mechanical mismatch between conventional rigid electrodes and soft biological tissues.In recent years,the emergence of flexible and stretchable electrodes offers seamless and conformable biological-electronic interfaces and has demonstrated significant advantages for in vivo electrochemical and electrophysiological monitoring.This review first summarizes the strategies for electrode fabrication from the point of substrate and conductive materials.Next,recent progress in electrode functionalization for improved performance is presented.Then,the advances of flexible and stretchable electrodes in exploring bioelectrical and biochemical signals are introduced.Finally,we present some challenges and perspectives ranging from electrode fabrication to application.展开更多
In a perfect quantum key distribution(QKD)protocol,quantum states should be prepared and measured with mutually unbiased bases(MUBs).However,in a practical QKD system,quantum states are generally prepared and measured...In a perfect quantum key distribution(QKD)protocol,quantum states should be prepared and measured with mutually unbiased bases(MUBs).However,in a practical QKD system,quantum states are generally prepared and measured with imperfect MUBs using imperfect devices,possibly reducing the secret key rate and transmission distance.To analyze the security of a QKD system with imperfect MUBs,we propose virtual MUBs to characterize the quantum channel against collective attack,and analyze the corresponding secret key rate under imperfect state preparation and measurement conditions.More generally,we apply the advantage distillation method for analyzing the security of QKD with imperfect MUBs,where the error tolerance and transmission distance can be sharply improved.Our analysis method can be applied to benchmark and standardize a practical QKD system,elucidating the security analysis of different QKD protocols with imperfect devices.展开更多
基金the National Key Research and Development Program of China(Grant No.2020YFA0309702)NSAF(Grant No.U2130205)+3 种基金the National Natural Science Foundation of China(Grant Nos.62101597,61605248,and 61505261)the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies。
文摘Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China (Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation (Grant No.2021M691536)the Natural Science Foundation of Henan Province,China (Grant Nos.202300410534 and 202300410532)the Fund of the Anhui Initiative in Quantum Information Technologies。
文摘The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金the National Key Research and Development Program of China(Grant Nos.2020YFA0309702 and 2020YFA0309701)the National Natural Science Foundation of China(Grant No.62101597)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies。
文摘The huge discrepancies between actual devices and theoretical assumptions severely threaten the security of quantum key distribution.Recently,a general new framework called the reference technique has attracted wide attention in defending against the imperfect sources of quantum key distribution.Here,the state preparation flaws,the side channels of mode dependencies,the Trojan horse attacks,and the pulse classical correlations are studied by using the reference technique on the phase-matching protocol.Our simulation results highlight the importance of the actual secure parameters choice for transmitters,which is necessary to achieve secure communication.Increasing the single actual secure parameter will reduce the secure key rate.However,as long as the parameters are set properly,the secure key rate is still high.Considering the influences of multiple actual secure parameters will significantly reduce the secure key rate.These actual secure parameters must be considered when scientists calibrate transmitters.This work is an important step towards the practical and secure implementation of phase-matching protocol.In the future,it is essential to study the main parameters,find out their maximum and general values,classify the multiple parameters as the same parameter,and give countermeasures.
基金Project supported by the National Key Research and Development Program of China(Grant No.2020YFA0309702)the National Natural Science Foundation of China(Grant Nos.62101597,61605248,61675235,and 61505261)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province,China(Grant Nos.202300410534 and 202300410532)the Anhui Initiative Fund in Quantum Information Technologies。
文摘High-dimensional quantum resources provide the ability to encode several bits of information on a single photon,which can particularly increase the secret key rate rate of quantum key distribution(QKD) systems. Recently, a practical four-dimensional QKD scheme based on time-bin quantum photonic state, only with two single-photon avalanche detectors as measurement setup, has been proven to have a superior performance than the qubit-based one. In this paper, we extend the results to our proposed eight-dimensional scheme. Then, we consider two main practical factors to improve its secret key bound. Concretely, we take the afterpulse effect into account and apply a finite-key analysis with the intensity fluctuations.Our secret bounds give consideration to both the intensity fluctuations and the afterpulse effect for the high-dimensional QKD systems. Numerical simulations show the bound of eight-dimensional QKD scheme is more robust to the intensity fluctuations but more sensitive to the afterpulse effect than the four-dimensional one.
基金Project supported by the National Natural Science Foundation of China(Grant No.61605248)the National Basic Research Program of China(Grant No.2013CB338002)。
文摘High detection efficiency and low intrinsic dark count rate are two advantages of superconducting nanowire single photon detectors(SNSPDs).However,the stray photons penetrated into the fiber would cause the extrinsic dark count rate,owing to the free running mode of SNSPDs.In order to improve the performance of SNSPDs in realistic scenarios,stray photons should be investigated and suppression methods should be adopted.In this study,we demonstrate the pulsegated mode,with 500 kHz gating frequency,of a commercial SNSPD system for suppressing the response of stray photons about three orders of magnitude than its free-running counterpart on the extreme test conditions.When we push the gating frequency to 8 MHz,the dark count rate still keeps under 4% of free-running mode.In experiments,the intrinsic dark count rate is also suppressed to 4.56 × 10^(-2) counts per second with system detection efficiency of 76.4372%.Furthermore,the time-correlated single-photon counting analysis also approves the validity of our mode in suppressing the responses of stray photons.
基金This work was supported by the National Natural Science Foundation of China(Grant 22122408)the National Key R&D Program of China(2022YFA1104802).
文摘In vivo monitoring of bioelectrical and biochemical signals with implanted electrodes has received great interest over the past decades.However,this faces huge challenges because of the severe mechanical mismatch between conventional rigid electrodes and soft biological tissues.In recent years,the emergence of flexible and stretchable electrodes offers seamless and conformable biological-electronic interfaces and has demonstrated significant advantages for in vivo electrochemical and electrophysiological monitoring.This review first summarizes the strategies for electrode fabrication from the point of substrate and conductive materials.Next,recent progress in electrode functionalization for improved performance is presented.Then,the advances of flexible and stretchable electrodes in exploring bioelectrical and biochemical signals are introduced.Finally,we present some challenges and perspectives ranging from electrode fabrication to application.
基金supported by the National Safety Academic Fund(Grant No.U2130205)the National Natural Science Foundation of China(Grant Nos.62371244,and 62171424)the Natural Science Foundation of Henan(Grant No.242300421219)。
文摘In a perfect quantum key distribution(QKD)protocol,quantum states should be prepared and measured with mutually unbiased bases(MUBs).However,in a practical QKD system,quantum states are generally prepared and measured with imperfect MUBs using imperfect devices,possibly reducing the secret key rate and transmission distance.To analyze the security of a QKD system with imperfect MUBs,we propose virtual MUBs to characterize the quantum channel against collective attack,and analyze the corresponding secret key rate under imperfect state preparation and measurement conditions.More generally,we apply the advantage distillation method for analyzing the security of QKD with imperfect MUBs,where the error tolerance and transmission distance can be sharply improved.Our analysis method can be applied to benchmark and standardize a practical QKD system,elucidating the security analysis of different QKD protocols with imperfect devices.