期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Passive decoy-state quantum key distribution using weak coherent pulses with modulator attenuation
1
作者 李源 鲍皖苏 +2 位作者 李宏伟 周淳 汪洋 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第11期118-124,共7页
Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on t... Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. We introduce and analyze the unbalanced Mach-Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modulator attenuation. According to the attenuation parameter 6, the pass efficiencies are given. Then, the key generation rate can be acquired. From numerical simulations, it can be seen that modulator attenuation has a non- negligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation. 展开更多
关键词 quantum key distribution passive decoy state modulator attenuation weak coherent pulses
下载PDF
Temporally Modulated Phase Retrieval Method for Weak Temporal Phase Measurement of Laser Pulses
2
作者 姚玉东 乔治 +2 位作者 汪小超 范薇 林尊琪 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第3期29-33,共5页
We propose a simple iterative algorithm based on a temporally movable phase modulation process to retrieve the weak temporal phase of laser pulses. This unambiguous method can be used to achieve a high accuracy and to... We propose a simple iterative algorithm based on a temporally movable phase modulation process to retrieve the weak temporal phase of laser pulses. This unambiguous method can be used to achieve a high accuracy and to simultaneously measure the weak temporal phase and temporal profile of pulses, which are almost transform- limited. A detailed analysis shows that this iterative method has valuable potential applications in the charac- terization of pulses with weak temporal phase. 展开更多
关键词 Temporally Modulated Phase Retrieval Method for weak Temporal Phase Measurement of Laser pulses
下载PDF
Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key 被引量:1
3
作者 李源 鲍皖苏 +2 位作者 李宏伟 周淳 汪洋 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第1期452-459,共8页
Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this paper, based on the ... Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this paper, based on the WCP source which can be used for the passive decoy-state method, we obtain the expressions of single-photon error rates, single-photon counts, and phase error rates. According to the information of smooth min-entropy, we calculate the key generation rate under the condition of finite-length key. Key generation rates with different numbers of pulses are compared by numerical simulations. From the results, it can be seen that the passive decoy-state method can have good results if the total number of pulses reaches 1010. We also simulate the passive decoy-state method with different probabilities of choosing a pulse for parameter estimation when the number of pulses is fixed. 展开更多
关键词 quantum key distribution passive decoy-state finite-length key weak coherent pulses
下载PDF
Decoy-state method for quantum-key-distribution-based quantum private query 被引量:2
4
作者 Bin Liu Shuang Xia +3 位作者 Di Xiao Wei Huang Bingjie Xu Yang Li 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2022年第4期41-48,共8页
The quantum private query(QPQ)is a quantum solution for the symmetrically private information retrieval problem.We study the security of quantum-key-distribution-based QPQ with weak coherent pulses.The result shows th... The quantum private query(QPQ)is a quantum solution for the symmetrically private information retrieval problem.We study the security of quantum-key-distribution-based QPQ with weak coherent pulses.The result shows that multiphoton pulses have posed a serious threat to the participant’s privacy in QPQ protocols.Then we propose a decoy-state method that can help the honest participant detect the attack by exploiting multiphoton pulses and improving the key distillation process to defend against such attack.The analysis demonstrates that our decoy-state method significantly improves the security of the QPQ with weak coherent pulses,which solves a major obstacle in the practical application of the QPQ. 展开更多
关键词 quantum private query symmetrically private information retrieval quantum key distribution decoy state weak coherent pulse
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部