Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati...Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.展开更多
Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will ca...Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment.展开更多
Males of the nursery web spider Pisaura mirabil usually offer an insect prey wrapped in white silk as a nuptial gift to facilitate copulation. Males exploit female foraging preferences in a sexual context as females f...Males of the nursery web spider Pisaura mirabil usually offer an insect prey wrapped in white silk as a nuptial gift to facilitate copulation. Males exploit female foraging preferences in a sexual context as females feed on the gift during copula- tion. It is possible for males to copulate without a gift, however strong female preference for the gift leads to dramatically higher mating success for gift-giving males. Females are polyandrous, and gift-giving males achieve higher mating success, longer copulations, and increased sperm transfer that confer advantages in sperm competition. Intriguingly, field studies show that ap- proximately one third of males carry a worthless gift consisting of dry and empty insect exoskeletons or plant fragments wrapped in white silk. Silk wrapping disguises gift content and females are able to disclose gift content only after accepting and feeding on the gift, meanwhile males succeed in transferring sperm. The evolution of deceit by worthless gift donation may be favoured by strong intra-sexual competition and costs of gift-construction including prey capture, lost foraging opportunities and investment in silk wrapping. Females that receive empty worthless gifts terminate copulation sooner, which reduces sperm transfer and likely disadvantages males in sperm competition. The gift-giving trait may thus become a target of sexually antagonistic co-evolution, where deceit by worthless gifts leads to female resistance to the trait. We discuss factors such as female mating rate and intensity of sperm competition that may shape the evolution of male deception, and how ecological factors may influence the evolution and maintenance of worthless gifts as an evolutionarily stable alternative mating strategy by frequency dependent selection展开更多
Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSP...Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSPS).The method assumes that the dark count rate of each pulse is random and independent.The lower bound of the count rate and the upper bound of the error rate of a single photon state are estimated.The method is applied to the decoy-state QKD system with and without the fluctuation of dark count rate.Because the estimation of the upper bound of a single photon state's error rate is stricter,the method can obtain better performance than the existing methods under the same condition of implementation.展开更多
A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis ...A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis of the original decoy-state idea.The three-state SARG04 decoy-state protocol with an unstable parametric down-conversion source is considered in the simulation.The simulation results show that the protocol in this paper with an unstable source gives a key generation rate that is close to that with a stable source,and only slight advantage appears by using a stable source when the transmission distance is long.So the SARG04 decoy-state protocol with an unstable source still can obtain the unconditional security with a slightly shortened final key.展开更多
基金The National Natural Science Foundation of China(No.60873101)the Natural Science Foundation of Jiangsu Province(No.BK2008209)the Research Foundation of Nanjing University of Information Science and Technology(No.20080298)
文摘Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.
基金Supported by the National Basic Research Program (973) of China under Grant No.2010CB923200Chinese Universities Scientific Fund BUPT2009RC0709
文摘Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment.
文摘Males of the nursery web spider Pisaura mirabil usually offer an insect prey wrapped in white silk as a nuptial gift to facilitate copulation. Males exploit female foraging preferences in a sexual context as females feed on the gift during copula- tion. It is possible for males to copulate without a gift, however strong female preference for the gift leads to dramatically higher mating success for gift-giving males. Females are polyandrous, and gift-giving males achieve higher mating success, longer copulations, and increased sperm transfer that confer advantages in sperm competition. Intriguingly, field studies show that ap- proximately one third of males carry a worthless gift consisting of dry and empty insect exoskeletons or plant fragments wrapped in white silk. Silk wrapping disguises gift content and females are able to disclose gift content only after accepting and feeding on the gift, meanwhile males succeed in transferring sperm. The evolution of deceit by worthless gift donation may be favoured by strong intra-sexual competition and costs of gift-construction including prey capture, lost foraging opportunities and investment in silk wrapping. Females that receive empty worthless gifts terminate copulation sooner, which reduces sperm transfer and likely disadvantages males in sperm competition. The gift-giving trait may thus become a target of sexually antagonistic co-evolution, where deceit by worthless gifts leads to female resistance to the trait. We discuss factors such as female mating rate and intensity of sperm competition that may shape the evolution of male deception, and how ecological factors may influence the evolution and maintenance of worthless gifts as an evolutionarily stable alternative mating strategy by frequency dependent selection
基金supported by the National High Technology Research and Development Program of China (No.2009AAJ128)the Science Foundation of Naval University of Engineering (No.HGDQNJJ11022)
文摘Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSPS).The method assumes that the dark count rate of each pulse is random and independent.The lower bound of the count rate and the upper bound of the error rate of a single photon state are estimated.The method is applied to the decoy-state QKD system with and without the fluctuation of dark count rate.Because the estimation of the upper bound of a single photon state's error rate is stricter,the method can obtain better performance than the existing methods under the same condition of implementation.
基金supported by the National High Technology Research and Development Program of China(No.2009AAJ128)
文摘A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis of the original decoy-state idea.The three-state SARG04 decoy-state protocol with an unstable parametric down-conversion source is considered in the simulation.The simulation results show that the protocol in this paper with an unstable source gives a key generation rate that is close to that with a stable source,and only slight advantage appears by using a stable source when the transmission distance is long.So the SARG04 decoy-state protocol with an unstable source still can obtain the unconditional security with a slightly shortened final key.