Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will ca...Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment.展开更多
Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanc...Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed.展开更多
Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSP...Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSPS).The method assumes that the dark count rate of each pulse is random and independent.The lower bound of the count rate and the upper bound of the error rate of a single photon state are estimated.The method is applied to the decoy-state QKD system with and without the fluctuation of dark count rate.Because the estimation of the upper bound of a single photon state's error rate is stricter,the method can obtain better performance than the existing methods under the same condition of implementation.展开更多
A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis ...A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis of the original decoy-state idea.The three-state SARG04 decoy-state protocol with an unstable parametric down-conversion source is considered in the simulation.The simulation results show that the protocol in this paper with an unstable source gives a key generation rate that is close to that with a stable source,and only slight advantage appears by using a stable source when the transmission distance is long.So the SARG04 decoy-state protocol with an unstable source still can obtain the unconditional security with a slightly shortened final key.展开更多
Measurement-device-independent quantum key distribution(MDI-QKD) is aimed at removing all detector side channel attacks,while its security relies on the assumption that the encoding systems including sources are fully...Measurement-device-independent quantum key distribution(MDI-QKD) is aimed at removing all detector side channel attacks,while its security relies on the assumption that the encoding systems including sources are fully characterized by the two legitimate parties. By exploiting the mismatched-basis statistics in the security analysis, MDI-QKD even with uncharacterized qubits can generate secret keys. In this paper, considering the finite size effect, we study the decoy-state MDI-QKD protocol with mismatchedbasis events statistics by performing full parameter optimization, and the simulation result shows that this scheme is very practical.展开更多
基金Supported by the National Basic Research Program (973) of China under Grant No.2010CB923200Chinese Universities Scientific Fund BUPT2009RC0709
文摘Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment.
基金Supported by the National Nature Science Foundation of China( No. 60773003,60970120).
文摘Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed.
基金supported by the National High Technology Research and Development Program of China (No.2009AAJ128)the Science Foundation of Naval University of Engineering (No.HGDQNJJ11022)
文摘Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSPS).The method assumes that the dark count rate of each pulse is random and independent.The lower bound of the count rate and the upper bound of the error rate of a single photon state are estimated.The method is applied to the decoy-state QKD system with and without the fluctuation of dark count rate.Because the estimation of the upper bound of a single photon state's error rate is stricter,the method can obtain better performance than the existing methods under the same condition of implementation.
基金supported by the National High Technology Research and Development Program of China(No.2009AAJ128)
文摘A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis of the original decoy-state idea.The three-state SARG04 decoy-state protocol with an unstable parametric down-conversion source is considered in the simulation.The simulation results show that the protocol in this paper with an unstable source gives a key generation rate that is close to that with a stable source,and only slight advantage appears by using a stable source when the transmission distance is long.So the SARG04 decoy-state protocol with an unstable source still can obtain the unconditional security with a slightly shortened final key.
基金supported by the National Basic Research Program of China(Grant Nos.2011CBA00200 and 2011CB921200)the National Natural Science Foundation of China(Grant Nos.61201239,61205118,11304397 and 61475148)+1 种基金China Postdoctoral Science Foundation(Grant No.2013M540514)Anhui Provincial Natural Science Foundation(Grant No.1408085QF102)
文摘Measurement-device-independent quantum key distribution(MDI-QKD) is aimed at removing all detector side channel attacks,while its security relies on the assumption that the encoding systems including sources are fully characterized by the two legitimate parties. By exploiting the mismatched-basis statistics in the security analysis, MDI-QKD even with uncharacterized qubits can generate secret keys. In this paper, considering the finite size effect, we study the decoy-state MDI-QKD protocol with mismatchedbasis events statistics by performing full parameter optimization, and the simulation result shows that this scheme is very practical.