期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
一种利用EPR块状传输的量子密钥协议(英文) 被引量:1
1
作者 王景燕 王妍妍 +1 位作者 侯奎 史守华 《安徽大学学报(自然科学版)》 CAS 北大核心 2012年第1期64-68,共5页
提出一种基于EPR块状传输技术的量子密钥协议.由于在密钥传输中运用了EPR对,而每个EPR对包含两比特信息,通过这种方法 Alice和Bob可以得到对方的全部信息,从而使这种方法的效率接近于100%.两次安全性检测保证了这种方法的安全性.
关键词 量子协议 量子密钥传输 贝尔基检测 EPR对 安全性检测
下载PDF
The NP-Complete Face of Information-Theoretic Security
2
作者 Stefan Rass Peter Schartner 《Computer Technology and Application》 2011年第11期893-905,共13页
The problem of perfectly secure communication has enjoyed considerable theoretical treatment over the last decades. Results in this area include the identification of multipath transmission as a necessary ingredient, ... The problem of perfectly secure communication has enjoyed considerable theoretical treatment over the last decades. Results in this area include the identification of multipath transmission as a necessary ingredient, as well as quantum key distribution (QKD), which can perfectly protect direct lines, Combining the advantages of the quantum and multipath transmission paradigm, as well as rigorously analyzing the security of such combined techniques, is possible by virtue of game-theory. Based on a game-theoretic measure of channel vulnerability, the authors prove the problem of setting up infrastructures for QKD-based multipath transmission to be NP-complete. The authors consider the problem in two flavors, both being computationally hard. Remarkably, the authors' results indicate that the P-vs-NP-question is only of minor effect for confidentiality, because either nowadays public-key cryptosystems remain secure (in case that P, NP) or infrastructures facilitating perfectly confidential communication can be constructed efficiently (in case that P = NP). 展开更多
关键词 Risk management CRYPTOGRAPHY complexity theory NP-COMPLETENESS network security
下载PDF
Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources 被引量:3
3
作者 Jie Gu Xiao-Yu Cao +4 位作者 Yao Fu Zong-Wu He Ze-Jie Yin Hua-Lei Yin Zeng-Bing Chen 《Science Bulletin》 SCIE EI CAS CSCD 2022年第21期2167-2175,共9页
The security of quantum key distribution(QKD)is severely threatened by discrepancies between realistic devices and theoretical assumptions.Recently,a significant framework called the reference technique was proposed t... The security of quantum key distribution(QKD)is severely threatened by discrepancies between realistic devices and theoretical assumptions.Recently,a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws,side channels caused by mode dependencies,the Trojan horse attacks and pulse correlations.Here,we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.We present a characterization of source flaws and connect them to experiments,together with a finite-key analysis against coherent attacks.In addition,we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 d B channel loss.Compared with previous QKD protocols with imperfect devices,our study considerably improves both the secure key rate and the transmission distance,and shows application potential in the practical deployment of secure QKD with device imperfections. 展开更多
关键词 Measurement-device-independent Quantum key distribution Reference technique Source flaw characterization Practical security
原文传递
Multiuser-to-multiuser entanglement distribution based on 1550 nm polarization-entangled photons 被引量:10
4
作者 Dong-Yang Cao 《Science Bulletin》 SCIE EI CAS CSCD 2015年第12期1128-1132,I0003,共6页
Telecom-band polarization-entangled photon- pair source has been widely used in quantum communi- cation due to its acceptable transmission loss. It is also used in cooperation with wavelength-division multiplexing (... Telecom-band polarization-entangled photon- pair source has been widely used in quantum communi- cation due to its acceptable transmission loss. It is also used in cooperation with wavelength-division multiplexing (WDM) to construct entanglement distributor. However, previous schemes generally are not suitable for multinode scenario. In this paper, we construct a telecom-band po- larization-entangled photon-pair source, and it shows ul- trahigh fidelity and concurrence which are both greater than 90 % (raw data). Moreover, we set up a four-by-four entanglement distributor based on WDM. We check the 16 Clauser-Horne-Shimony-Holt inequalities, which show nonlocality. Lastly, as an example of practical application of this source, we estimate the quantum bit error rates and quantum secret key rates when it is used in quantum key distribution. Furthermore, the transmission of entanglement in long optical fibers is also demonstrated. 展开更多
关键词 Entanglement distribution MULTIUSER Telecom-band
原文传递
Performance analysis of quantum key distribution based on air-water channel
5
作者 周媛媛 周学军 《Optoelectronics Letters》 EI 2015年第2期149-152,共4页
Considering the air-water interface and ocean water’s optical attenuation,the performance of quantum key distribution(QKD)based on air-water channel is studied.The effects of photons’various incident angles to air-w... Considering the air-water interface and ocean water’s optical attenuation,the performance of quantum key distribution(QKD)based on air-water channel is studied.The effects of photons’various incident angles to air-water interface on quantum bit error rate(QBER)and the maximum secure transmission distance are analyzed.Taking the optical attenuation of ocean water into account,the performance bounds of QKD in different types of ocean water are discussed.The simulation results show that the maximum secure transmission distance of QKD gradually reduces as the incident angle from air to ocean water increases.In the clearest ocean water with the lowest attenuation,the maximum secure transmission distance of photons far exceeds the the working depth of underwater vehicles.In intermediate and murky ocean waters with higher attenuation,the secure transmission distance shortens,but the underwater vehicle can deploy other accessorial methods for QKD with perfect security.So the implementation of OKD between the satellite and the underwater vehicle is feasible. 展开更多
关键词 Air Bit error rate Electromagnetic wave attenuation OCEANOGRAPHY Optical communication Phase interfaces PHOTONS Vehicle transmissions VEHICLES
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部