A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the f...A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.展开更多
A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical i...A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.展开更多
A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys...A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.展开更多
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable(CV) quantum key distribution(QKD). The calculation shows that secret key can b...In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable(CV) quantum key distribution(QKD). The calculation shows that secret key can be distilled with a Gaussian quantum discord state against entangling cloner attack. Secret key rate is increased with the increasing of quantum discord for CV QKD with the Gaussian quantum discord state. Although the calculated results point out that secret key rate using the Gaussian quantum discord state is lower than that using squeezed state and coherent state at the same energy level, we demonstrate that the Gaussian quantum discord, which only involving quantum correlation without the existence of entanglement, may provide a new resource for realizing CV QKD.展开更多
文摘A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.
基金The project supported by the National Fundamental Research Program under Grant No. 2006CB0L0106, National Natural Science Foundation of China under Grant Nos. 60433050, 10325521, and 10447106, and the SRFDP Program of Education Ministry of China and Beijing Education Committee under Grant No. XK100270454
文摘A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.
文摘A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.
基金supported by the National Basic Research Program of China(2010CB923103)the National Natural Science Foundation of China(11174188,61121064)+1 种基金Shanxi Scholarship Council of China(2012-010)Program for the Outstanding Innovative Teams of Higher Learning Institutions of Shanxi
文摘In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable(CV) quantum key distribution(QKD). The calculation shows that secret key can be distilled with a Gaussian quantum discord state against entangling cloner attack. Secret key rate is increased with the increasing of quantum discord for CV QKD with the Gaussian quantum discord state. Although the calculated results point out that secret key rate using the Gaussian quantum discord state is lower than that using squeezed state and coherent state at the same energy level, we demonstrate that the Gaussian quantum discord, which only involving quantum correlation without the existence of entanglement, may provide a new resource for realizing CV QKD.