Phase and amplitude regeneration are necessary for degraded differential phase-shift keying communication sys- tems. This paper proposes a regenerator based on semiconductor optical amplifier for differential phase-sh...Phase and amplitude regeneration are necessary for degraded differential phase-shift keying communication sys- tems. This paper proposes a regenerator based on semiconductor optical amplifier for differential phase-shift keying signals. The key regeneration mechanism is theoretically analysed. The effectiveness of semiconductor optical amplifier based regenerator is demonstrated by comparing the bit error rate and eye diagrams before and after regeneration for 40-Cbit/s differential phase-shift keying 1080-km transmission systems. The results show that regeneration effects are very well. Bit error rate is tess than 10-12 with the regenerator.展开更多
The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett-Brassard 1984, the Bennett Brassard Mermin 1992, an...The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett-Brassard 1984, the Bennett Brassard Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photonnumber splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates.展开更多
Some applications are constrained only to implement low cost receivers. In this case, designers are required to use less complex and non-expensive modulation techniques. Differential Quadrature Phase Shift Keying (DQP...Some applications are constrained only to implement low cost receivers. In this case, designers are required to use less complex and non-expensive modulation techniques. Differential Quadrature Phase Shift Keying (DQPSK) and Gaussian Frequency Shift Keying (GFSK) can be non-coherently demodulated with simple algorithms. However, these types of demodulation are not robust and suffer from poor performance. This paper proposes a new method to enhance the performance of DQPSK and GFSK using Interactive Kalman Filtering (IKF) technique, in which a one Unscented Kalman Filter (UKF) and two Kalman Filters (KF) are coupled to optimize the demodulated signals. This method consists of simple but very effective algorithms without adding complexity to the demodulators comparing to other very complex methods. UKF is used in this method due to its superiority in approximating and estimating nonlinear systems and its ability to handle non-Gaussian noise environments. The proposed method has been validated by creating a MATLAB/SIMULINK Bluetooth system model, in which the IKF is integrated into the receiver, which implement both DQPSK and GFSK, and run simulation in Gaussian and Non-Gaussian noise environments. Results have shown the effectiveness of this method in optimizing the received signals, and that the UKF outperforms the Extended Kalman Filter (EKF).展开更多
Broad-band all-optical wavelength conversion of differential phase-shift keyed (DPSK) signal is experimentally demonstrated. This scheme is composed of a one-bit delay interferometer demodulation stage followed by a...Broad-band all-optical wavelength conversion of differential phase-shift keyed (DPSK) signal is experimentally demonstrated. This scheme is composed of a one-bit delay interferometer demodulation stage followed by a semiconductor optical amplifier (SOA) based nonlinear polarization switch. A wavelength converter for the 10 G b/s DPSK signal is presented, which has a wide wavelength range of more than 30 nm. The converted signals experience small power penalties less than 1.4 dB compared with the original signal, at a bit error rate of 10-9. Additionally, the optical spectra, the measured waveforms and the open eye diagrams of the converted signals show a high quality wavelength conversion performance.展开更多
The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) at...The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.展开更多
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas...Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.展开更多
Recently, a novel kind of quantum key distribution called the round-robin differential phase-shift (RRDPS) protocol was proposed, which bounds the amount of leakage without monitoring signal disturbance. The protoco...Recently, a novel kind of quantum key distribution called the round-robin differential phase-shift (RRDPS) protocol was proposed, which bounds the amount of leakage without monitoring signal disturbance. The protocol can be implemented by a weak coherent source. The security of this protocol with a simply characterized source has been proved. The application of a common phase shift can improve the secret key rate of the protocol. In practice, the randomized phase is discrete and the secret key rate is deviated from the continuous case. In this study, we analyze security of the RRDPS protocol with discrete-phase-randomized coherent state source and bound the secret key rate. We fix the length of each packet at 32 and 64, then simulate the secret key rates of the RRDPS protocol with discrete-phase randomization and continuous-phase randomization. Our simulation results show that the performance of the discrete-phase randomization case is close to the continuous counterpart with only a small number of discrete phases. The research is practically valuable for experimental implementation.展开更多
In this paper, we proposed the scheme for a passive round-robin differential-phase-shift quantum key distribution(RRDPS-QKD) set-up based on the principle of Hong–Ou–Mandel interference. Our scheme requires two le...In this paper, we proposed the scheme for a passive round-robin differential-phase-shift quantum key distribution(RRDPS-QKD) set-up based on the principle of Hong–Ou–Mandel interference. Our scheme requires two legitimate parties to prepare their signal state with two different non-orthogonal bases instead of single in original protocol. Incorporating this characteristic, we establish the level of security of our protocol under the intercept-resend attack and demonstrate its detector-flaw-immune feature. Furthermore, we show that our scheme not only inherits the merit of better tolerance of bit errors and finite-sized-key effects but can be implemented using hardware similar to the measurement device independent QKD(MDI-QKD). This ensures good compatibility with the current commonly used quantum system.展开更多
Quantum key distribution is the art of sharing secret keys between two distant parties, and has attracted a lot of attention due to its unconditional security. Compared with other quantum key distribution protocols, t...Quantum key distribution is the art of sharing secret keys between two distant parties, and has attracted a lot of attention due to its unconditional security. Compared with other quantum key distribution protocols, the differential phase shift quantum key distribution protocol has higher efficiency and simpler apparatus. Unfortunately, the uncondi- tional security of differential phase shift quantum key distribution has not been proved. Utilizing the sharp continuity of the von Neuman entropy and some basic inequalities, we estimate the upper bound for the eavesdropper Eve's infor- mation. We then prove the lower bound for the security of the differential phase shift quantum key distribution protocol against a one-pulse attack with Devatak-Winter's secret key rate formula.展开更多
基金supported by the Scientific Fund for Chinese Universities (Grant No. BUPT 2009RC0413)the National "863" High Technology Projects (Grant No. 2009AA01Z224)
文摘Phase and amplitude regeneration are necessary for degraded differential phase-shift keying communication sys- tems. This paper proposes a regenerator based on semiconductor optical amplifier for differential phase-shift keying signals. The key regeneration mechanism is theoretically analysed. The effectiveness of semiconductor optical amplifier based regenerator is demonstrated by comparing the bit error rate and eye diagrams before and after regeneration for 40-Cbit/s differential phase-shift keying 1080-km transmission systems. The results show that regeneration effects are very well. Bit error rate is tess than 10-12 with the regenerator.
基金supported by the Natural Science Foundation of Beijing,China (Grant No XK100130837)
文摘The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett-Brassard 1984, the Bennett Brassard Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photonnumber splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates.
文摘Some applications are constrained only to implement low cost receivers. In this case, designers are required to use less complex and non-expensive modulation techniques. Differential Quadrature Phase Shift Keying (DQPSK) and Gaussian Frequency Shift Keying (GFSK) can be non-coherently demodulated with simple algorithms. However, these types of demodulation are not robust and suffer from poor performance. This paper proposes a new method to enhance the performance of DQPSK and GFSK using Interactive Kalman Filtering (IKF) technique, in which a one Unscented Kalman Filter (UKF) and two Kalman Filters (KF) are coupled to optimize the demodulated signals. This method consists of simple but very effective algorithms without adding complexity to the demodulators comparing to other very complex methods. UKF is used in this method due to its superiority in approximating and estimating nonlinear systems and its ability to handle non-Gaussian noise environments. The proposed method has been validated by creating a MATLAB/SIMULINK Bluetooth system model, in which the IKF is integrated into the receiver, which implement both DQPSK and GFSK, and run simulation in Gaussian and Non-Gaussian noise environments. Results have shown the effectiveness of this method in optimizing the received signals, and that the UKF outperforms the Extended Kalman Filter (EKF).
文摘Broad-band all-optical wavelength conversion of differential phase-shift keyed (DPSK) signal is experimentally demonstrated. This scheme is composed of a one-bit delay interferometer demodulation stage followed by a semiconductor optical amplifier (SOA) based nonlinear polarization switch. A wavelength converter for the 10 G b/s DPSK signal is presented, which has a wide wavelength range of more than 30 nm. The converted signals experience small power penalties less than 1.4 dB compared with the original signal, at a bit error rate of 10-9. Additionally, the optical spectra, the measured waveforms and the open eye diagrams of the converted signals show a high quality wavelength conversion performance.
文摘The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61505261 and 11304397)the National Basic Research Program of China(Grant No.2013CB338002)
文摘Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.
基金Supported by the National Basic Research Program of China under Grant No 2013CB338002the National Natural Science Foundation of China under Grant Nos 11304397 and 61505261
文摘Recently, a novel kind of quantum key distribution called the round-robin differential phase-shift (RRDPS) protocol was proposed, which bounds the amount of leakage without monitoring signal disturbance. The protocol can be implemented by a weak coherent source. The security of this protocol with a simply characterized source has been proved. The application of a common phase shift can improve the secret key rate of the protocol. In practice, the randomized phase is discrete and the secret key rate is deviated from the continuous case. In this study, we analyze security of the RRDPS protocol with discrete-phase-randomized coherent state source and bound the secret key rate. We fix the length of each packet at 32 and 64, then simulate the secret key rates of the RRDPS protocol with discrete-phase randomization and continuous-phase randomization. Our simulation results show that the performance of the discrete-phase randomization case is close to the continuous counterpart with only a small number of discrete phases. The research is practically valuable for experimental implementation.
基金Project supported by the Fund from the State Key Laboratory of Information Photonics and Optical Communications(Beijing University of Posts and Telecommunications)(Grant No.IPOC2017ZT0)
文摘In this paper, we proposed the scheme for a passive round-robin differential-phase-shift quantum key distribution(RRDPS-QKD) set-up based on the principle of Hong–Ou–Mandel interference. Our scheme requires two legitimate parties to prepare their signal state with two different non-orthogonal bases instead of single in original protocol. Incorporating this characteristic, we establish the level of security of our protocol under the intercept-resend attack and demonstrate its detector-flaw-immune feature. Furthermore, we show that our scheme not only inherits the merit of better tolerance of bit errors and finite-sized-key effects but can be implemented using hardware similar to the measurement device independent QKD(MDI-QKD). This ensures good compatibility with the current commonly used quantum system.
基金supported by the National Fundamental Research Program of China (Grant No. 2006CB921900)National Natural Science Foundation of China (Grant Nos. 60537020 and 60621064)the Innovation Funds of the Chinese Academy of Sciences
文摘Quantum key distribution is the art of sharing secret keys between two distant parties, and has attracted a lot of attention due to its unconditional security. Compared with other quantum key distribution protocols, the differential phase shift quantum key distribution protocol has higher efficiency and simpler apparatus. Unfortunately, the uncondi- tional security of differential phase shift quantum key distribution has not been proved. Utilizing the sharp continuity of the von Neuman entropy and some basic inequalities, we estimate the upper bound for the eavesdropper Eve's infor- mation. We then prove the lower bound for the security of the differential phase shift quantum key distribution protocol against a one-pulse attack with Devatak-Winter's secret key rate formula.