An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the (×)(n ≥3) Hilbert space is presented. In this protocol, the particles in the orthogonal product states fo...An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the (×)(n ≥3) Hilbert space is presented. In this protocol, the particles in the orthogonal product states form two particle sequences. The sender, Alice, first sends one sequence to the receiver, Bob. After Bob receives the first particle sequence, Alice and Bob check eavesdropping by measuring a fraction of particles randomly chosen. After ensuring the security of the quantum channel, Alice sends the other particle sequence to Bob. By making an orthogonal measurement on the two particle sequences, Bob can obtain the information of the orthogonal product states sent by Alice. This protocol has many distinct features such as great capacity, high efficiency in that it uses all orthogonal product states in distributing the key except those chosen for checking eavesdroppers.展开更多
An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3 3 Hilbert space is presented. The sender, Alice, disorders the orthogonal product state sequence and sends it to Bob. Aft...An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3 3 Hilbert space is presented. The sender, Alice, disorders the orthogonal product state sequence and sends it to Bob. After Alice has published the matching information of the particle sequence, Bob recovers the correct correspondences and makes an orthogonal measurement on the orthogonal product states to obtain the information sent by Alice. Finally, security analysis is also made.展开更多
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal deco...Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.展开更多
A Gaussian channel with additive interference that is causally known to the transmitter is called a Dirty-Tape Channel(DTC).In this paper,we consider a state-dependent dirty-tape Gaussian relay channel with orthogonal...A Gaussian channel with additive interference that is causally known to the transmitter is called a Dirty-Tape Channel(DTC).In this paper,we consider a state-dependent dirty-tape Gaussian relay channel with orthogonal channels from the source to the relay and from the source and relay to the destination.The orthogonal channels are corrupted by two independent additive interferences causally known to both the source and relay.The lower and upper bounds of the channel capacity are established.The lower bound is obtained by employing superposition coding at the source,Partial Decode-and-Forward(PDF)relaying at the relay,and a strategy similar to that used by Shannon at the source and relay.The explicit capacity is characterised when the power of the relay is sufficiently large.Finally,several numerical examples are provided to illustrate the impact of additive interferences and the role of the relay in information transmission and in removing the interference.展开更多
Collider is a machine or device that usually causes two beams of high-speed particles moving to collide in a straight line. The fundamental purpose of a collision is to obtain an abnormal mass-energy density and attem...Collider is a machine or device that usually causes two beams of high-speed particles moving to collide in a straight line. The fundamental purpose of a collision is to obtain an abnormal mass-energy density and attempt to discover new physics and new substances namely new physical states. However, linear collisions are not easy to achieve the above purpose. Through the comparable experiment of rear-end collision, head-on collision and orthogonal collision of two low-velocity particles, this paper theoretically proposes a new idea that the orthogonal collision between two-beam high-velocity particles can really produce an abnormal mass-energy density. This machine based on the new idea of orthogonal collision can not only greatly reduce the construction cost of colliders, but also is the most effective way to achieve the purpose of collision.展开更多
By taking full account of the non-orthogonality of the orbitals between the low-lying doubly excited states ^1po and the singly excited states ^1S^e and ^1D^e of He, the corresponding radiative decay rates have been i...By taking full account of the non-orthogonality of the orbitals between the low-lying doubly excited states ^1po and the singly excited states ^1S^e and ^1D^e of He, the corresponding radiative decay rates have been investigated theoretically via analytic generalized Laguerre-type atomic orbitals at a nearly numerical multi-conflguration self-consistent field accuracy in a general non-orthogonal configuration interaction scheme. From these rates, we calculate the VUV photon emission and metastable atom spectra, and both are found to be in good qualitative agreement with recent excellent measurements. We obtain, successfully, the enhancement of the VUV photon spectrum, experimentally observed at the energy of (2s4p-4s2p)/(2p,3d) ^1po as compared with other nearby lying states. The mechanism proposed by Odling-Smee et al is verified, implying that taking appropriate account of the overlap existing between orbitals of the low-lying doubly excited and singly excited states (especially important for the compact orbitals) can reveal basic physical dominant mechanism and is crucial in understanding these spectra.展开更多
Recently,a scheme for deterministic remote preparation of arbitrary multi-qubit equatorial states was proposed by Wei et al.[Quantum Inf.Process.1770(2018)].It is worth mentioning that the construction of mutual ortho...Recently,a scheme for deterministic remote preparation of arbitrary multi-qubit equatorial states was proposed by Wei et al.[Quantum Inf.Process.1770(2018)].It is worth mentioning that the construction of mutual orthogonal measurement basis plays a key role in quantum remote state preparation.In this paper,a simple and feasible remote preparation of arbitrary n-qubit equatorial states scheme is proposed.In our scheme,the success probability will reach unit.Moreover,there are no coefficient constraint and auxiliary qubits in this scheme.It means that the success probabilities are independent of the coefficients of the entangled channel.The advantage of our scheme is that the mutual orthogonal measurement basis is devised.To accomplish the quantum remote state preparation(RSP)schemes,some new sets of mutually orthogonal measurement basis are introduced.展开更多
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is...In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.展开更多
We present a scheme for remotely preparing a state via the controls of many agents in a network.In thescheme,the agents' controls are achieved by utilizing quantum key distribution.Generally,the original state can...We present a scheme for remotely preparing a state via the controls of many agents in a network.In thescheme,the agents' controls are achieved by utilizing quantum key distribution.Generally,the original state can berestored by the receiver with probability 1/2 if all the agents collaborate.However,for certain type of original states therestoration probability is unit.展开更多
Our concern is to design an assisted-clone scheme which can produce a perfect copy of a three-particle Oreenberger-Horne-Zeilinger (GHZ) class state with a high probability. In the first stage of the protocol, the s...Our concern is to design an assisted-clone scheme which can produce a perfect copy of a three-particle Oreenberger-Horne-Zeilinger (GHZ) class state with a high probability. In the first stage of the protocol, the sender teleports the input state to the receiver by using three EPR pairs as the quantum channel. In the second stage of the protocol, a novel set of mutually orthogonal basis vectors is constructed. With the assistance of the preparer through a three-particle projective measurement under this basis, the perfect copy of an original state can be reestablished by the sender with the probability 1/2. Moreover, the classical communication cost of the scheme is also calculated.展开更多
Unambiguous quantum state filtering is applied to evaluation of the decoherence sensing of entangled quantum channels consisting of N-mode entangled coherent states. It is found that quantum entanglement can enhance t...Unambiguous quantum state filtering is applied to evaluation of the decoherence sensing of entangled quantum channels consisting of N-mode entangled coherent states. It is found that quantum entanglement can enhance the performance of decoherence sensing while the increase of the mode numbers in the entangled probe field can slightly improve the sensing performance only in the weak field regime.展开更多
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ...This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.展开更多
Recently,the increasing demand of radio spectrum for the next generation communication systems due to the explosive growth of applications appetite for bandwidths has led to the problem of spectrum scarcity.The potent...Recently,the increasing demand of radio spectrum for the next generation communication systems due to the explosive growth of applications appetite for bandwidths has led to the problem of spectrum scarcity.The potential approaches among the proposed solutions to resolve this issue are well explored cognitive radio(CR)technology and recently introduced non-orthogonal multiple access(NOMA)techniques.Both the techniques are employed for efficient spectrum utilization and assure the significant improvement in the spectral efficiency.Further,the significant improvement in spectral efficiency can be achieved by combining both the techniques.Since the CR is well-explored technique as compared to that of the NOMA in the field of communication,therefore it is worth and wise to implement this technique over the CR.In this article,we have presented the frameworks of NOMA implementation over CR as well as the feasibility of proposed frameworks.Further,the differences between proposed CR-NOMA and conventional CR frameworks are discussed.Finally,the potential issues regarding the implementation of CR-NOMA are explored.展开更多
The q-deformed entangled states are introduced by using deformation quantization methods and new normal ordering of the vacuum projection operator for q-deformed boson oscillator. In similar way, by virtue of the tech...The q-deformed entangled states are introduced by using deformation quantization methods and new normal ordering of the vacuum projection operator for q-deformed boson oscillator. In similar way, by virtue of the technique of integration within an ordered product (IWOP) of operators, the new completeness and orthogonMity relations composed of the bra and ket, which are not mutually Hermitian conjugates are obtained. Furthermore, the property of squeezing operator represented by the q-deformed entangled states is exhibited. Lastly, the nonclassical properties of the q-deformed two-mode squeezed vacuum state are studied.展开更多
An approach combining optimal antenna subset selection with blind detection scheme for Orthogonal Space-Time Block Coding (OSTBC) is proposed in this paper. The optimal antenna sub- set selection is taken into account...An approach combining optimal antenna subset selection with blind detection scheme for Orthogonal Space-Time Block Coding (OSTBC) is proposed in this paper. The optimal antenna sub- set selection is taken into account at transmitter and/or receiver sides, which chooses the optimal an- tennas to increase the diversity order of OSTBC and improve further its performance. In order to en- hance the robustness of the detection used in the conventional OSTBC scheme, a blind detection scheme based on Independent Component Analysis (ICA) is exploited which can directly extract transmitted signals without channel estimation. Performance analysis shows that the proposed ap- proach can achieve the full diversity and the flexibility of system design by using the antenna selec-tion and the ICA based blind detection schemes.展开更多
Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state...Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state photon source for quantum key distribution. Two special cases of this protocol are deduced, i.e., a one-vacuum-and-one-weak-decoy-state protocol and a one-weak-decoy-state protocol. In these protocols, the sender prepares decoy states actively, which avoids the crude estimation of parameters in the SARG04 passive decoy-state method. With the passive decoy-state idea, the detection events on Bob's side that are non-triggered on Alice's side are not discarded, but used to estimate the fractions of single-photon and two-photon pulses, which offsets the limitation of the detector's low efficiency and overcomes the shortcoming that the performance of the active decoy-state protocol critically depends on the efficiency of detector. The simulation results show that the combination of the active and passive decoy-state ideas increases the key generation rate. With a one-vacuum-and-two-weak-decoy-state protocol, one can achieve a key generation rate that is close to the theoretical limit of an infinite decoy-state protocol. The performance of the other two protocols is a little less than with the former, but the implementation is easier. Under the same condition of implementation, higher key rates can be obtained with our protocols than with existing methods.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant No 60373059), the Doctoral Programs Foundation of the Ministry of Education of China (Grant No 20040013007), and the Major Research plan of the National Natural Science Foundation of China (Grant No 90604023).
文摘An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the (×)(n ≥3) Hilbert space is presented. In this protocol, the particles in the orthogonal product states form two particle sequences. The sender, Alice, first sends one sequence to the receiver, Bob. After Bob receives the first particle sequence, Alice and Bob check eavesdropping by measuring a fraction of particles randomly chosen. After ensuring the security of the quantum channel, Alice sends the other particle sequence to Bob. By making an orthogonal measurement on the two particle sequences, Bob can obtain the information of the orthogonal product states sent by Alice. This protocol has many distinct features such as great capacity, high efficiency in that it uses all orthogonal product states in distributing the key except those chosen for checking eavesdroppers.
基金Project supported by the National High Technology Development Program of China (Grant Nos 2006AA01Z419 and 2006AA01Z440), the Major Program of the National Natural Science Foundation of China (Grant No 90604023), the National Research Foundation for the Doctoral Program of Higher Education of China (Grant No 20040013007), National Laboratory for Modern Communications Science Foundation of China (Grant No 9140C110101.0.601).
文摘An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3 3 Hilbert space is presented. The sender, Alice, disorders the orthogonal product state sequence and sends it to Bob. After Alice has published the matching information of the particle sequence, Bob recovers the correct correspondences and makes an orthogonal measurement on the orthogonal product states to obtain the information sent by Alice. Finally, security analysis is also made.
基金Project supported by the National Natural Science Foundation of China (Grant No 60578055)the State Key Development Program for Basic Research of China (Grant No 2007CB307001)
文摘Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.
基金supported by the Fundamental Research Funds for the Central Universities under Grants No.2013B08214,No2009B32114the National Natural Science Foundation of China under Grants No.61271232,No.60972045,No.61071089+1 种基金the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University under Grant No.2012D05the University Postgraduate Research and Innovation Project in Jiangsu Province under Grant No.CXZZ11_0395
文摘A Gaussian channel with additive interference that is causally known to the transmitter is called a Dirty-Tape Channel(DTC).In this paper,we consider a state-dependent dirty-tape Gaussian relay channel with orthogonal channels from the source to the relay and from the source and relay to the destination.The orthogonal channels are corrupted by two independent additive interferences causally known to both the source and relay.The lower and upper bounds of the channel capacity are established.The lower bound is obtained by employing superposition coding at the source,Partial Decode-and-Forward(PDF)relaying at the relay,and a strategy similar to that used by Shannon at the source and relay.The explicit capacity is characterised when the power of the relay is sufficiently large.Finally,several numerical examples are provided to illustrate the impact of additive interferences and the role of the relay in information transmission and in removing the interference.
文摘Collider is a machine or device that usually causes two beams of high-speed particles moving to collide in a straight line. The fundamental purpose of a collision is to obtain an abnormal mass-energy density and attempt to discover new physics and new substances namely new physical states. However, linear collisions are not easy to achieve the above purpose. Through the comparable experiment of rear-end collision, head-on collision and orthogonal collision of two low-velocity particles, this paper theoretically proposes a new idea that the orthogonal collision between two-beam high-velocity particles can really produce an abnormal mass-energy density. This machine based on the new idea of orthogonal collision can not only greatly reduce the construction cost of colliders, but also is the most effective way to achieve the purpose of collision.
基金Project supported by the National Natural Science Foundation of China (Grant No 10347126), National High Technology Development Program of China (Grant No 2004AA306H10) and the Program "Excellence in the Research Institutes Supervised by the General Secretariat for Research and Technology / Ministry of Development", Greece.Acknowledgments Xiong Zhuang would like to express his appreciation for the partial support from the Greek State Scholarship Foundation (I.K.Y.) and the National Hellenic Research Foundation Scholarship for this work.
文摘By taking full account of the non-orthogonality of the orbitals between the low-lying doubly excited states ^1po and the singly excited states ^1S^e and ^1D^e of He, the corresponding radiative decay rates have been investigated theoretically via analytic generalized Laguerre-type atomic orbitals at a nearly numerical multi-conflguration self-consistent field accuracy in a general non-orthogonal configuration interaction scheme. From these rates, we calculate the VUV photon emission and metastable atom spectra, and both are found to be in good qualitative agreement with recent excellent measurements. We obtain, successfully, the enhancement of the VUV photon spectrum, experimentally observed at the energy of (2s4p-4s2p)/(2p,3d) ^1po as compared with other nearby lying states. The mechanism proposed by Odling-Smee et al is verified, implying that taking appropriate account of the overlap existing between orbitals of the low-lying doubly excited and singly excited states (especially important for the compact orbitals) can reveal basic physical dominant mechanism and is crucial in understanding these spectra.
文摘Recently,a scheme for deterministic remote preparation of arbitrary multi-qubit equatorial states was proposed by Wei et al.[Quantum Inf.Process.1770(2018)].It is worth mentioning that the construction of mutual orthogonal measurement basis plays a key role in quantum remote state preparation.In this paper,a simple and feasible remote preparation of arbitrary n-qubit equatorial states scheme is proposed.In our scheme,the success probability will reach unit.Moreover,there are no coefficient constraint and auxiliary qubits in this scheme.It means that the success probabilities are independent of the coefficients of the entangled channel.The advantage of our scheme is that the mutual orthogonal measurement basis is devised.To accomplish the quantum remote state preparation(RSP)schemes,some new sets of mutually orthogonal measurement basis are introduced.
基金Project supported by the National Natural Science Foundation of China(Grant No.60970140)
文摘In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.
基金Supported by the program for New Century Excellent Talents at the University of China under Grant No.NCET-06-0554the National Natural Science Foundation of China under Grant Nos.60677001,50672001,10874122,and 10747146+2 种基金the Science-Technology Fund of Anhui Province for Outstanding Youth under Grant No.06042087the Key Fund of the Ministry of Education of China under Grant No.206063the Natural Science Foundation of Guangdong Province under Grant Nos.06300345 and 7007806
文摘We present a scheme for remotely preparing a state via the controls of many agents in a network.In thescheme,the agents' controls are achieved by utilizing quantum key distribution.Generally,the original state can berestored by the receiver with probability 1/2 if all the agents collaborate.However,for certain type of original states therestoration probability is unit.
基金Supported by the National Basic Research Program of China(973 Program)under Grant No.2007CB311203the National Natural Science Foundation of China under Grant Nos.61003287 and 60821001+2 种基金the Specialized Research Fund for the Doctoral Program of Higher Education(20100005120002)the Fundamental Research Funds for the Central Universities(No.BUPT2009RC0220)the 111 Project(No.B08004)
文摘Our concern is to design an assisted-clone scheme which can produce a perfect copy of a three-particle Oreenberger-Horne-Zeilinger (GHZ) class state with a high probability. In the first stage of the protocol, the sender teleports the input state to the receiver by using three EPR pairs as the quantum channel. In the second stage of the protocol, a novel set of mutually orthogonal basis vectors is constructed. With the assistance of the preparer through a three-particle projective measurement under this basis, the perfect copy of an original state can be reestablished by the sender with the probability 1/2. Moreover, the classical communication cost of the scheme is also calculated.
基金Supported by the National Fundamental Research Programme of China under Grant No 2001CB309310, the National Natural Science Foundation of China under Grant Nos 90203018 and 10325523, the Foundation of the Ministry of Education of China, the Educational Committee of Hunan Province (200248 and 02A026), and the Natural Science Foundation of Hunan Province (05JJ30012).
文摘Unambiguous quantum state filtering is applied to evaluation of the decoherence sensing of entangled quantum channels consisting of N-mode entangled coherent states. It is found that quantum entanglement can enhance the performance of decoherence sensing while the increase of the mode numbers in the entangled probe field can slightly improve the sensing performance only in the weak field regime.
基金supported by the Key Program of the National Natural Science Foundation of China (Grant No. 90718007)the National Natural Science Foundation of China (Grant Nos. 60773135 and 60970140)
文摘This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.
文摘Recently,the increasing demand of radio spectrum for the next generation communication systems due to the explosive growth of applications appetite for bandwidths has led to the problem of spectrum scarcity.The potential approaches among the proposed solutions to resolve this issue are well explored cognitive radio(CR)technology and recently introduced non-orthogonal multiple access(NOMA)techniques.Both the techniques are employed for efficient spectrum utilization and assure the significant improvement in the spectral efficiency.Further,the significant improvement in spectral efficiency can be achieved by combining both the techniques.Since the CR is well-explored technique as compared to that of the NOMA in the field of communication,therefore it is worth and wise to implement this technique over the CR.In this article,we have presented the frameworks of NOMA implementation over CR as well as the feasibility of proposed frameworks.Further,the differences between proposed CR-NOMA and conventional CR frameworks are discussed.Finally,the potential issues regarding the implementation of CR-NOMA are explored.
文摘The q-deformed entangled states are introduced by using deformation quantization methods and new normal ordering of the vacuum projection operator for q-deformed boson oscillator. In similar way, by virtue of the technique of integration within an ordered product (IWOP) of operators, the new completeness and orthogonMity relations composed of the bra and ket, which are not mutually Hermitian conjugates are obtained. Furthermore, the property of squeezing operator represented by the q-deformed entangled states is exhibited. Lastly, the nonclassical properties of the q-deformed two-mode squeezed vacuum state are studied.
基金Partially supported by National Natural Science Foun-dation of China (60572105)Open Foundations of the State Key Laboratory of Mobile Communications (A200508)+1 种基金the State Key Lab of Integrated Services Networks (ISN7-02)the Program for New Century Excellent Talents (NCET-05-0582) in University.
文摘An approach combining optimal antenna subset selection with blind detection scheme for Orthogonal Space-Time Block Coding (OSTBC) is proposed in this paper. The optimal antenna sub- set selection is taken into account at transmitter and/or receiver sides, which chooses the optimal an- tennas to increase the diversity order of OSTBC and improve further its performance. In order to en- hance the robustness of the detection used in the conventional OSTBC scheme, a blind detection scheme based on Independent Component Analysis (ICA) is exploited which can directly extract transmitted signals without channel estimation. Performance analysis shows that the proposed ap- proach can achieve the full diversity and the flexibility of system design by using the antenna selec-tion and the ICA based blind detection schemes.
基金Project supported by the National High Technology Research and Development Program of China (Grant No. 2011AA7014061)the Science Foundation of Naval University of Engineering, China (Grant No. HGDQNJJ11022)
文摘Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state photon source for quantum key distribution. Two special cases of this protocol are deduced, i.e., a one-vacuum-and-one-weak-decoy-state protocol and a one-weak-decoy-state protocol. In these protocols, the sender prepares decoy states actively, which avoids the crude estimation of parameters in the SARG04 passive decoy-state method. With the passive decoy-state idea, the detection events on Bob's side that are non-triggered on Alice's side are not discarded, but used to estimate the fractions of single-photon and two-photon pulses, which offsets the limitation of the detector's low efficiency and overcomes the shortcoming that the performance of the active decoy-state protocol critically depends on the efficiency of detector. The simulation results show that the combination of the active and passive decoy-state ideas increases the key generation rate. With a one-vacuum-and-two-weak-decoy-state protocol, one can achieve a key generation rate that is close to the theoretical limit of an infinite decoy-state protocol. The performance of the other two protocols is a little less than with the former, but the implementation is easier. Under the same condition of implementation, higher key rates can be obtained with our protocols than with existing methods.