Reference-frame-independent quantum key distribution(RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performa...Reference-frame-independent quantum key distribution(RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performance of decoystate RFI QKD with both source errors and statistical fluctuations is still missing until now. In this paper, we investigate the performance of decoy-state RFI QKD in practical scenarios with two kinds of light sources, the heralded single photon source(HSPS) and the weak coherent source(WCS), and also give clear comparison results of decoy-state RFI QKD with WCS and HSPS. Simulation results show that the secret key rates of decoy-state RFI QKD with WCS are higher than those with HSPS in short distance range, but the secret key rates of RFI QKD with HSPS outperform those with WCS in long distance range.展开更多
Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant...Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation.展开更多
Twin-field quantum key distribution(TF-QKD)is a disruptive innovation which is able to overcome the rate-distance limit of QKD without trusted relays.Since the proposal of the first TF-QKD protocol,theoretical and exp...Twin-field quantum key distribution(TF-QKD)is a disruptive innovation which is able to overcome the rate-distance limit of QKD without trusted relays.Since the proposal of the first TF-QKD protocol,theoretical and experimental breakthroughs have been made to enhance its ability.However,there still exist some practical issues waiting for settlement.In this paper,we examine the performances of asymmetric TF-QKD protocol with unstable light sources and limited data sizes.The statistical fluctuations of the parameters are estimated employing Azuma’s inequality.Through numerical simulations,we compare the secret key rates of the asymmetric TF-QKD protocol with different data sizes and variant intensity fluctuation magnitudes.Our results demonstrate that both statistical and intensity fluctuations have significant impacts on the performance of asymmetric TF-QKD.展开更多
For modern stealth aircraft,it is important to analyze the influence of Radar Cross Section(RCS)peak exposure on penetration for guiding stealth design and penetration trajectory planning,which needs to reflect the RC...For modern stealth aircraft,it is important to analyze the influence of Radar Cross Section(RCS)peak exposure on penetration for guiding stealth design and penetration trajectory planning,which needs to reflect the RCS statistical uncertainty and the RCS difference with the change of incident angle.Based on the RCS characteristics of typical stealth aircraft,this paper established a simplified RCS dynamic fluctuation statistical model with the parameters log mean and log standard deviation.According to the detection probability algorithm in radar signal processing field,this paper built the algorithm of radar detection probability based on the RCS dynamic fluctuation statistical model.The analysis of examples concluded that the key to successful penetration is to shorten the RCS peak exposure time,which can be reduced by decreasing the RCS peak width or increasing velocity.Based on the conclusion,this paper proposed the method of turning maneuvering to reduce RCS peak exposure time dramatically.展开更多
基金Project supported by the National Key Research and Development Program of China(Grant No.2017YFA0304100)the National Natural Science Foundation of China(Grant Nos.61475197,61590932,11774180,and 61705110)+3 种基金the Natural Science Foundation of the Jiangsu Higher Education Institutions(Grant Nos.15KJA120002 and 17KJB140016)the Outstanding Youth Project of Jiangsu Province,China(Grant No.BK20150039)the Natural Science Foundation of Jiangsu Province,China(Grant No.BK20170902)the Science Fund from the Nanjing University of Posts and Telecommunications,China(Grant No.NY217006)
文摘Reference-frame-independent quantum key distribution(RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performance of decoystate RFI QKD with both source errors and statistical fluctuations is still missing until now. In this paper, we investigate the performance of decoy-state RFI QKD in practical scenarios with two kinds of light sources, the heralded single photon source(HSPS) and the weak coherent source(WCS), and also give clear comparison results of decoy-state RFI QKD with WCS and HSPS. Simulation results show that the secret key rates of decoy-state RFI QKD with WCS are higher than those with HSPS in short distance range, but the secret key rates of RFI QKD with HSPS outperform those with WCS in long distance range.
文摘Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation.
基金supported by National Natural Science Foundation of China(61675235,61605248 and 61505261)National Key Research and Development Program of China(2016YFA0302600)。
文摘Twin-field quantum key distribution(TF-QKD)is a disruptive innovation which is able to overcome the rate-distance limit of QKD without trusted relays.Since the proposal of the first TF-QKD protocol,theoretical and experimental breakthroughs have been made to enhance its ability.However,there still exist some practical issues waiting for settlement.In this paper,we examine the performances of asymmetric TF-QKD protocol with unstable light sources and limited data sizes.The statistical fluctuations of the parameters are estimated employing Azuma’s inequality.Through numerical simulations,we compare the secret key rates of the asymmetric TF-QKD protocol with different data sizes and variant intensity fluctuation magnitudes.Our results demonstrate that both statistical and intensity fluctuations have significant impacts on the performance of asymmetric TF-QKD.
文摘For modern stealth aircraft,it is important to analyze the influence of Radar Cross Section(RCS)peak exposure on penetration for guiding stealth design and penetration trajectory planning,which needs to reflect the RCS statistical uncertainty and the RCS difference with the change of incident angle.Based on the RCS characteristics of typical stealth aircraft,this paper established a simplified RCS dynamic fluctuation statistical model with the parameters log mean and log standard deviation.According to the detection probability algorithm in radar signal processing field,this paper built the algorithm of radar detection probability based on the RCS dynamic fluctuation statistical model.The analysis of examples concluded that the key to successful penetration is to shorten the RCS peak exposure time,which can be reduced by decreasing the RCS peak width or increasing velocity.Based on the conclusion,this paper proposed the method of turning maneuvering to reduce RCS peak exposure time dramatically.