期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Decoy-state reference-frame-independent quantum key distribution with both source errors and statistical fluctuations
1
作者 刘康 李剑 +2 位作者 朱建荣 张春梅 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第12期109-112,共4页
Reference-frame-independent quantum key distribution(RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performa... Reference-frame-independent quantum key distribution(RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performance of decoystate RFI QKD with both source errors and statistical fluctuations is still missing until now. In this paper, we investigate the performance of decoy-state RFI QKD in practical scenarios with two kinds of light sources, the heralded single photon source(HSPS) and the weak coherent source(WCS), and also give clear comparison results of decoy-state RFI QKD with WCS and HSPS. Simulation results show that the secret key rates of decoy-state RFI QKD with WCS are higher than those with HSPS in short distance range, but the secret key rates of RFI QKD with HSPS outperform those with WCS in long distance range. 展开更多
关键词 quantum key distribution reference-frame-independent statistical fluctuations source errors
下载PDF
Improved statistical fluctuation analysis for two decoy-states phase-matching quantum key distribution
2
作者 周江平 周媛媛 +1 位作者 周学军 暴轩 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第8期188-194,共7页
Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant... Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation. 展开更多
关键词 quantum key distribution phase matching protocol statistical fluctuation analysis decoy state
下载PDF
Asymmetric twin-field quantum key distribution with both statistical and intensity fluctuations
3
作者 何少甫 汪洋 +1 位作者 李家骥 鲍皖苏 《Communications in Theoretical Physics》 SCIE CAS CSCD 2020年第6期37-42,共6页
Twin-field quantum key distribution(TF-QKD)is a disruptive innovation which is able to overcome the rate-distance limit of QKD without trusted relays.Since the proposal of the first TF-QKD protocol,theoretical and exp... Twin-field quantum key distribution(TF-QKD)is a disruptive innovation which is able to overcome the rate-distance limit of QKD without trusted relays.Since the proposal of the first TF-QKD protocol,theoretical and experimental breakthroughs have been made to enhance its ability.However,there still exist some practical issues waiting for settlement.In this paper,we examine the performances of asymmetric TF-QKD protocol with unstable light sources and limited data sizes.The statistical fluctuations of the parameters are estimated employing Azuma’s inequality.Through numerical simulations,we compare the secret key rates of the asymmetric TF-QKD protocol with different data sizes and variant intensity fluctuation magnitudes.Our results demonstrate that both statistical and intensity fluctuations have significant impacts on the performance of asymmetric TF-QKD. 展开更多
关键词 twin-field quantum key distribution asymmetrical losses statistical fluctuations intensity fluctuations
原文传递
Influence of stealth aircraft dynamic RCS peak on radar detection probability 被引量:1
4
作者 Xiaoqiang LU Jun HUANG +1 位作者 Yacong WU Lei SONG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第3期137-145,共9页
For modern stealth aircraft,it is important to analyze the influence of Radar Cross Section(RCS)peak exposure on penetration for guiding stealth design and penetration trajectory planning,which needs to reflect the RC... For modern stealth aircraft,it is important to analyze the influence of Radar Cross Section(RCS)peak exposure on penetration for guiding stealth design and penetration trajectory planning,which needs to reflect the RCS statistical uncertainty and the RCS difference with the change of incident angle.Based on the RCS characteristics of typical stealth aircraft,this paper established a simplified RCS dynamic fluctuation statistical model with the parameters log mean and log standard deviation.According to the detection probability algorithm in radar signal processing field,this paper built the algorithm of radar detection probability based on the RCS dynamic fluctuation statistical model.The analysis of examples concluded that the key to successful penetration is to shorten the RCS peak exposure time,which can be reduced by decreasing the RCS peak width or increasing velocity.Based on the conclusion,this paper proposed the method of turning maneuvering to reduce RCS peak exposure time dramatically. 展开更多
关键词 MANEUVER Penetration RCS RCS fluctuation statistical model RCS peak exposure time RCS peak width STEALTH Trajectory planning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部