全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

诱惑态下相位差分量子密钥分发效率分析

, PP. 437-441

Keywords: 光通信,相位差分,诱惑态,密钥生成效率

Full-Text   Cite this paper   Add to My Lib

Abstract:

讨论基于微弱相干脉冲的相位差分量子密钥分发系统,综合分析系统的安全性问题,给出了密钥生成效率表达式.分析诱惑态对相位差分量子密钥分发系统安全性的影响,并给出了结合诱惑态后的密钥生成效率表达式.结果表明,结合诱惑态的相位差分量子密钥分发过程不再受到分光子攻击和序列攻击的威胁,其密钥分发效率与Hoi-Kwong等人提出的诱惑态的表述结果一致.实验数据显示,结合诱惑态后的相位差分系统,其安全传输距离得到了进一步提高,量子密钥分发效率提高了约1个数量级.

References

[1]  Inoue K, Takesue H, Honjo T. Differential-Phase-Shift Quantum Key Distribution
[2]  Mo X F, Zhu B, Han Z F, et al. Faraday-Michelson system for quantum cryptography
[3]  [J]. Optics Letters, 2005, 30(19):2632-2634.
[4]  
[5]  Liu Y, Liu R F, Li N, et al. Direct deterministic communication on quantum channel
[6]  [J]. Chinese journal of quantum electronics(量子电子学报),2006,23(4):441(in Chinese).?
[7]  Zhu A D, Zhang S. Quantum key distribution and controlled quantum direct communication applying product state of qurtit
[8]  [J]. Chinese journal of quantum electronics(量子电子学报),2007,24(3):316(in Chinese).
[9]  
[10]  Takesue H, Diamanti E, Honjo T, et al. Differential phase shift quantum key distribution experiment over 105km fibre
[11]  [J]. New Journal of Physics, 2005, 7, 232.
[12]  
[13]  Hiroki T, Eleni D, Carsten L, et al. 10-GHz clock differential phase shift quantum key distribution experiment
[14]  [J]. Optics Express, 2006, 14(20):9522-9530.?
[15]  Waks E, Takesue H, Yamamoto Y. Security of differential-phase-shift quantum key distribution against individual attacks
[16]  [J]. Physics Review A, 2006, 73, 012344.?
[17]  Lo H K, Ma X F, Chen K. Decoy State Quantum Key Distribution
[18]  [J]. Physics Review Letters, 2005, 94, 230504.
[19]  K. Inoue, T. Honjo. Robustness of differential-phase-shift quantum key distribution against photon- number-splitting attack
[20]  [J]. Physics Review A, 2005, 71, 042305.
[21]  
[22]  Zhao F , Fu M X , Lu Y Q et al. Infuence of multi-photon pulses on practical differential-phase-shift quantum key distribution
[23]  [J]. Chinese Physics, 2007, 16(11):3402-3406.?
[24]  Lütkenhaus N. Security against individual attacks for realistic quantum key distribution
[25]  [J]. Physics Review A, 2000, 61, 052304.?
[26]  Gobby C, Yuan Z L, Shields A J. Quantum key distribution over 122 km of standard telecom fiber
[27]  [J]. Applied Physics Letters, 2004, 84(19):3762-3763.?
[28]  [C]. SPIE,2007, 6780: 678015?
[29]  Ma X F, Qi B, Zhao Y, et al. Practical decoy state for quantum key distribution
[30]  [J]. Physics Review A, 2005, 72, 012326.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133