结合预报单光子源的量子密钥分配系统模型,介绍了三种典型的BB84诱惑态方案:主动诱惑态方案,被动诱惑态方案以及主动和被动诱惑态相结合的方案.结合数值仿真深入分析了三种方案在性能、实现难度等方面的优缺点.结论表明被动诱惑态思想可以进一步提高BB84诱惑态方案的密钥生成效率; BB84被动诱惑态方案(AYKI方案)由于无需主动制备诱惑态,所以实现最为简单,密钥分配速度快,且方案性能趋近于无穷诱惑态的理论极限值;主动和被动诱惑态相结合的方案性能虽然稍优于AYKI方案,但是改善空间很小.
参考文献
[1] | Bennett C H,Brassard G.Quantum cryptography:Public key distribution and coin tossing[C].International Conference on Computers,Systems and Signal Processing,India,1984:175-179. |
[2] | Wang Xiangbin.Beating the photon-number-splitting attack in practical quantum cryptography[J].Phys.Rev.Lett.,2005,94:230503. |
[3] | Hwang W Y.Quantum key distribution with high loss:toward global secure communication[J].Phys.Rev.Lett.,2003,91:057901. |
[4] | Jian Li,Lu Yuncan,Yang Chun,et al.Research on extending quantum key approach based on QKD[J].Chinese Journal of Quantum Electronics(量子电子学报),2008,25(1):65-70 (in Chinese). |
[5] | Han Baobin,Pei Changxing,Chen Nan,et al.Analysis of the effect of magneto-optic effect on BB84 protocol[J].Chinese Journal of Quantum Electronics(量子电子学报),2007,24(5):575-578 (in Chinese). |
[6] | Lo H K,Ma Xiongfeng,Chen Kai.Decoy state quantum key distribution[J].Phys.Rev.Lett.,2005,94:230504. |
[7] | Wang Xiangbin.Decoy-state protocol for quantum cryptography with four different intensities of coherent light[J].Phys.Rev.A,2005,72:012322. |
[8] | Ma Xiongfeng,Fung C H F,Dupuis F,et al.Decoy-state quantum key distribution with two-way classical postprocessing[J].Phys.Rev.A,2006,74:032330. |
[9] | Wang Xiangbin,Peng Chengzhi,Zhang Jun,et al.General theory of decoy-state quantum cryptography with source errors[J].Phys.Rev.A,2008,77:042311. |
[10] | Tsurumaru T.Exact minimum and maximum of yield with a finite number of decoy light intensities[J].Phys.Rev.A,2008,77:022319. |
[11] | Schmitt-Manderbach T,Weier H,Fürst M,et al.Experimental demonstration of free-space decoy-state quantum key distribution over 144 km[J].Phys.Rev.Lett.,2007,98:010504. |
[12] | Ma Xiongfeng,LoHK.Quantum key distribution with triggering parametric down-conversion sources[J].New Journal of Physics,2008,10:073018. |
[13] | Wang Qin,Wang Xiangbin,Guo Guangcan.Practical decoy-state method in quantum key distribution with a heralded single-photon source[J].Phys.Rev.A,2007,75:012312. |
[14] | Wang Qin,Wang Xiangbin,Bjork G,et al.Improved practical decoy state method in quantum key distribution with parametric down-conversion source[J].Europhysics Lett.,2007,79(4):40001. |
[15] | Wang Qin,Chen Wei,Xavier G,et al.Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source[J].Phys.Rev.Lett.,2008,100:090501. |
[16] | Mauerer W,Silberhorn C.Quantum key distribution with passive decoy state selection[J].Phys.Rev.A,2007,75:050305. |
[17] | Adachi Y,Yamamoto T,Koashi M,et al.Simple and efficient quantum key distribution with parametric downconversion[J].Phys.Rev.Lett.,2007,99:180503. |
[18] | Zhang Shengli,Zou Xubo,Li Ke,et al.Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source[J].Phys.Rev.A,2007,76:044304. |
[19] | Mi Jinglong,Wang Faqiang,Lin Qinqun,et al.Practical non-orthogonal decoy state quantum key distribution with heralded single photon source[J].Chin.Phys.B,2008,17(04):1178-1183. |
[20] | Mi Jinglong,Wang Faqiang,Lin Qinqun,et al.Decoy state quantum key distribution with dual detectors heralded single photon source[J].Acta Phys.Sin.(物理学报),2008,57(02):678-684 (in Chinese). |
[21] | Gottesman D,Lo H K,Liitkenhaus N,et al.Security of quantum key distribution with imperfect devices[J].Quant.Inf.Comp.,2004,4:325-360. |
[22] | Wang Xiangbin.Quantum key distribution with 4 intensities of coherent light[J].Phys.Rev.A,2005,72:012322. |
上一张
下一张
上一张
下一张
计量
- 下载量()
- 访问量()
文章评分
- 您的评分:
-
10%
-
20%
-
30%
-
40%
-
50%