欢迎登录材料期刊网

材料期刊网

高级检索

结合预报单光子源的量子密钥分配系统模型,介绍了三种典型的BB84诱惑态方案:主动诱惑态方案,被动诱惑态方案以及主动和被动诱惑态相结合的方案.结合数值仿真深入分析了三种方案在性能、实现难度等方面的优缺点.结论表明被动诱惑态思想可以进一步提高BB84诱惑态方案的密钥生成效率; BB84被动诱惑态方案(AYKI方案)由于无需主动制备诱惑态,所以实现最为简单,密钥分配速度快,且方案性能趋近于无穷诱惑态的理论极限值;主动和被动诱惑态相结合的方案性能虽然稍优于AYKI方案,但是改善空间很小.

参考文献

[1] Bennett C H,Brassard G.Quantum cryptography:Public key distribution and coin tossing[C].International Conference on Computers,Systems and Signal Processing,India,1984:175-179.
[2] Wang Xiangbin.Beating the photon-number-splitting attack in practical quantum cryptography[J].Phys.Rev.Lett.,2005,94:230503.
[3] Hwang W Y.Quantum key distribution with high loss:toward global secure communication[J].Phys.Rev.Lett.,2003,91:057901.
[4] Jian Li,Lu Yuncan,Yang Chun,et al.Research on extending quantum key approach based on QKD[J].Chinese Journal of Quantum Electronics(量子电子学报),2008,25(1):65-70 (in Chinese).
[5] Han Baobin,Pei Changxing,Chen Nan,et al.Analysis of the effect of magneto-optic effect on BB84 protocol[J].Chinese Journal of Quantum Electronics(量子电子学报),2007,24(5):575-578 (in Chinese).
[6] Lo H K,Ma Xiongfeng,Chen Kai.Decoy state quantum key distribution[J].Phys.Rev.Lett.,2005,94:230504.
[7] Wang Xiangbin.Decoy-state protocol for quantum cryptography with four different intensities of coherent light[J].Phys.Rev.A,2005,72:012322.
[8] Ma Xiongfeng,Fung C H F,Dupuis F,et al.Decoy-state quantum key distribution with two-way classical postprocessing[J].Phys.Rev.A,2006,74:032330.
[9] Wang Xiangbin,Peng Chengzhi,Zhang Jun,et al.General theory of decoy-state quantum cryptography with source errors[J].Phys.Rev.A,2008,77:042311.
[10] Tsurumaru T.Exact minimum and maximum of yield with a finite number of decoy light intensities[J].Phys.Rev.A,2008,77:022319.
[11] Schmitt-Manderbach T,Weier H,Fürst M,et al.Experimental demonstration of free-space decoy-state quantum key distribution over 144 km[J].Phys.Rev.Lett.,2007,98:010504.
[12] Ma Xiongfeng,LoHK.Quantum key distribution with triggering parametric down-conversion sources[J].New Journal of Physics,2008,10:073018.
[13] Wang Qin,Wang Xiangbin,Guo Guangcan.Practical decoy-state method in quantum key distribution with a heralded single-photon source[J].Phys.Rev.A,2007,75:012312.
[14] Wang Qin,Wang Xiangbin,Bjork G,et al.Improved practical decoy state method in quantum key distribution with parametric down-conversion source[J].Europhysics Lett.,2007,79(4):40001.
[15] Wang Qin,Chen Wei,Xavier G,et al.Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source[J].Phys.Rev.Lett.,2008,100:090501.
[16] Mauerer W,Silberhorn C.Quantum key distribution with passive decoy state selection[J].Phys.Rev.A,2007,75:050305.
[17] Adachi Y,Yamamoto T,Koashi M,et al.Simple and efficient quantum key distribution with parametric downconversion[J].Phys.Rev.Lett.,2007,99:180503.
[18] Zhang Shengli,Zou Xubo,Li Ke,et al.Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source[J].Phys.Rev.A,2007,76:044304.
[19] Mi Jinglong,Wang Faqiang,Lin Qinqun,et al.Practical non-orthogonal decoy state quantum key distribution with heralded single photon source[J].Chin.Phys.B,2008,17(04):1178-1183.
[20] Mi Jinglong,Wang Faqiang,Lin Qinqun,et al.Decoy state quantum key distribution with dual detectors heralded single photon source[J].Acta Phys.Sin.(物理学报),2008,57(02):678-684 (in Chinese).
[21] Gottesman D,Lo H K,Liitkenhaus N,et al.Security of quantum key distribution with imperfect devices[J].Quant.Inf.Comp.,2004,4:325-360.
[22] Wang Xiangbin.Quantum key distribution with 4 intensities of coherent light[J].Phys.Rev.A,2005,72:012322.
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%