首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
To launch quantum key distribution (QKD) into the commercial market, it is important to develop a system that is simpler and more reliable using current technology. This report proposes quantum encoders and decoders using a passive planar lightwave circuit (PLC) that is useful for implementing optical-fiber-based QKD systems. Our encoders and decoders are based on an asymmetric Mach–Zehnder interferometer and allow us to prepare and analyze various photonic time-bin qubits reliably. The system can be stable and polarization-insensitive merely by stabilizing and controlling the device temperature. Our PLC-based devices enables us to simplify the QKD system and increase its reliability.  相似文献   

2.
Abstract

Experimental results obtained with silicon single photon avalanche diodes (SPADs) in quantum key distribution (QKD) at short wavelengths reveal remarkable potential for application in local area networks (LAN) and for free-space transmission at high rate. Actual application prospects, however, depend on the performance level and on the suitability of practical systems using the available silicon SPAD devices. They can be essentially divided in two groups: planar p-n junction structures with a thin depletion layer (typically 1 μm); and reach-through structures with a thick depletion layer (from 20 μm to 150μm). The physical mechanisms that control the device behaviour were investigated and the effect on the key parameters of the detector (quantum detection efficiency, dark counting rate, afterpulsing probability and photon-timing jitter) were thoroughly assessed. A quantitative analysis was made of the influence of such parameters on the quantum bit error rate (QBER). Actual parameters were measured and the attainable performance and system suitability of the two device types evaluated. Comparable performance is obtained, but from a system viewpoint thin SPADs appear inherently better suited to high-rate QKD applications, because of their faster response time, ruggedness, low voltage, low power dissipation and fabrication technology, which is simple, efficient, economical and compatible with monolithic integration of detector and associated circuits.  相似文献   

3.
We assess the overall performance of our quantum key distribution (QKD) system implementing the measurement-device-independent (MDI) protocol using components with varying capabilities such as different single-photon detectors and qubit preparation hardware. We experimentally show that superconducting nanowire single-photon detectors allow QKD over a channel featuring 60 dB loss, and QKD with more than 600 bits of secret key per second (not considering finite key effects) over a 16 dB loss channel. This corresponds to 300 and 80 km of standard telecommunication fiber, respectively. We also demonstrate that the integration of our QKD system into FPGA-based hardware (instead of state-of-the-art arbitrary waveform generators) does not impact on its performance. Our investigation allows us to acquire an improved understanding of the trade-offs between complexity, cost and system performance, which is required for future customization of MDI-QKD. Given that our system can be operated outside the laboratory over deployed fiber, we conclude that MDI-QKD is a promising approach to information-theoretic secure key distribution.  相似文献   

4.
We investigate the use of photon number states to identify eavesdropping attacks on quantum key distribution (QKD) schemes. The technique is based on the fact that different photon numbers traverse a channel with different transmittivity. We then describe two QKD schemes that utilize this method, one of which overcomes the upper limit on the key generation rate imposed by the dead time of detectors when using a heralded source of photons.  相似文献   

5.
Many imperfections in a practical quantum key distribution (QKD) system have been exploited by an eavesdropper (Eve) to attack the system. However, most of these attacks will introduce perturbations to the system while collecting information about the key. For example, the phase-remapping attack [Phys. Rev. A2007,75, 032314], in which Eve performs time shift on the signal pulse from the constant acting range of the phase modulation voltage to its rising edge to introduce an imperfection, results in an quantum bit error rate (QBER) of 14.6%, which is too high and will be discovered by careful users. In this paper, a frequency shift (FS) attack on ‘plug-and-play’ QKD systems with phase-coding BB84 protocol is proposed, in which Eve introduces an imperfection by the same method as she used in the phase-remapping attack. The most novel advantage of our FS attack is that Eve can get full information without introducing detectable QBER, which is more deceptive than the phase-remapping attack.  相似文献   

6.
Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn’t address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.  相似文献   

7.
In this work, we present active and passive linear optical setups for error correction in quantum communication systems that employ polarization of single-photon and mesoscopic coherent states. The proposed systems are analytically analysed and their applications in quantum communication systems are described. In particular, we show a security analysis of a QKD system employing the active error correction system when an eavesdropper uses the Fuchs–Peres–Brandt attack.  相似文献   

8.
The application of quantum key distribution (QKD) has raised particular demands for single-photon detectors. One of the most promising candidates at the low-loss optical fibre communications windows is the planar geometry InGaAs/InP single-photon avalanche diode. These detectors have been modelled, fabricated and characterised at 1.55 mum wavelength. Their performance in terms of single-photon detection efficiency, dark count rate, timing jitter and afterpulsing behaviour are reported and compared with the best commercially available, linear multiplication avalanche photodiodes operated in Geiger-mode. Their use in the application of QKD is discussed.  相似文献   

9.
Abstract

A commercial avalanche photodiode (APD) and the circuitry needed to operate it as a single-photon detector (SPD) have been integrated onto a single PC board (PCB). At temperatures accessible with Peltier coolers (~200–240 K), the PCB-SPD achieves high detection efficiency (DE) at 1308 and 1545 nm with low dark-count probability (e.g. ~10?6/bias pulse at DE = 20%, 220 K), making it useful for quantum key distribution (QKD). The board generates fast bias pulses, cancels noise transients, amplifies the signals, and sends them to an on-board discriminator. A digital blanking circuit suppresses afterpulsing.  相似文献   

10.
We propose an experimentally feasible scheme for generating a two 2?×?4?×?4 dimensional photon hyperentangled state, entangled in polarization, frequency and spatial mode. This scheme is mainly based on a parametric down-conversion source and cross-Kerr nonlinearities, which avoids the complicated uncertain post-selection. Our method can be easily expanded to the production of hyperentangled states with more photons in multidimensions. Hence the expectation for vast quantities of information in quantum information processing will possibly come true. Finally, we put forward a realizable quantum key distribution (QKD) protocol based on the high dimensional hyperentangled state.  相似文献   

11.
High-dimensional quantum cryptography through optical fibres with several spatial modes requires an efficient quantum key distribution (QKD). However, optical modes acquire different phases and lags due to modal dispersion and random fluctuations, and a modal crosstalk appears under propagation. At present, special optical fibres for spatial multiplexing are being proposed in order to reduce notably the modal crosstalk, however, arbitrary relative phases and lags between modes are always present, which prevents getting an efficient phase encoding QKD. In this work, we take advantage of elliptical-core few-mode optical fibres presenting a very low modal crosstalk and propose an exact phase auto-compensating method by making photons travel several times the path between Alice and Bob (rounds) and by using appropriate modal inversions in each round trip. In order to make clear the proposed phase auto-compensating method, we study in detail a four-dimensional BB84 QKD case with single photon states excited in both polarization and spatial LP modes.  相似文献   

12.
Abstract

We analyse the quantitative improvement in performance provided by a novel quantum key distribution (QKD) system that employs a correlated photon source (CPS) and a photon-number resolving detector (PNR). Calculations suggest that given current technology, the CPS/PNR implementation offers an improvement of several orders of magnitude in secure bit rate over previously described implementations.  相似文献   

13.
In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.  相似文献   

14.
Oblivious key transfer (OKT) is a fundamental problem in the field of secure multi-party computation. It makes the provider send a secret key sequence to the user obliviously, i.e., the user may only get almost one bit key in the sequence which is unknown to the provider. Recently, a number of works have sought to establish the corresponding quantum oblivious key transfer model and rename it as quantum oblivious key distribution (QOKD) from the well-known expression of quantum key distribution (QKD). In this paper, a new QOKD model is firstly proposed for the provider and user with limited quantum capabilities, where both of them just perform computational basis measurement for single photons. Then we show that the privacy for both of them can be protected, since the probability of getting other’s raw-key bits without being detected is exponentially small. Furthermore, we give the solutions to some special decision problems such as set-member decision and point-inclusion by announcing the improved shifting strategies followed QOKD. Finally, the further discussions and applications of our ideas have been presented.  相似文献   

15.
Smart Grid is a power grid that improves flexibility, reliability, and efficiency through smart meters. Due to extensive data exchange over the Internet, the smart grid faces many security challenges that have led to data loss, data compromise, and high power consumption. Moreover, the lack of hardware protection and physical attacks reduce the overall performance of the smart grid network. We proposed the BLIDSE model (Blockchain-based secure quantum key distribution and Intrusion Detection System in Edge Enables Smart Grid Network) to address these issues. The proposed model includes five phases: The first phase is blockchain-based secure user authentication, where all smart meters are first registered in the blockchain, and then the blockchain generates a secret key. The blockchain verifies the user ID and the secret key during authentication matches the one authorized to access the network. The secret key is shared during transmission through secure quantum key distribution (SQKD). The second phase is the lightweight data encryption, for which we use a lightweight symmetric encryption algorithm, named Camellia. The third phase is the multi-constraint-based edge selection; the data are transmitted to the control center through the edge server, which is also authenticated by blockchain to enhance the security during the data transmission. We proposed a perfect matching algorithm for selecting the optimal edge. The fourth phase is a dual intrusion detection system which acts as a firewall used to drop irrelevant packets, and data packets are classified into normal, physical errors and attacks, which is done by Double Deep Q Network (DDQN). The last phase is optimal user privacy management. In this phase, smart meter updates and revocations are done, for which we proposed Forensic based Investigation Optimization (FBI), which improves the security of the smart grid network. The simulation is performed using network simulator NS3.26, which evaluates the performance in terms of computational complexity, accuracy, false detection, and false alarm rate. The proposed BLIDSE model effectively mitigates cyber-attacks, thereby contributing to improved security in the network.  相似文献   

16.
嵌入式高速电磁阀检测系统设计   总被引:2,自引:1,他引:1  
研制了一套嵌入式技术的高速电磁阀性能检测系统.该系统在硬件和软件设计上均采用向下兼容的设计原则,可以在不同驱动电压和不同气压下测试二位二通、三位五通等多种电磁阀的动态响应特性及启动气压和泄漏量.采用MSA(测量系统分析)中的评定方法Ⅰ做了大量试验,结果表明,压力测量最大误差小于3 kPa,相对误差为0.449 7%,时间测试精度范围小于1 ms,参照《专用检测设备评定方法指南》计算得到的系统测量能力指数(Cg、Cgk)均≥1.33,满足设备验收要求.  相似文献   

17.
Monitoring of natural gas (NG) pipelines is an important task for economical/safety operation, loss prevention and environmental protection. Timely and reliable leak detection of gas pipeline, therefore, plays a key role in the overall integrity management for the pipeline system. Owing to the various limitations of the currently available techniques and the surveillance area that needs to be covered, the research on new detector systems is still thriving. Biosensors are worldwide considered as a niche technology in the environmental market, since they afford the desired detector capabilities at low cost, provided they have been properly designed/developed and rationally placed/networked/maintained by the aid of operational research techniques. This paper addresses NG leakage surveillance through a robust cooperative/synergistic scheme between biosensors and conventional detector systems; the network is validated in situ and optimized in order to provide reliable information at the required granularity level. The proposed scheme is substantiated through a knowledge based approach and relies on Fuzzy Multicriteria Analysis (FMCA), for selecting the best biosensor design that suits both, the target analyte and the operational micro-environment. This approach is illustrated in the design of leak surveying over a pipeline network in Greece.  相似文献   

18.
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of internet. The interconnectivity of networks has brought various complexities in maintaining network availability, consistency, and discretion. Machine learning based intrusion detection systems have become essential to monitor network traffic for malicious and illicit activities. An intrusion detection system controls the flow of network traffic with the help of computer systems. Various deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network traffic. For this purpose, when the network traffic encounters known or unknown intrusions in the network, a machine-learning framework is needed to identify and/or verify network intrusion. The Intrusion detection scheme empowered with a fused machine learning technique (IDS-FMLT) is proposed to detect intrusion in a heterogeneous network that consists of different source networks and to protect the network from malicious attacks. The proposed IDS-FMLT system model obtained 95.18% validation accuracy and a 4.82% miss rate in intrusion detection.  相似文献   

19.
基于CCD器件的苯甲酰脲类农药荧光检测系统   总被引:3,自引:2,他引:1  
根据苯甲酰脲类农药在紫外光的照射下能够发出荧光的机理,设计了一种基于CCD(电荷耦合器件)的检测该类有机农药残留的光纤荧光测量系统.该系统以脉冲氙灯为激发光源,利用光纤探测和传输荧光,采用线阵CCD代替传统的光电倍增管作为荧光信号的光电检测元件,同时配备A/D高速数据采集卡,实现了单片机控制下荧光信号的光电转换以及数据采集,进而实现了对卡死克和盖虫散(氟铃脲)农药浓度的测量.实验结果表明,在激发波长分别为290nm和345nm时,卡死克和盖虫散的荧光强度分别在360nm和418nm处达到最大,最低检出限分别为12 μg/L和20 μg/L.在25~1 000μg/L范围内,荧光强度和溶液浓度基本呈线性关系.该测量系统灵敏度高,线性范围宽,可以满足荧光检测的要求.  相似文献   

20.
A concept of an ultrafast distributed material transfer system based upon linear induction motors (LIM) has been proposed in which vehicles can travel at velocities of up to 120 km/h. Performance and economic analysis of a high-speed tool-delivery system based on such a system has shown that the robot manipulator that loads and unloads the vehicles is the bottleneck. This paper presents a method to design a high-speed robot with cycle times comparable with the LIM material transfer system. A generic design methodology is developed for robot manipulators that integrates several key design issues such as kinematics, dynamics, structural mechanics, actuator sizing, assessing robustness to parameters and sensor errors, and vibration analysis. The methodology is computationally efficient and has been implemented using MATLAB for evaluating a number of 'rough-cut' feasible designs for the high-speed robot. A highly distributed architecture and distributed protocols are proposed for integrating the high-speed robot and the high-speed material transfer system.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号