共查询到20条相似文献,搜索用时 15 毫秒
1.
In a multicarrier continuous‐variable quantum key distribution (CVQKD) protocol, the information is granulated into Gaussian subcarrier CVs and the physical Gaussian link is divided into Gaussian sub‐channels. Here, we propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous‐variable quantum key distribution. The analysis covers the study of the distribution of the sub‐channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub‐channel selection and formulation of the transmittance coefficients and show a reduced complexity progressive sub‐channel scanning method. We define a framework to evaluate the statistical properties of the information flowing processes in multicarrier CVQKD protocols. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the adaptive multicarrier quadrature division‐multiuser quadrature allocation (AMQD‐MQA) multiple‐access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD. 相似文献
2.
The diversity space of multicarrier continuous‐variable quantum key distribution (CVQKD) is defined. The diversity space utilizes the resources that are injected into the transmission by the additional degrees of freedom of the multicarrier modulation. We prove that the exploitable extra degree of freedom in a multicarrier CVQKD scenario significantly extends the possibilities of single‐carrier CVQKD. The manifold extraction allows for the parties to reach decreased error probabilities by utilizing those extra resources of a multicarrier transmission that are not available in a single‐carrier CVQKD setting. We define the multidimensional manifold space of multicarrier CVQKD and the optimal tradeoff between the available degrees of freedom of the multicarrier transmission. We extend the manifold extraction for the multiple‐access AMQD‐MQA (multiuser quadrature allocation) multicarrier protocol. The additional resources of multicarrier CVQKD allow the achievement of significant performance improvements that are particularly crucial in an experimental scenario. 相似文献
3.
We prove the secret key rate formulas and derive security threshold parameters of multicarrier continuous‐variable quantum key distribution CVQKD. In a multicarrier CVQKD scenario, the Gaussian input quantum states of the legal parties are granulated into Gaussian subcarrier continuous variables (CVs). The multicarrier communication formulates Gaussian subchannels from the physical quantum channel, each dedicated to the transmission of a subcarrier CV. The Gaussian subcarriers are decoded by a unitary CV operation, which results in the recovered single‐carrier Gaussian CVs. We derive the formulas through the adaptive multicarrier quadrature division (AMQD) scheme, the singular value decomposition (SVD)–assisted AMQD, and the multiuser AMQD multiuser quadrature allocation (MQA). We prove that the multicarrier CVQKD leads to improved secret key rates and higher tolerable excess noise in comparison with single‐carrier CVQKD. We derive the private classical capacity of a Gaussian subchannel and the security parameters of an optimal Gaussian collective attack in the multicarrier setting. We reveal the secret key rate formulas for one‐way and two‐way multicarrier CVQKD protocols, assuming homodyne and heterodyne measurements and direct and reverse reconciliation. The results reveal the physical boundaries of physically allowed Gaussian attacks in a multicarrier CVQKD scenario and confirm that the improved transmission rates lead to enhanced secret key rates and security thresholds. 相似文献
4.
5.
6.
Himanshu Khanna Mona Aggarwal Swaran Ahuja 《International Journal of Communication Systems》2018,31(1)
In this work, an amplify‐and‐forward variable‐gain relayed mixed RF‐FSO system is studied. The considered dual‐hop system consists of a radio frequency (RF) link followed by a free space optical (FSO) channel. The RF link is affected by short‐term multipath fading and long‐term shadowing effects and is assumed to follow the generalized‐K fading distribution that approximates accurately several important distributions often used to model communication channels. The FSO channel experiences fading caused by atmospheric turbulence that is modeled by the gamma‐gamma distribution characterizing moderate and strong turbulence conditions. The FSO channel also suffers path loss and pointing error induced misalignment fading. The performance of the considered system is analyzed under the collective influence of distribution shaping parameters, pointing errors that result in misalignment fading, atmospheric turbulence, and path loss. The moment‐generating function of the Signal power to noise power ratio measured end‐to‐end for this system is derived. The cumulative distribution function for the Signal power to noise power ratio present between the source and destination receiver is also evaluated. Further, we investigate the error and outage performance and the average channel capacity for this system. The analytical expressions in closed form for the outage probability, symbol and bit error rate considering different modulation schemes and channel capacity are also derived. The mathematical expressions obtained are also demonstrated by numerical plots. 相似文献
7.
多用户网络环境下量子密码术 总被引:3,自引:0,他引:3
在传统的点到点之间进行量子密钥分发协议的基础上,利用量子存储技术和EPR粒子纠缠态互换的方法,提出了在多用户、多控制中心、远距离的网络环境下进行量子密钥传送的方案。与传统的点与点之间的量子密钥传送协议类似,其安全性也是建立在量子力学原理上,任何窃听者的存在必将使生成密钥的误码率上升而被合法通信用户发现。 相似文献
8.
Xiaolin Zhou Dingchen Zhang Yandong Yang Mohammad S. Obaidat 《International Journal of Communication Systems》2012,25(11):1465-1478
A network‐coded cooperative relaying aided free‐space optical (FSO) transmission scheme is designed. The resultant multiple‐source cooperation diversity is exploited by the relay to mitigate the strong turbulence‐induced fading experienced in FSO channels. At the destination, an iterative multiple source detection algorithm is proposed in conjunction with a chip‐level soft network decoding method. Our performance evaluation results using simulation analysis demonstrate that the proposed FSO multiple source detection is capable of approaching the single‐user‐bound for transmission over Gamma–Gamma turbulence channels. Also, the network‐coded cooperative FSO scheme can achieve a significant BER improvement in comparison with conventional noncooperation schemes. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
9.
10.
针对相位编码连续变量量子密钥分发(continous variable quantum key distribution,CVQKD) 在远距离传输时,量子态在接收端的检测效率较低的问题,本文提出在接收端使用朴素贝叶斯(native Bayes,NB)分类器来改进系统性能。NB分类器首先对已标记类别的量子态进行训练,学习不同类别量子态的分布情况,计算每个类别的先验概率和似然概率,再基于先验概率和似然概率计算出待测量子态属于每个类别的后验概率,根据后验概率的大小来确定待测量子态的类别。仿真结果表 明,改进方案可以通过降低测试态在接收端被错误测量的概率来提升系统性能,当过量噪声为0.01时,改进方案的安全距离可以突破250 km。 相似文献
11.
12.
13.
Quantum attack–resistant cryptosystems are required for secure communication since there is a big demand to have quantum computers. Lattice‐based cryptography is one of the quantum‐secure families due to its key/ciphertext sizes and performance. NTRU‐based cryptosystems, a member of lattice‐based cryptosystems, have received much more attention. MaTRU, a noncommutative version of NTRU with some matrix properties, is used to obtain a key exchange protocol in 2018. In this paper, we focus on MaTRU‐based key exchange protocols having CCA2 properties. We propose CCA2‐secure versions of MaTRU‐KE and then provide a security analysis of CCA2‐secure key establishment protocols. We also provide a comparison with the previous ones. 相似文献
14.
This paper proposes an adaptive transmission modulation (ATM) technique for free‐space optical (FSO) links over gamma‐gamma turbulence channels.The ATM technique provides efficient utilization of the FSO channel capacity for improving spectral efficiency, by adapting the order of the phase‐shift keying modulation scheme, according to the channel conditions and the required bit error rate (BER). To overcome the channel degradation resulting from the turbulence effects as well as the pointing errors (PEs), single‐input multiple‐output (SIMO) system with maximal ratio combining (MRC) is proposed. Exact closed‐form expressions of BER and upper bound of the capacity are derived and verified by Monte Carlo simulations. The numerical results show that the proposed adaptive technique improves the spectral efficiency (SE) five times higher than the nonadaptive technique at the same BER threshold (10?3).This improvement is achieved at signal‐to‐noise ratio (SNR) equals 27 and 42 dB in the case of atmospheric turbulence without and with PE, respectively. Furthermore, this SE could be obtained while the SNR = 30 dB by using ( 1 × 4 ) SIMO scheme with MRC and PE and having the same transmitting optical power. 相似文献
15.
量子保密通信及其进展 总被引:6,自引:0,他引:6
综述了国内外最近在量子密码学研究中的相关研究以及向实用化转化的实验结果,并针对量子密钥分发方案提出了一种改进方案。最后对量子密码体制进行了展望。 相似文献
16.
量子密码学的应用研究 总被引:1,自引:1,他引:0
文中首先对量子密码学作了简单的介绍,给出了量子密钥所涉及的几个主要量子效应,接着较为详细地阐述了国内外量子密码学发展的历史,给出了量子密码学研究的几个课题:量子密钥分配、量子签名、量子身份认证、量子加密算法、量子秘密共享等,并分别加以简单的说明并详细地分析了阻碍量子密码实用化的几个因素。最后对量子密码学的发展做了展望。 相似文献
17.
18.
只用两个量子态的星型量子密钥网络方案 总被引:4,自引:0,他引:4
要建立一个安全的保密通信通道,关键就是密钥管理。传统的密钥管理并不能完全解决安全问题,量子密码技术却可以从根本上解决这个问题。本文从实用的角度提出一个基于无源光学网络环境中建立量子密钥的实用方案,这个方法可以由一个网络控制者在一个星型网络上和多个网络用户分别建立、更新密钥。为节约量子探测设备,和通常用四个量子态的保密通信方案相比,这个方案只用了两个量子态。本文还分析了在网络的各个位置上存在窃听时网络的安全性能。 相似文献
19.
Jonathan Wyrick Xiqiao Wang Ranjit V. Kashid Pradeep Namboodiri Scott W. Schmucker Joseph A. Hagmann Keyi Liu Michael D. Stewart Curt A. Richter Garnett W. Bryant Richard M. Silver 《Advanced functional materials》2019,29(52)
Atomically precise fabrication has an important role to play in developing atom‐based electronic devices for use in quantum information processing, quantum materials research, and quantum sensing. Atom‐by‐atom fabrication has the potential to enable precise control over tunnel coupling, exchange coupling, on‐site charging energies, and other key properties of basic devices needed for solid‐state quantum computing and analog quantum simulation. Using hydrogen‐based scanning probe lithography, individual dopant atoms are deterministically placed relative to atomically aligned contacts and gates to build single electron transistors, single atom transistors, and gate‐controlled quantum sensing devices. The key steps required to fabricate and demonstrate the essential building blocks needed for spin selective initialization/readout and coherent quantum manipulation are described. 相似文献
20.
基于任意BELL态的量子密钥分配 总被引:2,自引:2,他引:0
为了提高量子密钥分配的安全性和效率,利用量子纠缠交换的规律,提出了基于纠缠交换的量子密钥分配协议。通信双方通过简单的BELL测量建立起共享密钥,窃听者不可能窃取密钥而不被发现。该协议与其它分配协议的不同在于,可以实现对任意两个BELL态进行BELL测量达到量子密钥分配的目的。协议的实现只需要EPR粒子对,而不需要制备多粒子纠缠态。分析结果表明,此协议只用到两粒子的纠缠态,不需要进行幺正操作,它不仅能够保证密钥分配的安全性,而且简单高效。 相似文献