首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 236 毫秒
1.
量子保密通信技术为电力业务数据传输提供端到端的信息安全保障,双场量子密钥分发(Twin-field Quantum Key Distribution, TF-QKD)可实现无量子中继器的远程安全通信,但其安全性是基于无限密钥的假设。为解决现实场景中量子密钥有限和光子源不稳定的情形,提出一种基于有限密钥和诱骗态的双场量子密钥分发协议。在协议中采用诱骗态法和无替换的随机抽样法估计相位错误率,并利用Azuma不等式对协议进行安全性分析,验证了在不稳定光子源强度波动下协议的可组合安全性。数值模拟表明所提协议在不稳定光子源强度波动下得到的秘密密钥率可以超过线性密钥率的界线,且当信号脉冲数量较小时,强度波动对协议密钥率有显著影响。  相似文献   

2.
针对传统量子密钥分配协议使用弱相干光源带来的密钥生成率较低的问题,对光源进行优化,用奇相干光源代替弱相干光源,提出了基于奇相干光源和量子存储的测量设备无关量子密钥分配协议。对比了具有奇相干光源和量子存储的测量设备无关量子密钥分配协议与基于弱相干光源测量设备无关量子密钥分配协议的性能优劣。分析了基于奇相干光源和量子存储的测量设备无关量子密钥分配协议中,密钥生成率、最小退相干时间与安全传输距离之间的关系。仿真结果表明,引入奇相干光源大大减少了传统弱相干光源的多光子数,弥补了其在光源上的不足之处。随着安全传输距离的增加,密钥生成率随之降低,但基于奇相干光源和量子存储的量子密钥分配协议性能仍然较高。  相似文献   

3.
为提高效率,提出了一种直接共享经典信息的量子秘密共享协议。协议利用Pauli矩阵的特殊性质将经典信息编码在Bell态上实现秘密共享,为了检测是否存在窃听者,通过随机插入诱骗光子的方法确保传输的安全。分析表明该协议是安全的,效率可以达到1个Be11态共享2 bit经典信息。  相似文献   

4.
双场量子密钥分发协议(TF-QKD)的提出,突破性地将密钥速率改善为与信道透过率的平方根相关,可以在没有量子中继器的情况下克服密钥速率容量界。在传统的TF-QKD协议中,需要相干光源所添加的随机相位是连续的。然而在现实条件中,这样的假设经常无法满足,由此会降低协议的实际安全性。针对此问题提出了一种在测试模式和编码模式下具有随机相位离散化特征的TF-QKD协议,并使用了离散随机相位情况下的诱骗态方法进行分析。仿真结果表明,只需要少量的离散相位,随机相位离散化TF-QKD协议的密钥速率也可以超过密钥速率容量界,从而为TF-QKD协议的实际应用提供参考。  相似文献   

5.
摘要:在用户与用户进行量子密钥分发的时候,随着用户数量的增加,用户之间需要建立大量的量子传输信道。基于减少量子传输信道数量问题,本文设计了一种基于GHZ态的量子密钥分发协。该协议由第三方进行粒子分配,利用三粒子GHZ态在Z基和X基下具有不同的表示的特性作为密钥分发的关键点。协议中由第三方向任意两名用户分发密钥,大大减少了量子信道的数量。经过安全性分析,本协议能抵御截获重发攻击,中间人攻击和纠缠攻击,而作为第三方可以是不可信的。  相似文献   

6.
提出了一种基于量子秘密共享的盲签名方案。其中量子秘密共享中用到了Bell纠缠和诱骗光子;盲签名使用的是异或操作和Hash函数。Bell纠缠是纠缠态中最简单的纠缠,而异或操作也是简单易操作;诱骗光子和Hash函数保证了安全性,将这些结合的本方案简单安全易实现,同时还保证了信息的盲性、签名消息的不可否认和不可伪造性。  相似文献   

7.
嵌合态被发现存在于神经系统并且可能在神经元节律、大脑的睡眠和记忆等诸多神经过程中发挥重要作用.本文考虑神经元交互中的电磁感应现象,建立了以Hindmarsh Rose神经元为节点的局部耦合的双层忆阻神经元网络,研究其嵌合态时空动力学模式及产生机理.结果发现,改变层内、层间突触耦合强度会使网络产生移动和不完美移动嵌合态等多种类型的嵌合模式,其中不完美移动嵌合态中不相干的区域会扩展到网络的相干域.特别地,在特定耦合强度下,存在一种新的嵌合态活动模式,即一部分神经元处于嵌合态,另一部分神经元处于移动嵌合态.考虑神经元突触的忆阻特性,发现忆阻参数的增加能够使处于嵌合态的神经元网络转变为同步态,且耦合强度越大,达到同步态所需要的忆阻参数值越小.进一步探究双层网络的同步性,发现层间耦合强度和忆阻参数的增大有助于网络达到更好的同步.研究结果表明神经元之间的相互作用可以激发双层神经元网络产生多种嵌合态模式,电磁感应可以促进网络由嵌合态向同步态转迁,这些结果有助于理解人脑中复杂的神经放电过程和信息处理机制,并为可能的类脑装置应用提供参考.  相似文献   

8.
提出了一个基于团簇态的量子秘密共享方案,发送者通过Pauli操作将经典秘密信息编码在团簇态上进行分发,接收者通过联合测量实现秘密共享。协议插入EPR对作为诱骗态以防止窃听,通过安全性分析证明本协议是安全的,可以抵抗截获-测量、截获-重发和纠缠-测量攻击。此外,协议传输一个四粒子团簇态可以共享四个经典比特信息,量子比特效率达到100%。  相似文献   

9.
量子的纠缠特性可以有效并且安全地应用于量子秘钥分配协议。提出一个基于四粒子W态的密钥分配协议。利用量子W态在量子比特丢失后拥有较强鲁棒性的特点,通过使用不同的测量基把检测信道和生成密钥的粒子区分开来,经贝尔测量和与运算使通信双方生成一致的密钥。除了用于信道检测的粒子外,其余的粒子都参与了最后密钥的生成,使得粒子的利用率较高。最后,对提出的四粒子W态的密钥分配协议的安全性进行了分析。  相似文献   

10.
在资源访问无处不在的互联网时代,如何做好对资源的访问控制具有重要的意义.本文利用二粒子纠缠态Bell态的纠缠特性,提出了基于Bell态的资源访问控制协议.该协议基于量子密钥分发(Quantum Key Distribution-QKD),设计了一种利用不对等密钥(不经意密钥)实现的量子资源访问控制协议,同时实现了对资源请求方的身份认证.本文分析了该协议的安全性,证明了协议可以实现资源不被非法授权用户访问,以及特定授权用户只能访问特定资源.  相似文献   

11.
Round-robin differential-phase-shift (RRDPS) quantum key distribution (QKD) scheme provides an effective way to overcome the signal disturbance from the transmission process. However, most RRDPS-QKD schemes use weak coherent pulses (WCPs) as the replacement of the perfect single-photon source. Considering the heralded pair-coherent source (HPCS) can efficiently remove the shortcomings of WCPs, we propose a RRDPS-QKD scheme with HPCS in this paper. Both infinite-intensity decoy-state method and practical three-intensity decoy-state method are adopted to discuss the tight bound of the key rate of the proposed scheme. The results show that HPCS is a better candidate for the replacement of the perfect single-photon source, and both the key rate and the transmission distance are greatly increased in comparison with those results with WCPs when the length of the pulse trains is small. Simultaneously, the performance of the proposed scheme using three-intensity decoy states is close to that result using infinite-intensity decoy states when the length of pulse trains is small.  相似文献   

12.
The original measurement device-independent quantum key distribution is reviewed, and a modified protocol using heralded pair coherent state (HPCS) is proposed to overcome the quantum bit error rate associated with the dark count rate of the detectors in long-distance quantum key distribution. Our simulation indicates that the secure transmission distance can be improved evidently with HPCS owing to the lower probability of vacuum events when compared with weak coherent source scenario, while the secure key rate can be increased with HPCS due to the higher probability of single-photon events when compared with heralded single-photon source scenario. Furthermore, we apply the finite key analysis to the decoy state MDI-QKD with HPCS and obtain a practical key rate.  相似文献   

13.
We present a new scheme on implementing the passive quantum key distribution with thermal distributed parametric down-conversion source. In this scheme, only one-intensity decoy state is employed, but we can achieve very precise estimation on the single-photon-pulse contribution by utilizing those built-in decoy states. Moreover, we compare the new scheme with other practical methods, i.e., the standard three-intensity decoy-state BB84 protocol using either weak coherent states or parametric down-conversion source. Through numerical simulations, we demonstrate that our new scheme can drastically improve both the secure transmission distance and the key generation rate.  相似文献   

14.
15.
We put forward a new scheme for implementing the measurement-device-independent quantum key distribution (QKD) with weak coherent source, while using only two different intensities. In the new scheme, we insert a beam splitter and a local detector at both Alice’s and Bob’s side, and then all the triggering and non-triggering signals could be employed to process parameter estimations, resulting in very precise estimations for the two-single-photon contributions. Besides, we compare its behavior with two other often used methods, i.e., the conventional standard three-intensity decoy-state measurement-device-independent QKD and the passive measurement-device-independent QKD. Through numerical simulations, we demonstrate that our new approach can exhibit outstanding characteristics not only in the secure transmission distance, but also in the final key generation rate.  相似文献   

16.
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all the detection attacks. Based on decoy-state method, MDI-QKD can be implemented with nonperfect single-photon sources. In this paper, the performance of three-intensity decoy-state MDI-QKD under asymmetric channel transmittance efficiency is considered and compared with the results under the symmetric choice scenario. The relation between security key generation rate and the total transmission loss is shown with exchanged ratio of the two distances between Alice to the untrusted third party and Bob to the third party. Based on the relationship, an optimal intensity method is proposed to improve the key rate for a fixed distance ratio, which will provide important parameters for practical experiment.  相似文献   

17.
By employing pulses involving three-intensity, we propose a scheme for the measurement device-independent quantum key distribution with heralded single-photon sources. We make a comparative study of this scheme with the standard three-intensity decoy-state scheme using weak coherent sources or heralded single-photon sources. The advantage of this scheme is illustrated through numerical simulations: It can approach very closely the asymptotic case of using an infinite number of decoy-states and exhibits excellent behavior in both the secure transmission distance and the final key generation rate.  相似文献   

18.
Measurement-device-independent quantum key distribution (MDI-QKD) is a promising protocol for realizing long-distance secret keys sharing. However, its key rate is relatively low when the finite-size effect is taken into account. In this paper, we consider statistical fluctuation analysis for the three-intensity decoy-state MDI-QKD system based on the recent work (Zhang et al. in Phys Rev A 95:012333, 2017) and further compare its performance with that of applying the Gaussian approximation technique and the Chernoff bound method. The numerical simulations demonstrate that the new method has apparent enhancement both in key generation rate and transmission distance than using Chernoff bound method. Meanwhile, the present work still shows much higher security than Gaussian approximation analysis.  相似文献   

19.
高性能计算机系统的持续性能是反映实际领域应用中高性能计算机系统性能强弱的重要度量标准。简单介绍了高性能计算机系统常用的性能评价方法,结合应用基准程序集,提出了相对持续性能的度量模型。实验基于高性能计算气象应用评测,结果表明应用相对持续性能度量模型可区分不同厂商的高性能计算机系统的性能强弱,为高性能计算机系统的选择提供参考,并在一定程度上反映了气象应用本身的可扩展性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号