• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于两个非正交态的无条件安全密钥分发

Unconditionally secure key distribution based on two nonorthogonal states.

作者信息

Tamaki Kiyoshi, Koashi Masato, Imoto Nobuyuki

机构信息

CREST Research Team for Interacting Carrier Electronics, School of Advanced Sciences, The Graduate University for Advanced Studies (SOKENDAI), Hayama, Kanagawa, 240-0193, Japan.

出版信息

Phys Rev Lett. 2003 Apr 25;90(16):167904. doi: 10.1103/PhysRevLett.90.167904. Epub 2003 Apr 24.

DOI:10.1103/PhysRevLett.90.167904
PMID:12732012
Abstract

We prove the unconditional security of the Bennett 1992 protocol, by using a reduction to an entanglement distillation protocol initiated by a local filtering process. The bit errors and the phase errors are correlated after the filtering, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the two states shows a trade-off between accuracy of the estimation and robustness to noises.

摘要

我们通过将其归约为由局部滤波过程启动的纠缠纯化协议,证明了1992年贝内特协议的无条件安全性。滤波后,比特错误和相位错误是相关的,并且我们可以通过一种涉及非正交测量的估计方法,根据观测到的比特错误来限制相位错误的数量。两个状态之间的角度显示了估计精度和噪声鲁棒性之间的权衡。

相似文献

1
Unconditionally secure key distribution based on two nonorthogonal states.基于两个非正交态的无条件安全密钥分发
Phys Rev Lett. 2003 Apr 25;90(16):167904. doi: 10.1103/PhysRevLett.90.167904. Epub 2003 Apr 24.
2
Unconditional security of single-photon differential phase shift quantum key distribution.单光子差分相移量子密钥分发的无条件安全性。
Phys Rev Lett. 2009 Oct 23;103(17):170503. doi: 10.1103/PhysRevLett.103.170503. Epub 2009 Oct 22.
3
Experimental unconditionally secure bit commitment.实验无条件安全位承诺。
Phys Rev Lett. 2014 Jan 10;112(1):010504. doi: 10.1103/PhysRevLett.112.010504.
4
Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.利用双基干涉实现时间-能量纠缠量子密钥分发的无条件安全性。
Phys Rev Lett. 2014 Mar 28;112(12):120506. doi: 10.1103/PhysRevLett.112.120506. Epub 2014 Mar 26.
5
Unconditional security of a three state quantum key distribution protocol.一种三态量子密钥分发协议的无条件安全性。
Phys Rev Lett. 2005 Feb 4;94(4):040503. doi: 10.1103/PhysRevLett.94.040503. Epub 2005 Jan 31.
6
Simple proof of security of the BB84 quantum key distribution protocol.BB84量子密钥分发协议安全性的简单证明。
Phys Rev Lett. 2000 Jul 10;85(2):441-4. doi: 10.1103/PhysRevLett.85.441.
7
Secure deterministic communication without entanglement.无纠缠的安全确定性通信。
Phys Rev Lett. 2005 Apr 15;94(14):140501. doi: 10.1103/PhysRevLett.94.140501. Epub 2005 Apr 14.
8
Entanglement as a precondition for secure quantum key distribution.纠缠作为安全量子密钥分发的前提条件。
Phys Rev Lett. 2004 May 28;92(21):217903. doi: 10.1103/PhysRevLett.92.217903. Epub 2004 May 27.
9
Unconditionally secure bit commitment by transmitting measurement outcomes.无条件安全比特承诺通过传输测量结果。
Phys Rev Lett. 2012 Sep 28;109(13):130501. doi: 10.1103/PhysRevLett.109.130501. Epub 2012 Sep 27.
10
Secure quantum key distribution with an uncharacterized source.利用未表征源实现安全量子密钥分发。
Phys Rev Lett. 2003 Feb 7;90(5):057902. doi: 10.1103/PhysRevLett.90.057902. Epub 2003 Feb 6.

引用本文的文献

1
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.基于不完美态制备的诱骗态BB84协议的安全性
Entropy (Basel). 2023 Nov 17;25(11):1556. doi: 10.3390/e25111556.
2
Security of quantum key distribution from generalised entropy accumulation.基于广义熵积累的量子密钥分发安全性
Nat Commun. 2023 Aug 29;14(1):5272. doi: 10.1038/s41467-023-40920-8.
3
Measurement-device-independent quantum key distribution with leaky sources.基于泄漏源的测量设备无关量子密钥分发
Sci Rep. 2021 Jan 18;11(1):1678. doi: 10.1038/s41598-021-81003-2.
4
Finite-size security of continuous-variable quantum key distribution with digital signal processing.具有数字信号处理的连续变量量子密钥分发的有限尺寸安全性
Nat Commun. 2021 Jan 13;12(1):252. doi: 10.1038/s41467-020-19916-1.
5
Tight security bounds for decoy-state quantum key distribution.诱骗态量子密钥分发的紧密安全界限
Sci Rep. 2020 Aug 31;10(1):14312. doi: 10.1038/s41598-020-71107-6.
6
Subcarrier wave continuous variable quantum key distribution with discrete modulation: mathematical model and finite-key analysis.具有离散调制的副载波连续变量量子密钥分发:数学模型与有限密钥分析
Sci Rep. 2020 Jun 22;10(1):10034. doi: 10.1038/s41598-020-66948-0.
7
Round-robin differential-phase-shift quantum key distribution with a passive decoy state method.轮询差分相移量子密钥分发与被动诱骗态方法。
Sci Rep. 2017 Feb 13;7:42261. doi: 10.1038/srep42261.
8
Experimental realization of equiangular three-state quantum key distribution.等角三态量子密钥分发的实验实现
Sci Rep. 2016 Jul 28;6:30089. doi: 10.1038/srep30089.
9
Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption.量子哈希函数及其在量子密钥分发中的隐私增强、伪随机数生成和图像加密中的应用。
Sci Rep. 2016 Jan 29;6:19788. doi: 10.1038/srep19788.