• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

非结构化量子密钥分发的数值方法。

Numerical approach for unstructured quantum key distribution.

机构信息

Department of Physics and Astronomy, Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario, Canada N2L3G1.

出版信息

Nat Commun. 2016 May 20;7:11712. doi: 10.1038/ncomms11712.

DOI:10.1038/ncomms11712
PMID:27198739
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC4876458/
Abstract

Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study 'unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown.

摘要

量子密钥分发(QKD)允许通过量子理论保证的安全性进行通信。QKD 的主要理论问题是为给定协议计算密钥速率。对于具有对称性的协议,已知分析公式,因为对称性简化了分析。但是,实验不完美会破坏对称性,因此难以估计不完美对密钥速率的影响。此外,一个有趣的问题是(有意)不对称协议是否可以胜过对称协议。在这里,我们开发了一种用于计算任意离散变量 QKD 协议密钥速率的稳健数值方法。最终,这将允许研究人员研究“非结构化”协议,即那些缺乏对称性的协议。我们的方法依赖于将密钥速率计算转换为对偶优化问题,这显著减少了参数的数量,从而减少了计算时间。我们通过研究以前未知密钥速率的一些非结构化协议来说明我们的方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/c4aeb89965c2/ncomms11712-f6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/8cb3156eef63/ncomms11712-f1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/ae1206b3f4fa/ncomms11712-f2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/15bc3da57a07/ncomms11712-f3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/c18a7457945c/ncomms11712-f4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/cc3171c29cba/ncomms11712-f5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/c4aeb89965c2/ncomms11712-f6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/8cb3156eef63/ncomms11712-f1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/ae1206b3f4fa/ncomms11712-f2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/15bc3da57a07/ncomms11712-f3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/c18a7457945c/ncomms11712-f4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/cc3171c29cba/ncomms11712-f5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/408b/4876458/c4aeb89965c2/ncomms11712-f6.jpg

相似文献

1
Numerical approach for unstructured quantum key distribution.非结构化量子密钥分发的数值方法。
Nat Commun. 2016 May 20;7:11712. doi: 10.1038/ncomms11712.
2
Effects of experimental impairments on the security of continuous-variable quantum key distribution.实验损伤对连续变量量子密钥分发安全性的影响。
Heliyon. 2023 May 29;9(6):e16670. doi: 10.1016/j.heliyon.2023.e16670. eCollection 2023 Jun.
3
Neural network-based prediction of the secret-key rate of quantum key distribution.基于神经网络的量子密钥分发密钥率预测
Sci Rep. 2022 May 25;12(1):8879. doi: 10.1038/s41598-022-12647-x.
4
Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution.
Opt Express. 2022 Apr 25;30(9):15024-15036. doi: 10.1364/OE.455762.
5
Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization.具有离散相位随机化的量子密钥分发的有限密钥分析
Entropy (Basel). 2023 Jan 31;25(2):258. doi: 10.3390/e25020258.
6
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded.排除中间人攻击时的卫星量子通信
Entropy (Basel). 2019 Apr 10;21(4):387. doi: 10.3390/e21040387.
7
Counterfactual quantum key distribution with untrusted detectors.基于不可信探测器的反事实量子密钥分发
Heliyon. 2023 Feb 13;9(2):e13719. doi: 10.1016/j.heliyon.2023.e13719. eCollection 2023 Feb.
8
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.基于强度调制器消光的高维量子密钥分发的实际安全性
Entropy (Basel). 2022 Mar 26;24(4):460. doi: 10.3390/e24040460.
9
Round-robin differential-phase-shift quantum key distribution with a passive decoy state method.轮询差分相移量子密钥分发与被动诱骗态方法。
Sci Rep. 2017 Feb 13;7:42261. doi: 10.1038/srep42261.
10
Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states.使用较少量子态的与参考系无关、与测量设备无关的量子密钥分发。
Opt Lett. 2020 May 1;45(9):2624-2627. doi: 10.1364/OL.389440.

引用本文的文献

1
Discrete-Modulated Coherent-State Quantum Key Distribution with Basis-Encoding.基于基编码的离散调制相干态量子密钥分发
Research (Wash D C). 2025 May 14;8:0691. doi: 10.34133/research.0691. eCollection 2025.
2
Security of quantum key distribution from generalised entropy accumulation.基于广义熵积累的量子密钥分发安全性
Nat Commun. 2023 Aug 29;14(1):5272. doi: 10.1038/s41467-023-40920-8.
3
Neural network-based prediction of the secret-key rate of quantum key distribution.基于神经网络的量子密钥分发密钥率预测

本文引用的文献

1
Quantifying coherence.量化相干性。
Phys Rev Lett. 2014 Oct 3;113(14):140401. doi: 10.1103/PhysRevLett.113.140401. Epub 2014 Sep 29.
2
Field and long-term demonstration of a wide area quantum key distribution network.广域量子密钥分发网络的实地及长期演示
Opt Express. 2014 Sep 8;22(18):21739-56. doi: 10.1364/OE.22.021739.
3
Measurement-device-independent quantum key distribution.测量设备无关的量子密钥分发。
Sci Rep. 2022 May 25;12(1):8879. doi: 10.1038/s41598-022-12647-x.
4
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.基于强度调制器消光的高维量子密钥分发的实际安全性
Entropy (Basel). 2022 Mar 26;24(4):460. doi: 10.3390/e24040460.
5
Computing conditional entropies for quantum correlations.计算量子关联的条件熵。
Nat Commun. 2021 Jan 25;12(1):575. doi: 10.1038/s41467-020-20018-1.
6
Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding.基于混合编码的高效高维量子密钥分发
Entropy (Basel). 2019 Jan 17;21(1):80. doi: 10.3390/e21010080.
7
Quantum key distribution with correlated sources.具有相关源的量子密钥分发。
Sci Adv. 2020 Sep 9;6(37). doi: 10.1126/sciadv.aaz4487. Print 2020 Sep.
8
Enhanced Bell state measurement for efficient measurement-device-independent quantum key distribution using 3-dimensional quantum states.利用三维量子态实现高效测量设备无关量子密钥分发的增强型贝尔态测量
Sci Rep. 2019 Jan 24;9(1):687. doi: 10.1038/s41598-018-36513-x.
Phys Rev Lett. 2012 Mar 30;108(13):130503. doi: 10.1103/PhysRevLett.108.130503.
4
Tight finite-key analysis for quantum cryptography.量子密码术的紧有限密钥分析。
Nat Commun. 2012 Jan 17;3:634. doi: 10.1038/ncomms1631.
5
Field test of quantum key distribution in the Tokyo QKD Network.东京量子密钥分发网络中的量子密钥分发现场测试。
Opt Express. 2011 May 23;19(11):10387-409. doi: 10.1364/OE.19.010387.
6
Unified view of quantum and classical correlations.量子和经典关联的统一观点。
Phys Rev Lett. 2010 Feb 26;104(8):080501. doi: 10.1103/PhysRevLett.104.080501. Epub 2010 Feb 22.
7
Postselection technique for quantum channels with applications to quantum cryptography.量子信道的后选择技术及其在量子密码学中的应用。
Phys Rev Lett. 2009 Jan 16;102(2):020504. doi: 10.1103/PhysRevLett.102.020504. Epub 2009 Jan 14.
8
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.有限资源下的量子密码学:具有单向后处理的离散变量协议的无条件安全界限
Phys Rev Lett. 2008 May 23;100(20):200501. doi: 10.1103/PhysRevLett.100.200501. Epub 2008 May 22.
9
Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication.使用单向经典通信的量子密钥分发协议的密钥率的上下界。
Phys Rev Lett. 2005 Aug 19;95(8):080501. doi: 10.1103/PhysRevLett.95.080501. Epub 2005 Aug 15.
10
Decoy state quantum key distribution.诱骗态量子密钥分发
Phys Rev Lett. 2005 Jun 17;94(23):230504. doi: 10.1103/PhysRevLett.94.230504. Epub 2005 Jun 16.