• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于时间相位编码的实验性可组合安全诱骗态量子密钥分发

Experimental composable security decoy-state quantum key distribution using time-phase encoding.

作者信息

Yin Hua-Lei, Liu Peng, Dai Wei-Wei, Ci Zhao-Hui, Gu Jie, Gao Tian, Wang Qiang-Wei, Shen Zi-Yao

出版信息

Opt Express. 2020 Sep 28;28(20):29479-29485. doi: 10.1364/OE.401829.

DOI:10.1364/OE.401829
PMID:33114847
Abstract

Quantum key distribution (QKD) promises provably secure communications. In order to improve the secret key rate, combining a biased basis choice with the decoy-state method is proposed. Concomitantly, there is a basis-independent detection efficiency condition, which usually cannot be satisfied in a practical system, such as the time-phase encoding. Fortunately, this flaw has been recently removed theoretically and experimentally in the four-intensity decoy-state BB84 QKD protocol using the fact that the expected yields of single-photon states prepared in two bases stay the same for a given measurement basis. However, the security proofs do not fully consider the finite-key effects for general attacks. In this work, we provide the rigorous finite-key security bounds in the universally composable framework for the four-intensity decoy-state BB84 QKD protocol. We build a time-phase encoding system with 200 MHz clock to implement this protocol, in which the real-time secret key rate is more than 60 kbps over 50 km single-mode fiber.

摘要

量子密钥分发(QKD)有望实现可证明的安全通信。为了提高密钥率,人们提出将有偏基选择与诱骗态方法相结合。与此同时,存在一个与基无关的探测效率条件,在诸如时间相位编码等实际系统中通常无法满足。幸运的是,最近在四强度诱骗态BB84 QKD协议中,利用在给定测量基下两个基中制备的单光子态的预期产率保持相同这一事实,从理论和实验上消除了这一缺陷。然而,安全性证明并未充分考虑一般攻击的有限密钥效应。在这项工作中,我们在通用可组合框架下为四强度诱骗态BB84 QKD协议提供了严格的有限密钥安全性界限。我们构建了一个具有200 MHz时钟的时间相位编码系统来实现该协议,其中在50 km单模光纤上实时密钥率超过60 kbps。

相似文献

1
Experimental composable security decoy-state quantum key distribution using time-phase encoding.基于时间相位编码的实验性可组合安全诱骗态量子密钥分发
Opt Express. 2020 Sep 28;28(20):29479-29485. doi: 10.1364/OE.401829.
2
Tight security bounds for decoy-state quantum key distribution.诱骗态量子密钥分发的紧密安全界限
Sci Rep. 2020 Aug 31;10(1):14312. doi: 10.1038/s41598-020-71107-6.
3
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.基于不完美态制备的诱骗态BB84协议的安全性
Entropy (Basel). 2023 Nov 17;25(11):1556. doi: 10.3390/e25111556.
4
Finite-key analysis for twin-field quantum key distribution with composable security.具有可组合安全性的双场量子密钥分发的有限密钥分析。
Sci Rep. 2019 Nov 19;9(1):17113. doi: 10.1038/s41598-019-53435-4.
5
Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.基于不稳定光源的实用被动诱骗态测量设备无关量子密钥分发
Sci Rep. 2017 Sep 12;7(1):11370. doi: 10.1038/s41598-017-09367-y.
6
Security analysis of quantum key distribution on passive optical networks.无源光网络上量子密钥分发的安全性分析
Opt Express. 2017 May 15;25(10):11894-11909. doi: 10.1364/OE.25.011894.
7
Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method.采用四强度诱骗态方法对测量设备无关量子密钥分发进行改进的统计涨落分析。
Opt Express. 2018 May 14;26(10):13289-13300. doi: 10.1364/OE.26.013289.
8
Experimental underwater quantum key distribution.实验性水下量子密钥分发。
Opt Express. 2021 Mar 15;29(6):8725-8736. doi: 10.1364/OE.418323.
9
Measurement-device-independent quantum key distribution with leaky sources.基于泄漏源的测量设备无关量子密钥分发
Sci Rep. 2021 Jan 18;11(1):1678. doi: 10.1038/s41598-021-81003-2.
10
Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition.基于广义算子优势条件的双场量子密钥分发的有限密钥分析
Opt Express. 2020 Jul 20;28(15):22594-22605. doi: 10.1364/OE.397087.

引用本文的文献

1
Decoherence-assisted quantum key distribution.退相干辅助量子密钥分发
Sci Rep. 2025 Aug 25;15(1):31258. doi: 10.1038/s41598-025-13508-z.
2
Beating the Fault-Tolerance Bound and Security Loopholes for Byzantine Agreement with a Quantum Solution.用量子解决方案突破拜占庭协议的容错界限和安全漏洞。
Research (Wash D C). 2023 Nov 21;6:0272. doi: 10.34133/research.0272. eCollection 2023.
3
Experimental quantum secure network with digital signatures and encryption.具有数字签名和加密功能的实验性量子安全网络。
Natl Sci Rev. 2022 Oct 22;10(4):nwac228. doi: 10.1093/nsr/nwac228. eCollection 2023 Apr.
4
Neural network-based prediction of the secret-key rate of quantum key distribution.基于神经网络的量子密钥分发密钥率预测
Sci Rep. 2022 May 25;12(1):8879. doi: 10.1038/s41598-022-12647-x.