• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

实验性测量设备无关型量子密钥分发与有缺陷和相关源。

Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources.

机构信息

National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China.

Beijing National Laboratory for Condensed Matter Physics and Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China; MatricTime Digital Technology Co. Ltd., Nanjing 211899, China.

出版信息

Sci Bull (Beijing). 2022 Nov 15;67(21):2167-2175. doi: 10.1016/j.scib.2022.10.010. Epub 2022 Oct 14.

DOI:10.1016/j.scib.2022.10.010
PMID:36545992
Abstract

The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse attacks and pulse correlations. Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections. We present a characterization of source flaws and connect them to experiments, together with a finite-key analysis against coherent attacks. In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss. Compared with previous QKD protocols with imperfect devices, our study considerably improves both the secure key rate and the transmission distance, and shows application potential in the practical deployment of secure QKD with device imperfections.

摘要

量子密钥分发(QKD)的安全性受到现实设备与理论假设之间差异的严重威胁。最近,提出了一种名为参考技术的重要框架,可以在当前技术下(如状态制备缺陷、由模式依赖性引起的侧信道、木马攻击和脉冲相关性)针对任意源缺陷提供安全性。在这里,我们采用参考技术来证明使用激光脉冲的高效四相位测量设备无关 QKD 对潜在源不完美的安全性。我们对源缺陷进行了特征描述,并将其与实验联系起来,同时针对相干攻击进行了有限密钥分析。此外,我们通过原理验证实验实现证明了我们协议的可行性,并在 20dB 信道损耗下实现了 253 bps 的安全密钥率。与以前使用不完美设备的 QKD 协议相比,我们的研究大大提高了安全密钥率和传输距离,并展示了在具有设备缺陷的实际安全 QKD 部署中的应用潜力。

相似文献

1
Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources.实验性测量设备无关型量子密钥分发与有缺陷和相关源。
Sci Bull (Beijing). 2022 Nov 15;67(21):2167-2175. doi: 10.1016/j.scib.2022.10.010. Epub 2022 Oct 14.
2
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.基于不完美态制备的诱骗态BB84协议的安全性
Entropy (Basel). 2023 Nov 17;25(11):1556. doi: 10.3390/e25111556.
3
Quantum key distribution with correlated sources.具有相关源的量子密钥分发。
Sci Adv. 2020 Sep 9;6(37). doi: 10.1126/sciadv.aaz4487. Print 2020 Sep.
4
Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources.具有有缺陷和泄漏源的发送或不发送双场量子密钥分发
Entropy (Basel). 2021 Aug 25;23(9):1103. doi: 10.3390/e23091103.
5
Experimental measurement-device-independent quantum key distribution with the double-scanning method.采用双扫描方法的实验性测量设备无关量子密钥分发
Opt Lett. 2021 Aug 1;46(15):3729-3732. doi: 10.1364/OL.431061.
6
Counterfactual quantum key distribution with untrusted detectors.基于不可信探测器的反事实量子密钥分发
Heliyon. 2023 Feb 13;9(2):e13719. doi: 10.1016/j.heliyon.2023.e13719. eCollection 2023 Feb.
7
Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.基于不稳定光源的实用被动诱骗态测量设备无关量子密钥分发
Sci Rep. 2017 Sep 12;7(1):11370. doi: 10.1038/s41598-017-09367-y.
8
Experimental three-state measurement-device-independent quantum key distribution with uncharacterized sources.使用未表征源的实验性三态测量设备无关量子密钥分发
Opt Lett. 2020 Aug 1;45(15):4176-4179. doi: 10.1364/OL.398993.
9
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.基于强度调制器消光的高维量子密钥分发的实际安全性
Entropy (Basel). 2022 Mar 26;24(4):460. doi: 10.3390/e24040460.
10
Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states.使用较少量子态的与参考系无关、与测量设备无关的量子密钥分发。
Opt Lett. 2020 May 1;45(9):2624-2627. doi: 10.1364/OL.389440.

引用本文的文献

1
High-capacity device-independent quantum secure direct communication based on hyper-encoding.基于超编码的高容量设备无关量子安全直接通信
Fundam Res. 2023 Nov 30;4(4):851-857. doi: 10.1016/j.fmre.2023.11.006. eCollection 2024 Jul.
2
Efficient Quantum Private Comparison without Sharing a Key.无需共享密钥的高效量子私密比较。
Entropy (Basel). 2023 Nov 17;25(11):1552. doi: 10.3390/e25111552.
3
Phase encoded quantum key distribution up to 380 km in standard telecom grade fiber enabled by baseline error optimization.通过基线误差优化实现标准电信级光纤中长达380公里的相位编码量子密钥分发。
Sci Rep. 2023 Sep 22;13(1):15868. doi: 10.1038/s41598-023-42445-y.
4
Measurement device-independent quantum key distribution with vector vortex modes under diverse weather conditions.不同天气条件下基于矢量涡旋模式的测量设备无关量子密钥分发
Sci Rep. 2023 Sep 11;13(1):14931. doi: 10.1038/s41598-023-40602-x.
5
Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes.抗量子攻击的强前向安全签名方案研究
Entropy (Basel). 2023 Aug 2;25(8):1159. doi: 10.3390/e25081159.
6
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice.基于格的后量子安全身份代理盲签名方案
Entropy (Basel). 2023 Aug 2;25(8):1157. doi: 10.3390/e25081157.
7
Forty thousand kilometers under quantum protection.四十万公里量子保护下。
Sci Rep. 2023 May 30;13(1):8756. doi: 10.1038/s41598-023-35579-6.
8
High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA.基于现场可编程门阵列的高速可变多项式托普利兹哈希算法
Entropy (Basel). 2023 Apr 11;25(4):642. doi: 10.3390/e25040642.
9
Quantum Secure Multi-Party Summation Using Single Photons.利用单光子实现量子安全多方求和
Entropy (Basel). 2023 Mar 30;25(4):590. doi: 10.3390/e25040590.
10
Quantum asymmetric key crypto scheme using Grover iteration.使用 Grover 迭代的量子非对称密钥加密方案。
Sci Rep. 2023 Mar 7;13(1):3810. doi: 10.1038/s41598-023-30860-0.