对两种点到多点量子密钥分配系统的密钥生成效率和传输距离进行了分析,讨论了系统的参数选取对它们的影响.分析了诱惑态技术对这两种多用户系统的传输距离及密钥生成效率的影响.数据表明,结合诱惑态技术,可以将密钥传输距离扩展为原来的2倍,以及将量子密钥分发效率提高1个数量级.对点到多点系统进行了功能扩展研究,提出了可实现任意两用户间密钥共享的协议.该协议无需其它的硬件要求,易于实现.
The quantum key generation efficiency and the transmission distances of two kinds of point-to-multi-point quantum key distribution (QKD) system are discussed. How to select the devices' parameters is considered detailedly when designing a multi-user QKD system. Decoy state techniques can enhance the security of point-to-multi-point QKD systems, for example, the transmission distance is extended two times and the quantum key generation efficiency is improved a factor of ten. Based on point-to-multi-point QKD systems, a protocol which can realize secret key sharing between two arbitrary receivers is proposed.
参考文献
[1] | Bennett C H,Brassard G.Quantum cryptography:Public key distribution and coin tossing[C].Processing of the IEEE International Conference on Computers,Systems,and Signal Processing,Bangalore,India,New York:IEEE,1984,175-179. |
[2] | Gobby C,Yuan Z L,Shields A J.Quantum key distribution over 122 km of standard telecom fiber[J].Applied Physics Letters,2004,84(19):3762-3763. |
[3] | Mo X F,Zhu B,Han Z F,et al.Faraday-Michelson system for quantum cryptography[J].Optics Letters,2005,30(19):2632-2634. |
[4] | Takesue H,Diamanti E,Hoajo T,et al.Differential phase shift quantum key distribution experiment over 105 km fiber[J].New Journal of Physics,2005,7(1):232-243. |
[5] | Rosenberg D,Harrington J W,Rice P R,et al.Long-distance decoy-state quantum key distribution in optical fiber[J].Phys.Rev.Lett.,2007,98(1):010503. |
[6] | Zhu A D,Zhang S.Quantum key distribution and controlled quantum direct communication applying product state of qurtit[J].Chinese Journal D,Quantum Electronics(量子电子学报),2007,24(3):316(in Chinese). |
[7] | Fu M X.Influence of path-attack on security of quantum key distribution networks[J].Chinese Journal of Quantum Electronics(量子电子学报),2008,25(5):572(in Chinese). |
[8] | Townsend P D.Quantum cryptography on optical fiber networks[J].Optical Fiber Technology,1998,4:345-370. |
[9] | Elliott C.Building the quantum network[J].New Journal of Physics,2002,4(1):346. |
[10] | Fu M X,Zhan F,Lu Y Q,et al.Progress of practical quantum key distribution network[J].Laser and Optoelectronics Progress(激光与光电子学进展),2007,44(10):39-47(in Chinese). |
[11] | Chen W,Han Z F,Zhang T,et al.Field experimental "star type" metropolitan quantum key distribution network[OL].arXiv:0708.3546v1[quant-ph],http://arxiv.org/abs/0708.3546. |
[12] | Fernandez V,Collins R J,Gordon K J,et al.Passive optical network approach to gigahertz-clocked multiuser quantum key distribution[J].IEEE Journal of Quantum Electronics,2007,43(2):130-137. |
[13] | Honjo T,Inoue K,Sahara A,et al.Quantum key distribution experiment through a PLC matrix switch[J].Optics Communications,2006,263:120-123. |
[14] | Toliver P,Runser R J,Chapuran T E,et al.Experimental investigation of quantum key distribution through transparent optical switch elements[J].IEEE Photonics Technology Letters,2003,15(11):1669-1671. |
[15] | Zhao B,Chen Z B,Chen Y A,et al.Robust creation of entanglement between remote memory qubits[J].Physics Review Letters,2007,98(240502):1-3. |
[16] | Valiev K A.Quantum computers and quantum computations[J].Physics-Uspekhi,2005,48(1):1-36. |
[17] | Gordon K J,Fernandez V,Townsend P D,et al.A short wavelength gigahertz clocked fiber-optic quantum key distribution system[J].IEEE Journal of Quantum Electronics,2004,40(7):900-908. |
[18] | Lütkenhaus N.Security against individual attacks for realistic quantum key distribution[J].Physics Review A,2000,61(5):052304. |
[19] | Lo H K,Ma X F,Chen K.Decoy state quantum key distribution[J].Physics Review Letters,2005,94(23):230504. |
[20] | Zhao F.Practical Quantum Key Distribution System and Algorithm with Technic Realization(实用量子密钥分配系统与分配算法及技术实现)[D].Guangzhou:Doctorial Dissertation of South China Normal University,2008,65-79(in Chinese). |
[21] | Walks E,Takesue H,Yamamoto Y.Security of differential-phase-shift quantum key distribution against individual attacks[J].Physics Review A,2006,73(1):012344. |
[22] | Ma X F,Qi B,Zhao Y,et al.Practical decoy state for quantum key distribution[J].Physics Review A,2005,72(1):012326. |
- 下载量()
- 访问量()
- 您的评分:
-
10%
-
20%
-
30%
-
40%
-
50%