检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]海军工程大学电子工程学院通信工程系,武汉430033
出 处:《物理学报》2011年第10期36-41,共6页Acta Physica Sinica
基 金:国家高技术研究发展计划(批准号:2009AAJ128)资助的课题~~
摘 要:基于改造的弱相干态光源,提出了一种非正交编码被动诱骗态量子密钥分配方案.该方案不主动制备诱骗态,而是根据发送端探测器是否响应,将接收端的探测结果分为响应集合和未响应集合,以此分别作为信号态和诱骗态,并利用这两个集合来估计参量和生成密钥.数值仿真表明,非正交编码被动诱骗态方案的密钥生成效率和安全传输距离都优于现有的被动诱骗态方案,且性能非常接近主动无穷诱骗态方案的理论极限值;未响应集合对密钥生成的参与使方案性能免受发送端探测效率的影响,弥补了实际探测器探测效率低下的缺陷;由于不需要主动制备诱骗态,该方案实现非常简单,适用于高速量子密钥分配的场合.A nonorthogonal passive decoy-state method is presented with a reconstructive weak coherent state source.The method dose not prepare decoy states actively and divides the receiver detection events into two groups,i.e.,triggered components and nontriggered components,according to triggering situation of the sender detector.Both triggered and nontriggered components,as signal states and decoy states,are used to do some estimations and to generate secure key.The simulation results show that a better key generation rate and a longer secure transmission distance can be obtained with the nonorthogonal passive decoy-state method than with the existing passive methods,and that the performance is comparable to the theoretical limit of an active infinite decoy-state protocol.Furthermore,the nontriggered component contribution to key generation offsets the limitation of the detector low efficiency,and the performance of the method dose not depend on the detector efficiency of sender.Because decoy states need not be prepared actively,and our protocol is easy to implement and apply to quantum key distribution at high transmission rates.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.136.19.165