ترغب بنشر مسار تعليمي؟ اضغط هنا

In this paper we report a continuous-variable quantum key distribution protocol using multimode coherent states generated on subcarrier frequencies of the optical spectrum. To detect the quadrature components of bosonic field we propose a coherent de tection scheme where power from a carrier wave is used as a local oscillator. We compose a mathematical model of the proposed scheme and perform its security analysis in the finite-size regime using fully quantum asymptotic equipartition property technique. We calculate a lower bound on the secret key rate for the system under the assumption that the quantum channel noise is negligible compared to detector dark counts, and an eavesdropper is restricted to collective attacks. Our calculation shows that the current realistic system implementation would allow distributing secret keys over channels with losses up to 9 dB.
In this paper we present the quantum control attack on quantum key distribution systems. The cornerstone of the attack is that Eve can use unitary (polar) decomposition of her positive-operator valued measure elements, which allows her to realize the feed-forward operation (quantum control), change the states in the channel after her measurement and impose them to Bob. Below we consider the general eavesdropping strategy and the conditions those should be satisfied to provide the attack successfully. Moreover we consider several types of the attack, each of them is based on a different type of discrimination. We also provide the example on two non-orthogonal states and discuss different strategies in this case.
In this paper we present finite-key security analysis for quantum key distribution protocol based on weak coherent (in particular phase-coded) states using a fully quantum asymptotic equipartition property technique. This work is the extension of the proof for non-orthogonal states on the coherent states. Below we consider two types of attacks each of them maximizes either Alice-Eve or Eve-Bob mutual information. The cornerstone of this paper is that we do assume the possibility of crucial intercept-resend attack based on errorless unambiguous state discrimination measurement. We demonstrate that Holevo bound always gives the highest mutual information between Alice and Eve regardless particular kind of isometry. As the main result we present the dependence of the extracted secret key length. As the example we implement the proposed analysis to the subcarrier wave quantum key distribution protocol.
In this work we propose the technique for phase-coded weak coherent states protocols utilizing two signal states and one decoy state which is found as linear combination of signal states (Schrodinger Cat states); the latter allows to overcome the USD attack. For instance, Schrodinger Cat states can be considered as even coherent states. Moreover we consider decoy states implementation based on squeezed vacuum states which might not disables USD completely yet produces discrimination probabilities low enough to distribute keys in channel with particular losses. Thus we can detect Eve simply by monitoring the detection rate of decoy states. It should be noted that this approach can be scaled to more complex schemes.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا