ترغب بنشر مسار تعليمي؟ اضغط هنا

Quantum Key Distribution without sending a Quantum Signal

59   0   0.0 ( 0 )
 نشر من قبل Timothy C. Ralph
 تاريخ النشر 2014
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. Whilst this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is considered we show it is possible to distribute an unconditionally secure secret key without sending a quantum signal, instead harnessing the intrinsic entanglement between different regions of space time. The protocol is practical in free space given horizon technology and might be testable in principle in the near term using microwave technology.

قيم البحث

اقرأ أيضاً

Twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD which has been demonstrated in the laboratory and field while their physical implementations with side channels remains to be furthe r researched. We find the external modulation of different intensity states through the test, required in those TF-QKD with post-phase compensation, shows a side channel in frequency domain. Based on this, we propose a complete and undetected eavesdropping attack, named passive frequency shift attack, on sending or not-sending (SNS) TF-QKD protocol given any difference between signal and decoy states in frequency domain which can be extended to other imperfections with distinguishable decoy states. We analyze this attack by giving the formula of upper bound of real secure key rate and comparing it with lower bound of secret key rate under Alice and Bobs estimation with the consideration of actively odd-parity pairing (AOPP) method and finite key effects. The simulation results show that Eve can get full information about the secret key bits without being detected at long distance. Our results emphasize the importance of practical security at source and might provide a valuable reference for the practical implementation of TF-QKD.
We study the sending-or-not-sending (SNS) protocol with discrete phase modulation of coherent states. We first make the security of the SNS protocol with discrete phase modulation. We then present analytic formulas for key rate calculation. We take n umerical simulations for the key rate through discrete phase modulation of both the original SNS protocol and the SNS protocol with two way classical communications of active-odd-parity pairing (AOPP). Our numerical simulation results show that only with $6$ phase values, the key rates of the SNS protocol can exceed the linear bound, and with $12$ phase values, the key rates are very close to the results of the SNS protocol with continuously modulated phase-randomization.
Twin field quantum key distribution promises high key rates at long distance to beat the rate distance limit. Here, applying the sending or not sending TF QKD protocol, we experimentally demonstrate a secure key distribution breaking the absolute key rate limit of repeaterless QKD over 509 km, 408 km ultra-low loss optical fibre and 350 km standard optical fibre. Two independent lasers are used as the source with remote frequency locking technique over 500 km fiber distance; Practical optical fibers are used as the optical path with appropriate noise filtering; And finite key effects are considered in the key rate analysis. The secure key rates obtained at different distances are more than 5 times higher than the conditional limit of repeaterless QKD, a bound value assuming the same detection loss in the comparison. The achieved secure key rate is also higher than that a traditional QKD protocol running with a perfect repeaterless QKD device and even if an infinite number of sent pulses. Our result shows that the protocol and technologies applied in this experiment enable TF QKD to achieve high secure key rate at long distribution distance, and hence practically useful for field implementation of intercity QKD.
209 - Hui Liu , Cong Jiang , Hao-Tao Zhu 2021
Quantum key distribution endows people with information-theoretical security in communications. Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because of its outstanding key rates over long distances. Recently, seve ral demonstrations of TF-QKD have been realized. Nevertheless, those experiments are implemented in the laboratory, remaining a critical question about whether the TF-QKD is feasible in real-world circumstances. Here, by adopting the sending-or-not-sending twin-field QKD (SNS-TF-QKD) with the method of actively odd parity pairing (AOPP), we demonstrate a field-test QKD over 428~km deployed commercial fiber and two users are physically separated by about 300~km in a straight line. To this end, we explicitly measure the relevant properties of the deployed fiber and develop a carefully designed system with high stability. The secure key rate we achieved breaks the absolute key rate limit of repeater-less QKD. The result provides a new distance record for the field test of both TF-QKD and all types of fiber-based QKD systems. Our work bridges the gap of QKD between laboratory demonstrations and practical applications, and paves the way for intercity QKD network with high-speed and measurement-device-independent security.
The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we show that switching is not required for coherent state continuous variable quantum key distribution. We show this via the no-switching protocol which results in higher information rates and a simpler experimental setup. We propose an optimal eavesdropping attack against this protocol, for individual Gaussian attacks, and we investigate and compare the no-switching protocol applied to the original BB84 scheme.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا