,Passive decoy-state quantum key distribution using weak coherent pulses with modulator attenuation

来源 :Chinese Physics B | 被引量 : 0次 | 上传用户:blanknan
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. We introduce and analyze the unbalanced Mach–Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modulator attenuation. According to the attenuation parameter δ, the pass efficiencies are given. Then,the key generation rate can be acquired. From numerical simulations, it can be seen that modulator attenuation has a nonnegligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation. Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. and analyze the unbalanced Mach-Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modular attenuation. According to the attenuation parameter δ, the pass efficiencies From numerical simulations, it can be seen that modulator attenuation has a nonnegligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation.
其他文献
建水县4000亩再生稻高产攻关田亩产370千克建水县农业局654300罗维贤再生稻是建水县发展粮食生产的一条重要途径。近两年,蓄养面积已达7万余亩,但产量不高,为了探索总结再生稻的高产经验,1994年建水
该论文选择小金海棠为研究材料,利用现代分子生物学技术,计划将研究的重点放在小金海棠种的遗传基础、与抗逆性相关基因的分离克隆和通过转基因技术对克隆的基因进行功能验证
由国电自动化研究院承担的“750 kV变电站综合自动化系统”、“750 kV继电保护装置研制”等国家重大技术装备研制课题日前在江苏省南京市通过了国家电网公司主持的“十五”国
以油(木奈)果实为材料,初步研究了不同贮藏温度和不同药剂处理(CEPA、ABA、GA、Spd、Ca)下果实采后品质成分、呼吸强度、内源激素(Eth、ABA、GA)、多胺、脂氧合酶及保护酶等