您的位置: 专家智库 > >

国家自然科学基金(s60921091)

作品数:3 被引量:6H指数:1
发文基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金更多>>
相关领域:理学电子电信更多>>

文献类型

  • 3篇中文期刊文章

领域

  • 3篇理学
  • 2篇电子电信

主题

  • 3篇QUANTU...
  • 2篇EXPERI...
  • 2篇METHOD
  • 2篇DEMONS...
  • 2篇PASSIV...
  • 1篇NGT
  • 1篇H-
  • 1篇LE
  • 1篇ADAPTI...
  • 1篇MULTIP...

传媒

  • 3篇Chines...

年份

  • 1篇2014
  • 2篇2012
3 条 记 录,以下是 1-3
排序方式:
Experimental demonstration of passive decoy state quantum key distribution
2012年
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty's theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss.
张阳王双银振强陈巍梁文烨李宏伟郭光灿韩正甫
Experimental demonstration of passive decoy state quantum key distribution
2012年
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty’s theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss.
张阳王双银振强陈巍梁文烨李宏伟郭光灿韩正甫
全文增补中
Fast implementation of length-adaptive privacy amplification in quantum key distribution被引量:6
2014年
Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.
张春梅李默黄靖正Patcharapong Treeviriyanupab李宏伟李芳毅王川银振强陈巍Keattisak Sripimanwat韩正甫
共1页<1>
聚类工具0