Method and device for generating decoy-state quantum light pulses

A technology of decoy state quantum and generation method, applied in the field of optics, can solve problems such as inability to apply to a variety of situations and lack of universal communication security

Active Publication Date: 2019-08-09
SOUTH CHINA NORMAL UNIVERSITY
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve these problems, although there are already some communication encryption methods or information processing methods, the current methods cannot be applied to many situations, so the current technical methods still have certain limitations and do not have the ability to be applied to a certain range. Ensure the universality of communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating decoy-state quantum light pulses
  • Method and device for generating decoy-state quantum light pulses
  • Method and device for generating decoy-state quantum light pulses

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Please see figure 1 , figure 1 A schematic flowchart of a method for generating a decoy state quantum light pulse is provided for the embodiment of the present application. Depend on figure 1 It can be seen that this method can be applied in the field of optical communication. Specifically, this method can output communication optical pulses with high confidentiality and high stability by setting the quantum light source activation information, so that the corresponding communication can be improved during the communication process. safety and stability. For example, this method can be applied to quantum key distribution to improve security and stability. Wherein, the generation method of the quantum light pulse includes:

[0049] S101. Acquire the start information of the quantum light source.

[0050] In this embodiment, the quantum light source activation information includes at least three parts: quantum light source parameters used to control light pulse outpu...

Embodiment 2

[0077] Please see figure 2 , figure 2 It is a schematic flowchart of another method for generating a decoy state quantum light pulse provided in the embodiment of the present application. figure 2 The flow diagram of the described method for generating the decoy-state quantum light pulse is based on figure 1 The schematic flow chart of the described decoy-state quantum optical pulse generation method is improved. Wherein, the protocol information used in the method for generating quantum light pulses may be COW protocol information, and the method may specifically include:

[0078] S201. Acquire the startup information of the quantum light source.

[0079] In this embodiment, the quantum light source activation information includes at least three parts: quantum light source parameters used to control light pulse output, decoy state information used to construct a decoy state, and attenuation value information used to control attenuation.

[0080] In this embodiment, the q...

Embodiment 3

[0117] Please see image 3 , image 3 It is a schematic flowchart of another method for generating a decoy state quantum light pulse provided in the embodiment of the present application. image 3 The flow diagram of the described method for generating the decoy-state quantum light pulse is based on figure 2 The schematic flow chart of the described decoy-state quantum optical pulse generation method is improved. Wherein, the protocol information used in the quantum optical pulse generation method may be BB84 protocol information, and the method may specifically include:

[0118] S301. Acquire the startup information of the quantum light source.

[0119] In this embodiment, the quantum light source activation information includes at least three parts: quantum light source parameters used to control laser output from the laser, decoy state information used to construct a decoy state, and attenuation value information used to control attenuation.

[0120] In this embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and device for generating decoy-state quantum light pulses, and relates to the technical field of optics, and the method comprises the steps: obtaining quantum light source starting information; determining decoy state information and attenuation value information according to the quantum light source starting information; outputting an initial optical pulse according to the decoy state information associated with the random number; attenuating the initial light pulse according to the attenuation value information to obtain a quantum light pulse, and outputting the quantum light pulse. By implementing the implementation mode, the universality and the stability of optical communication can be improved, and the limitation in the existing technical method is solved.

Description

technical field [0001] The present application relates to the field of optical technology, in particular, to a method and device for generating a decoy state quantum optical pulse. Background technique [0002] At present, with the continuous development of communication technology, the frequency of information exchange is becoming faster and faster. In this process, there may be eavesdroppers who steal or tamper with information, which makes information security issues widely known by most people. attach importance to. [0003] Based on the current communication technology background, optical communication, as a popular communication method, still has many security problems, and even many stability problems. In order to solve these problems, although there are already some communication encryption methods or information processing methods, the current methods cannot be applied to many situations, so the current technical methods still have certain limitations and do not ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04B10/70H04B10/524
CPCH04L9/0858H04B10/70H04B10/524
Inventor 王金东何昱霏
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products