Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Orbital angular momentum key distribution method based on odd coherent light source and quantum storage

An orbital angular momentum and key distribution technology, applied in the field of quantum key distribution, can solve the problem of low security key generation rate, and achieve the effect of increasing the maximum transmission distance, reducing the bit error rate, and being easy to implement.

Inactive Publication Date: 2019-12-20
XIAN UNIV OF POSTS & TELECOMM
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The object of the present invention is to provide a method for key distribution of orbital angular momentum based on odd coherent light source and quantum storage, in order to solve the problem of low security key generation rate in the key distribution method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Orbital angular momentum key distribution method based on odd coherent light source and quantum storage
  • Orbital angular momentum key distribution method based on odd coherent light source and quantum storage
  • Orbital angular momentum key distribution method based on odd coherent light source and quantum storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] In this embodiment, an OAM key distribution method based on odd coherent light sources and quantum storage is disclosed, which is used to enable both Alice and Bob to obtain a shared key.

[0054] In the present invention, there is a certain distance between Alice and Bob as two communicating parties.

[0055] Such as figure 2 Shown, the present invention carries out according to the following steps:

[0056] Step 1. Alice and Bob use their odd coherent light sources to prepare coherent light pulses respectively;

[0057] In this step, Alice uses odd coherent light source A to prepare coherent light pulses, and Alice obtains her own coherent light pulses; at the same time, Bob uses odd coherent light source B to prepare coherent light pulses, and Bob obtains his own coherent light pulses; odd coherent light source A and odd coherent light pulses The parameters of the coherent light source B are the same, and the coherent light pulse obtained by Alice is also the same...

Embodiment 2

[0082] In this example, the effectiveness of the method provided by the present invention is verified.

[0083] The calculation formula of the key generation rate of the method provided by the invention is as follows:

[0084]

[0085] 1 / of which Raw key generation rate for unfiltered:

[0086]

[0087] In formula (3), R s The frequency at which laser pulses are fired for Alice and Bob; P BSM Probability of success when performing BSM measurements for third parties; P 0 is the probability that the photon state sent by Alice and Bob can successfully reach the third party and be stored in the quantum memory, which is related to the channel transmission distance L. P BSM The expression of is as follows:

[0088]

[0089] P in formula (4) D refers to the dark count rate; record η MD = η M n D , where η M is the quantum storage efficiency, η D is the detector efficiency.

[0090] In formula (2), The gain of sending a single photon sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an orbital angular momentum key distribution method based on an odd coherent light source and quantum storage. An odd coherent light source is used for replacing a weak coherent light source, the number of single photons in sent pulses is increased, the number of multiple photons is reduced, and therefore the safety key generation rate of measurement equipment irrelevant quantum key distribution is increased, and the bit error rate is reduced. According to the method, orbital angular momentum coding is used for replacing polarization coding, the dependency problem of bases in quantum key distribution is solved, the security key generation rate is further increased, and the bit error rate is reduced; by adding the quantum storage unit, the secure transmission distance of the OAM-MDI-QKD protocol is significantly increased, and the key generation rate and the secure transmission distance are improved. According to the invention, long-distance QKD without quantum relay can be realized only by using single-mode quantum storage, and the coherence time required by a quantum memory in the protocol is shorter than the coherence time required by a quantum relay protocol.

Description

technical field [0001] The invention relates to a quantum key distribution method, in particular to an orbital angular momentum key distribution method based on an odd coherent light source and quantum storage. Background technique [0002] The security of Quantum Key Distribution (QKD) is based on the basic principles of quantum mechanics, combined with the "one-time pad" cryptosystem, it can realize unconditionally secure confidential communication. Therefore, it has received widespread attention as a new information protection technology. However, the optical and electrical devices used to establish the actual QKD system may have non-ideal characteristics that do not meet the theoretical requirements, and it is easy for attackers to manipulate non-ideal light sources and detection devices to attack the implementation process of the QKD protocol. For example, photon number splitting attack and partial phase randomization attack against the non-ideal characteristics of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04B10/70
CPCH04L9/0819H04L9/0858H04L9/0855H04L9/0869H04B10/70
Inventor 何业锋李东琪郭佳瑞
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products