Font Size: a A A

Researches On New Protocols Of The Quantum Key Distribution

Posted on:2017-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:F ZhuFull Text:PDF
GTID:2308330491951698Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Information security has drawn the attention from the countries all over the world, especially when “the prism door” event took place in 2013. The crucial point in existing information security problems is attributed to the fact that classical communication is based on the computational complexity. As long as the quantum computer comes into being, all the classical cryptography will fall apart. In order to solve this problem, physicists have invented a novel method, i.e., quantum communication. Its security is based on the laws of quantum physics, and its unconditional security has been strictly proven. Therefore, it has attracted extensive attention from the scientific world.In this paper, the author firstly introduces three kinds of technologies on quantum communication and discusses the advantages of them individually. Secondly, the author briefly reviews the development and status of quantum communication in both experiment and theory. Thirdly, the author shows several typical protocols on the quantum key distribution and existing attacks on present quantum key distribution system. After introducting some background and basic theory, the author focuses the attention on describing four new proposed schemes on the quantum key distribution.1) A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light2) Improving the performance of the measurement-device-independent quantum key distribution with two-intensity weak coherent light3) Quantum key distribution protocol based on heralded single photon source4) Enchancing the performance of the quantum key distribution with heralded pair-coherent sources.The four new schemes are mainly addressed with the following steps: First, the experimental schematic diagram for each scheme; Second, theoretical derivations and corresponding numerical simulations; Third, advantages of each scheme in either the key generation rate or the transmission distance when compared with other exsiting proposals on quantum key distributions.
Keywords/Search Tags:quantum key distribution, decoy-state, BB84, measurement-device-independent
PDF Full Text Request
Related items