Font Size: a A A

Research On New Schemes Of The Quantum Cryptography

Posted on:2018-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:J WeiFull Text:PDF
GTID:2348330536479762Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Security Communication has always been a hot topic for scientists in various countries,especially in the military.The security of traditional secure communications is based on mathematical complexit,however,with the emergence of quantum computers,the traditional secret communication can not be secure as before.In view of the emergence of quantum computers,quantum secure communication technology was proposed.At present,the most widely used quantum secret communication is quantum key distribution,the security of quantum key distribution is based on the laws of quantum mechanics,which has been proved.Up to today,people have achieved great progress in quantum key distribution both theoretically and experimentally.In this paper,we first introduce the research background,significance and characteristics of quantum secure communication,then the basic types and physical security are introduced,and we also introduce the development of quantum secret communication.After introducing the basics of quantum secure communication,we begin to introduce the quantum key distribution protocol,especially the decoy state quantum key distribution protocol.Due to the shortcomings of traditional three-intensity decoy state scheme,we propose a new passive decoy-state quantum key distribution scheme which uses thermal distributed parametric down-conversion source.In this scheme,we first introduce the scheme on generating the passive photon source.Then we implement the passive photon source into BB84 protocol.Finally,we carry out corresponding numerical simulations of our new scheme and traditional three-intensity decoy state scheme.In this paper,another new scheme,a passive decoy-state quantum key distribution with SARG04 protocol has been proposed.Firstly,we carry out the conventional three-intensity decoy-state scheme with source errors,and use SARG04 protocol as an example to analyze the influences of source errors.Then we calculate the important parameters of the passive decoy state scheme,and give the calculation formula of key generation rate.Finally,we compare the numerical simulations between our new passive decoy state scheme and conventional three-intensity decoy-state scheme with source errors.
Keywords/Search Tags:quantum key distribution, decoy state, passive, key generation rate
PDF Full Text Request
Related items