Real-time bit synchronization correction method for quantum key generation system
A technology for generating system and quantum keys, which is applied in the field of quantum communication, can solve problems such as the decrease of the detection count at the receiving end and the decrease of the security key generation rate, so as to improve efficiency, increase the rate of security key generation, and increase the effective working time Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0077] [Example 1]
[0078] Step 101: The bit synchronization processing unit continuously reads the real-time count value of the detector and its corresponding real-time delay value of the detector, and obtains the relationship between the delay efficiency of the detector, the maximum count value per unit time of the detector and the corresponding optimal delay value. Time value.
[0079] Detector count accumulation time T i Count value of detector unit time according to current unit time current_det_cnt i The specific method is as follows:
[0080] When current_det_cnt i Less than N i,1 Per second, the effective cumulative time of detector counting S i Set to S i,1 ;
[0081] current_det_cnt i Greater than N i,2 Pcs / sec, the effective cumulative time of detector counting T i Set to S i,2 ;
[0082] current_det_cnt i Not less than N i,1 Per second, and current_det_cnt i Not more than N i,2 Per second, the effective cumulative time of detector counting S i Set as;
[0083]
[0084] Abov...
Example Embodiment
[0120] [Example 2]
[0121] Step 201 is the same as step 101
[0122] Step 202 is the same as step 102
[0123] Step 203: The bit synchronization unit calculates the bit synchronization delay search range of each detector and the required search delay value.
[0124] The bit synchronization delay search range of the i-th detector Range i It is set according to the response characteristics of the detector. Usually the detection efficiency of a certain detector is related to its detection time as figure 2 As shown, the vertical axis data has been normalized to the detector's maximum count det_cnt max , Then the bit synchronization delay search range Rangei of the i-th detector is calculated as follows:
[0125] Range i =ΔT i ×γi
[0126] In the formula, ΔT i for figure 2 The delay difference between the two delay values corresponding to the lowest threshold set by the i-th detector, γ i A certain value set artificially.
[0127] Under normal circumstances, the detector should work at ...
Example Embodiment
[0140] [Example 3]
[0141] Step 301 is the same as step 101.
[0142] Step 302 is the same as step 102.
[0143] Step 303: Calculate the bit synchronization delay search range of each detector and the required search delay value.
[0144] The bit synchronization delay search range of the i-th detector Range i It is set according to the response characteristics of the detector. Usually the detection efficiency of a certain detector is related to its detection time as figure 2 As shown, the vertical axis data has been normalized to the detector's maximum count det_cnt max , Then the bit synchronization delay search range of the i-th detector is Range i Is calculated as follows:
[0145] Range i =ΔT i ×γ i
[0146] In the formula, ΔT i for figure 2 The delay difference between the two delay values corresponding to the lowest threshold set by the i-th detector, γ i A certain value set artificially.
[0147] Under normal circumstances, the detector should work at figure 2 The peak in t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap