Passive light source monitoring method suitable for twin-field protocol

A passive, light source technology, applied in the field of quantum key distribution system transmission system, to achieve the effect of excellent performance

Active Publication Date: 2021-08-24
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although both the MDI-QKD and TF-QKD protocols can be immune to the potential safety hazards of the QKD system at the detection end, in most existing QKD protocols, it is genera

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Passive light source monitoring method suitable for twin-field protocol
  • Passive light source monitoring method suitable for twin-field protocol
  • Passive light source monitoring method suitable for twin-field protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0058] refer to figure 1 , the present invention provides a passive light source monitoring method suitable for a dual-field protocol, suitable for a dual-field quantum key distribution transmission system, the transmission system includes Alice, Bob, and Charlie three users, Alice, Bob as the sending end, Charlie acts as the receiver.

[0059] (1) Alice / Bob do some preparatory work before sending the pulse: in any time window i, Alice and Bob are going to pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a passive light source monitoring method suitable for a twin-field protocol. The method comprises the following steps: acquiring signal light and idle light obtained by splitting a light pulse subjected to intensity modulation; dividing the idle light into two light beams, detecting the two light beams, and obtaining four different counting events according to a detection result; estimating the parameters of the signal light through four different counting events so as to obtain a safe coding rate under a untrusted light source. Parameters of devices in a light source monitoring module do not need to be adjusted, the experiment difficulty is reduced, and safety reduction caused by modulation errors is avoided. The method is introduced by taking a twin-field quantum key distribution protocol as an example, is not only limited to be applied to a quantum key distribution process of the twin-field protocol, but also is suitable for quantum key distribution and quantum communication processes involving an untrusted light source, such as a BB84 protocol and a measurement equipment irrelevant protocol.

Description

technical field [0001] The invention relates to the technical field of a quantum key distribution system transmission system of an untrustworthy light source, in particular to a passive light source monitoring method suitable for a double-field quantum key distribution protocol. Background technique [0002] Over the years, Quantum Key Distribution (Quantum Key Distribution, QKD) has developed step by step in the game of attack methods and attack prevention schemes, but whether it is the original BB84 protocol or the later measurement device-independent In the Device Independent QKD (MDI-QKD) protocol, the coding rate is always limited by the transmission efficiency of the channel, resulting in a linear relationship between the transmission distance and the transmission efficiency. In 2018, the twin-field quantum key distribution (Twin-Field QKD, TF-QKD) proposed by Lucamarini et al. finally broke this boundary, and the TF-QKD protocol does not require the use of quantum rep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04B10/077H04B10/54H04B10/70H04L9/08
CPCH04B10/077H04L9/0852H04B10/70H04B10/54
Inventor 远华伟马啸王琴张春辉
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products