To improve the security of the smart grid, quantum key distribution(QKD) is an excellent choice. The rapid fluctuations on the power aerial optical cable and electromagnetic disturbance in substations are two main c...To improve the security of the smart grid, quantum key distribution(QKD) is an excellent choice. The rapid fluctuations on the power aerial optical cable and electromagnetic disturbance in substations are two main challenges for implementation of QKD. Due to insensitivity to birefringence of the channel, the stable phase-coding Faraday–Michelson QKD system is very practical in the smart grid. However, the electromagnetic disturbance in substations on this practical QKD system should be considered. The disturbance might change the rotation angle of the Faraday mirror, and would introduce an additional quantum bit error rate(QBER). We derive the new fringe visibility of the system and the additional QBER from the electromagnetic disturbance. In the worst case, the average additional QBER only increases about 0.17% due to the disturbance, which is relatively small to normal QBER values. We also find the way to degrade the electromagnetic disturbance on the QKD system.展开更多
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imper...Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.展开更多
Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is use...Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61101137,61201239,61205118,and 11304397)the National Basic Research Program of China(Grants No.2013CB338002)
文摘To improve the security of the smart grid, quantum key distribution(QKD) is an excellent choice. The rapid fluctuations on the power aerial optical cable and electromagnetic disturbance in substations are two main challenges for implementation of QKD. Due to insensitivity to birefringence of the channel, the stable phase-coding Faraday–Michelson QKD system is very practical in the smart grid. However, the electromagnetic disturbance in substations on this practical QKD system should be considered. The disturbance might change the rotation angle of the Faraday mirror, and would introduce an additional quantum bit error rate(QBER). We derive the new fringe visibility of the system and the additional QBER from the electromagnetic disturbance. In the worst case, the average additional QBER only increases about 0.17% due to the disturbance, which is relatively small to normal QBER values. We also find the way to degrade the electromagnetic disturbance on the QKD system.
基金Supported by the Chinese Academy of Sciences, the National Basic Research Program of China under Grants Nos 2011CBA00200 and 2011CB921200, the National Natural Science Foundation of China under Grants Nos 61101137 and 61201239, the Program for Zhejiang Leading Team of Science and Technology Innovation under Grant No 2012r10011-12, and the Special Foundation for Young Scientists of Zhejiang Province under Grant No LQ13F050005.
文摘Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
基金supported by the National Basic Research Program of China(Grant Nos.2011CBA00200 and 2011CB921200)the National Natural Science Foundation of China(Grant Nos.60921091 and 61101137)
文摘Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.