Quantum key distribution (QKD) technology provides proven unconditional point-to-point security based on fundamental quantum physics. A QKD network also holds promise for secure multi-user communications over long d...Quantum key distribution (QKD) technology provides proven unconditional point-to-point security based on fundamental quantum physics. A QKD network also holds promise for secure multi-user communications over long distances at high-speed transmission rates. Although many schemes have been proposed so far, the trusted relay QKD network is still the most practical and flexible scenario. In reality, the insecurity of certain relay sections cannot be ignored, so to solve the fatal security problems of partially-trusted relay networks we suggest a multiple stochastic paths scheme. Its features are: (i) a safe probability model that may be more practical for real applications; (ii) a multi-path scheme with an upper bound for the overall safe probability; (iii) an adaptive stochastic routing algorithm to generate sufficient different paths and hidden routes. Simulation results for a typical partially-trusted relay QKD network show that this generalized scheme is effective.展开更多
This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of...This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of the QKD system. Furthermore, it proposes a key buffering policy which could effectively improve the delay performance in practice. The results will be helpful for quality of service in practical QKD systems.展开更多
The reversible transfer of unknown quantum states between light and matter is essential for constructing large-scale quantum networks. Over the last decade, various physical systems have been proposed to realize such ...The reversible transfer of unknown quantum states between light and matter is essential for constructing large-scale quantum networks. Over the last decade, various physical systems have been proposed to realize such quantum memory for light. The solid-state quantum memory based on rare-earth-ion-doped solids has the advantages of a reduced setup complexity and high robustness for scalable application. We describe the methods used to spectrally prepare the quantum memory and release the photonic excitation on-demand. We will review the state of the art experiments and discuss the perspective applications of this particular system in both quantum information science and fundamental tests of quantum physics.展开更多
As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data e...As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pa^t eucryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.展开更多
We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary dete...We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme.展开更多
基金Supported by the National Fundamental Research Program of China (Grant No. 2006CB921900)the National Natural Science Foundation of China (Grant Nos. 60537020 and 60621064)+1 种基金the Knowledge Innovation Project of the Chinese Academy of Sciencesthe Chinese Academy of Sciences International Partnership Project
文摘Quantum key distribution (QKD) technology provides proven unconditional point-to-point security based on fundamental quantum physics. A QKD network also holds promise for secure multi-user communications over long distances at high-speed transmission rates. Although many schemes have been proposed so far, the trusted relay QKD network is still the most practical and flexible scenario. In reality, the insecurity of certain relay sections cannot be ignored, so to solve the fatal security problems of partially-trusted relay networks we suggest a multiple stochastic paths scheme. Its features are: (i) a safe probability model that may be more practical for real applications; (ii) a multi-path scheme with an upper bound for the overall safe probability; (iii) an adaptive stochastic routing algorithm to generate sufficient different paths and hidden routes. Simulation results for a typical partially-trusted relay QKD network show that this generalized scheme is effective.
基金Project supported by National Fundamental Research Program of China (Grant No 2006CB921900)National Natural Science Foundation of China (Grant Nos 60537020 and 60621064)Knowledge Innovation Project of Chinese Academy of Sciences
文摘This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of the QKD system. Furthermore, it proposes a key buffering policy which could effectively improve the delay performance in practice. The results will be helpful for quality of service in practical QKD systems.
基金Project supported by the National Key Research and Development Program of China(Grant No.2017YFA0304100)the National Natural Science Foundation of China(Grant Nos.61327901,11774331,11774335,11504362,11325419,and 11654002)+1 种基金the Key Research Program of Frontier Sciences,Chinese Academy of Sciences(Grant No.QYZDY-SSW-SLH003)the Fundamental Research Funds for the Central Universities,China(Grant Nos.WK2470000023 and WK2470000026)
文摘The reversible transfer of unknown quantum states between light and matter is essential for constructing large-scale quantum networks. Over the last decade, various physical systems have been proposed to realize such quantum memory for light. The solid-state quantum memory based on rare-earth-ion-doped solids has the advantages of a reduced setup complexity and high robustness for scalable application. We describe the methods used to spectrally prepare the quantum memory and release the photonic excitation on-demand. We will review the state of the art experiments and discuss the perspective applications of this particular system in both quantum information science and fundamental tests of quantum physics.
基金Project supported by the National Natural Science Foundation of China (Grant No.60872052)
文摘As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pa^t eucryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.
基金Project supported by the National Natural Science Foundation of China(Grant No.61178010)the Fundamental Research Funds for the Central Universities(Grant No.bupt 2014TS01)+1 种基金the Fund of the State Key Laboratory of Information Photonics and Optical Communications(Grant No.201318)(Beijing University of Posts and Telecommunications)the National Program for Basic Research of China(Grant No.2010CB923202)
文摘We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme.