Measurement-device-independent quantum cryptographic conferencing with an untrusted source

来源 :Chinese Physics B | 被引量 : 0次 | 上传用户:zddlcp05030613
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical multi-party quantum communication. In order to mitigate the experimental complexity of MDI-QCC and remove the key assumption(the sources are trusted) in MDI-QCC, we extend the framework of MDI-QKD with an untrusted source to MDI-QCC and give the rigorous security analysis of MDI-QCC with an untrusted source. What is more, in the security analysis we clearly provide a rigorous analytical method for parameters’ estimation, which with simple modifications can be applied to not only MDI-QKD with an untrusted source but also arbitrary multi-party communication protocol with an untrusted source. The simulation results show that at reasonable distances the asymptotic key rates for the two cases(with trusted and untrusted sources) almost overlap, which indicates the feasibility of our protocol. Measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol puts MDI quantum key distribution (MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical multi-party quantum communication. complexity of MDI-QCC and remove the key assumption (the sources are trusted) in MDI-QCC, we extend the framework of MDI-QKD with an untrusted source to MDI-QCC and give the rigorous security analysis of MDI-QCC with an untrusted source. What is more, in the security analysis we clearly provide a rigorous analytical method for parameters’ estimation, which with simple modifications can be applied to not only MDI-QKD with an untrusted source but also arbitrary multi-party communication protocol with an untrusted source. The simulation results show that at reasonable distances the asymptotic key rates for the two cases (with trusted and untrusted sources) almost overlap, which indicates the feasibility of our protocol.
其他文献
移动电话企业在以超常速度发展量的同时,质的矛盾显得越来越突出,量质并重的问题已成为通信主管部门和移动通信企业最关心的话题,特别是中国从80年代中期发展移动电话至今不
该论文应用产权理论、契约理论、代理理论、"内部人控制"理论以及管理学、组织行为学等理论,并借鉴国外政府对国有企业的管理模式和有关的实际经验对这一问题进行系统的研究,
该文以中煤建设集团为例,分析了国有企业的现状和改制遇到的表层和深层问题,探讨了国有企业改制的必要性和可行性,提出了通过建立现代企业制度、进行公司制改造、促进企业存
该文在归纳、分析传统人力资源会计计量模式的基础上,对其进行了评价.提出了用布莱克——舒尔茨期权定价模型对高层经理价值进行计量.分析了非货币性计量的意义,应用层次分析
该论文来源于胜利石油管理局资助的横向协作项目"桩西地区措施井经济评价及措施方案优化".该论文介绍了决策支持系统的发展状况,在此基础上,结合胜利油田桩西采油厂的实际,通
该文的主要内容包括两大部分,即虚拟企业的研究和虚拟企业网络系统实现.从分析虚拟企业的产生入手,在总结前人的研究成果的同时,提出了三方面虚拟企业产生和发展的原因.由于
河南西部的红土丘陵地区适宜烤烟生产,是河南省的五大烟区之一。由于该区特定的气候条件,使移栽期的确定,在烤烟生产中具有相当重要的意义。本文从气象角度,为移栽期的确定
论文从质量管理的一般理论入手,探讨了软件质量管理的概念、方法,以及在软件开发过程质量管理实践中的应用.论文的主要框架是:第一章介绍了雠的研究背景和意义.第二章论述了
小麦叶龄指标促控法就是“看叶管麦法”。通过小麦主茎上的叶片,了解植株内部器官的建成情况,有针对性的采用适宜的促控措施,进行施肥、浇水等管理,以提高产量。实践证明,小
该文简单介绍了跨国兼并的现状、经济评价的理论和项目不确定性分析的方法,突出了石油跨国兼并项目的经济评价要求,而后,以CNPC跨国兼并项目——阿克纠宾项目为案例,对其进行