Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic *** ...
详细信息
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic *** alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in *** this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon *** only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical ***,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources.
In this paper we consider a two-way relaying system, where two users A and B wish to exchange information with the help of a common relay R., To decode the superimposed signal from A and B efficiently, we propose a ne...
详细信息
Atmospheric turbulence(AT) induced crosstalk can significantly impair the performance of a free-space optical(FSO)communication link using orbital angular momentum(OAM) *** this paper,we propose a multiple-user ...
详细信息
Atmospheric turbulence(AT) induced crosstalk can significantly impair the performance of a free-space optical(FSO)communication link using orbital angular momentum(OAM) *** this paper,we propose a multiple-user detection(MUD) turbulence mitigation scheme in an OAM-multiplexed FSO communication ***,we present a MUD equivalent communication model for an OAM-multiplexed FSO communication link under *** the equivalent model,each input bit stream represents one user's *** deformed OAM spatial modes caused by AT,instead of the pure OAM spatial modes,are used as information carriers,and the overlapping between the deformed OAM spatial modes are computed as the correlation coefficients between the ***,we present a turbulence mitigation scheme based on MUD idea to enhance AT tolerance of the OAM-multiplexed FSO communication *** the proposed scheme,the crosstalk caused by AT is used as a useful component to deduce users' *** numerical results show that the performance of the OAM-multiplexed communication link has greatly improved by the proposed *** the turbulence strength C_n^2 is 1 × 10^(-15) m^(-2/3),the transmission distance is 1000 m and the channel signal-to-noise ratio(SNR)is 26 dB,the bit-error-rate(BER) performance of four spatial multiplexed OAM modes l_m = + 1,+2,+3,+4 are all close to 10-5,and there is a 2-3 fold increase in the BER performance in comparison with those results without the proposed *** addition,the proposed scheme is more effective for an OAM-multiplexed FSO communication link with a larger OAM mode topological charge *** proposed scheme is a promising direction for compensating the interference caused by AT in the OAM-multiplexed FSO communication link.
The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduc...
详细信息
The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduction to network virtualization techniques is given then and a virtual node embedding approach is ***,three kinds of enhanced green networking schemes by network virtualization are proposed,that is enhancement to sever virtualization,resource consolidation and Adaptive Link Rate(ALR).Examples are included to show the virtue of network virtualization to green networking in terms of energy efficient communications.
In this paper, we revisit the problem of target detection in wirelesssensornetworks (WSNs). Because that the practical environment of WSNs is very complex, and usually the target signal is mixed with a lot of random...
详细信息
We describe a high efcient entanglement concentration protocol(ECP)for multi-particle less-entangled nitrogen-vacancy(N-V)center and microtoroidal resonator *** the ECP,we only require one pair of less-entangled state...
详细信息
We describe a high efcient entanglement concentration protocol(ECP)for multi-particle less-entangled nitrogen-vacancy(N-V)center and microtoroidal resonator *** the ECP,we only require one pair of less-entangled state,two auxiliary N-V center in microcavities and some single *** the photon passing through the microcavity,by measuring the polarization of the photon,a maximally entangled W state can be obtained with some success *** ECP does not need to destroy the solid qubit,which makes it more ***,by resorting to more single photons,it can be repeated to reach a high success *** features make this ECP useful in current long-distance quantum communications.
In this paper, a new method for two-dimensional (2-D) direction-of-arrival (DOA) estimation is proposed. We first reconstruct the covariance matrix of the coarray with block-Toeplitz structure and then retrieve the DO...
详细信息
The hybrid entangled state is widely discussed in quantum information processing. In this paper, we propose the first protocol to directly measure the concurrence of the hybrid entangled state. To complete the measure...
详细信息
The hybrid entangled state is widely discussed in quantum information processing. In this paper, we propose the first protocol to directly measure the concurrence of the hybrid entangled state. To complete the measurement, we design parity check measurements(PCMs) for both the single polarization qubit and the coherent state. In this protocol, we perform three rounds of PCMs. The results show that we can convert the concurrence into the success probability of picking up the correct states from the initial entangled states. This protocol only uses polarization beam splitters, beam splitters, and weak cross-Kerr nonlinearities, which is feasible for future experiments. This protocol may be useful in future quantum information processing.
Reference-frame-independent quantum key distribution (RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the perfo...
详细信息
Reference-frame-independent quantum key distribution (RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performance of decoy-state RFI QKD with both source errors and statistical fluctuations is still missing until now. In this paper, we investigate the performance of decoy-state RFI QKD in practical scenarios with two kinds of light sources, the heralded single photon source (HSPS) and the weak coherent source (WCS), and also give clear comparison results of decoy-state RFI QKD with WCS and HSPS. Simulation results show that the secret key rates of decoy-state RFI QKD with WCS are higher than those with HSPS in short distance range, but the secret key rates of RFI QKD with HSPS outperform those with WCS in long distance range.
This work conducts the secrecy analysis of full-duplex power-splitting simultaneous wireless information and power transfer networks with artificial noise. The exact closed-form expressions of the COP, SOP and RSP are...
详细信息
ISBN:
(纸本)9789811136719
This work conducts the secrecy analysis of full-duplex power-splitting simultaneous wireless information and power transfer networks with artificial noise. The exact closed-form expressions of the COP, SOP and RSP are derived, respectively, which are illustrated by numerical analysis. The results depict the significance of the power-splitting ratio and the transmit signal-to-noise ratio (SNR). To be specific, the secrecy performance is greatly improved with the increasing of the power-splitting ratio. In addition, it is observed that the security of the system will get enhanced with the increasing of the power-splitting ratio at first and then get reversed for a certain transmit SNR. Moreover, the value of the optimum transmit SNR changes with different transmit SNR.
暂无评论