Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 理學院
  3. 物理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74251
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor管希聖
dc.contributor.authorYao-Ting Linen
dc.contributor.author林耀廷zh_TW
dc.date.accessioned2021-06-17T08:26:20Z-
dc.date.available2019-08-20
dc.date.copyright2019-08-20
dc.date.issued2019
dc.date.submitted2019-08-12
dc.identifier.citationD. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill, in International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings. (IEEE, 2004), p.136.
D. Mayers, Journal of the ACM (JACM) 48, 351 (2001).
M. Koashi, New Journal of Physics 11, 045018 (2009).
R. Renner, International Journal of Quantum Information 6, 1 (2008).
C. H. Bennett, D. P. DiVincenzo, J. A. Smolin, and W. K. Wootters, Physical Review A 54, 3824 (1996).
H.-K. Lo and H. F. Chau, science 283, 2050 (1999).
M. Tomamichel, C. Schaffner, A. Smith, and R. Renner, IEEE Transactions on Information Theory 57, 5524 (2011).
P. W. Shor and J. Preskill, Physical review letters 85, 441 (2000).
M. Ben-Or, M. Horodecki, D. W. Leung, D. Mayers, and J.Oppenheim, in Theory of Cryptography Conference (Springer, 2005), pp. 386–406.
C. Portmann and R. Renner, arXiv preprint arXiv:1409.3525 (2014).
X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, Physical Review A 72, 012326 (2005).
I. Devetak and A. Winter, Proceedings of the Royal Society A: Mathematical, Physical and engineering sciences 461, 207 (2005).
S. Pironio, A. Acin, N. Brunner, N. Gisin, S. Massar, and V. Scarani, New Journal of Physics 11, 045021 (2009).
U. Vazirani and T. Vidick, Communications of the ACM 62, 133 (2019).
H.-K. Lo, M. Curty, and B. Qi, Physical review letters 108, 130503 (2012).
E. Biham, B. Huttner, and T. Mor, Physical Review A 54, 2651 (1996).
S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, Nature communications 8, 15043 (2017).
M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, Nature 557, 400 (2018).
L.-M. Duan, M. Lukin, J. I. Cirac, and P. Zoller, Nature 414, 413 (2001).
X. Ma and M. Razavi, Physical Review A 86, 062319 (2012).
X. Ma, P. Zeng, and H. Zhou, Physical Review X 8,031043 (2018).
X.-B. Wang, Z.-W. Yu, and X.-L. Hu, Physical Review A 98, 062323 (2018).
H. Xu, Z.-W. Yu, C. Jiang, X.-L. Hu, and X.-B. Wang, arXiv e-prints arXiv:1904.06331 (2019), 1904.06331.
Z.-W. Yu, X.-L. Hu, C. Jiang, H. Xu, and X.-B. Wang, Scientific reports 9, 3080 (2019).
C. Cui, Z.-Q. Yin, R. Wang, W. Chen, S. Wang, G.-C. Guo, and Z.-F. Han, Physical Review Applied 11, 034053 (2019).
H.-L. Yin and Y. Fu, Scientific reports 9, 3045 (2019)
K. Tamaki, H.-K. Lo, C.-H. F. Fung, and B. Qi, Physical Review A 85, 042307 (2012).
K. Inoue, E. Waks, and Y. Yamamoto, Physical review letters 89, 037902 (2002).
D. Stucki, N. Brunner, N. Gisin, V. Scarani, and H.Zbinden, Applied Physics Letters 87, 194108 (2005).
K. Wen, K. Tamaki, and Y. Yamamoto, Physical review letters 103, 170503 (2009).
M. Minder, M. Pittaluga, G. Roberts, M. Lucamarini, J. Dynes, Z. Yuan, and A. Shields, Nature Photonics p. 1 (2019).
C. C. W. Lim, M. Curty, N. Walenta, F. Xu, and H. Zbinden, Physical Review A 89, 022307 (2014).
W. Hoeffding, in The Collected Works of Wassily Hoeffding (Springer, 1994), pp. 409–426.
C.-H. F. Fung, X. Ma, and H. Chau, Physical Review A 81, 012318 (2010).
C.-K. Hong, Z.-Y. Ou, and L. Mandel, Physical review letters 59, 2044 (1987).
A. Boaron, G. Boso, D. Rusca, C. Vulliez, C. Autebert, M. Caloz, M. Perrenoud, G. Gras, F. Bussi`eres, M.-J. Li, et al., Physical review letters 121, 190502 (2018).
H.-K. Lo, H. F. Chau, and M. Ardehali, Journal of Cryptology 18, 133 (2005).
A. Vitanov, F. Dupuis, M. Tomamichel, and R. Renner, IEEE Transactions on Information Theory 59, 2603 (2013).
M. Tomamichel and R. Renner, Physical review letters 106, 110506 (2011).
M. Tomamichel, C. C. W. Lim, N. Gisin, and R. Renner, Nature communications 3, 634 (2012).
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74251-
dc.description.abstract近期,一種全新的量子密鑰分發協議:雙場協議 (TFQKD protocol) 被提出,並宣稱其可以密鑰分發速率可以打破在沒有量子中繼器下量子通訊通道容量的上界。在此協議提出後不久,便引發了熱烈的關注。
在這篇論文中,我們首先檢視了現存的協議方案,並與雙場協議比較,探討各協議所使用的原理。此外,我們整理了近期相關的研究論文,在各種被提出的雙場協議中,大致可分為兩類:相位匹配型 (PM) 協議、送-不送型 (SNS) 協議。我們分別回顧協議裡的安全性證明,並模擬了在不同情況下兩種協議的密鑰分發速率,比較兩者的優劣。
為了探討在實作上的可行性,我們也討論了在有限筆資料數量下,協議中各數值受統計波動的影響。最後,結果顯示在現今的設備及科技下,雙場協議仍然可以超越無中繼器的通道容量上界。
zh_TW
dc.description.abstractRecently, a new protocol, the twin-field QKD (TFQKD) protocol, has been proposed and is claimed to overcome the fundamental limits of quantum repeater-less communications. Soon after its appearance, the related research has gained lot of focus. In this thesis, we first review the existing protocol and make a comparison between them and the TFQKD protocol. Furthermore, we classify recent papers related to the TFQKD protocols into two main types: the phase-matching-type (PM) protocol and the sending-or-not-sending-type (SNS) protocol. We review the arguments for the security and simulate the key rate versus distance for both types of protocols under different conditions. Then we compare their performances between the two types of protocols. To investigate the feasibility for practical implementation, we also discuss the finite-size effect for the post-processing block size. The results show both protocols are capable of overcoming the repeater-less bound with current devices and technology.en
dc.description.provenanceMade available in DSpace on 2021-06-17T08:26:20Z (GMT). No. of bitstreams: 1
ntu-108-R06222042-1.pdf: 6671695 bytes, checksum: 00f227260c301bf640680805ae8034ff (MD5)
Previous issue date: 2019
en
dc.description.tableofcontentsAcknowledgments I
摘要 II
Abstract III
List of Figures VI
List of Tables IX
1 Introduction 1
2 Practical QKD 4
2.1 Security of perfect device QKD . . . . . . . . . . . . . . . . . . . . . 5
2.2 Entanglement distillation protocol . . . . . . . . . . . . . . . . . . . . 6
2.3 Security of imperfect device QKD . . . . . . . . . . . . . . . . . . . . 8
2.4 Decoy-state method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.5 Measurement device independent QKD . . . . . . . . . . . . . . . . . 12
3 Twin Field QKD 14
3.1 The PLOB bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2 Several protocols of TFQKD . . . . . . . . . . . . . . . . . . . . . . . 15
3.3 Comparison between other protocols . . . . . . . . . . . . . . . . . . 16
4 Phase-Matching-type QKD 19
4.1 Phase-matching-type TFQKD . . . . . . . . . . . . . . . . . . . . . . 19
4.2 Security of phase-matching-type TFQKD . . . . . . . . . . . . . . . . 20
4.3 Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.4 Finite-key analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
5 Sending-or-Not-Sending-type QKD 43
5.1 SNSQKD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
5.2 Entanglement swapping revisited . . . . . . . . . . . . . . . . . . . . 45
5.3 Security of SNSQKD . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5.4 Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
5.5 Finite-key analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
6 Conclusion 61
Bibliography 63
A Beam Splitter Input-Output Relations 66
B Proof of Eq. (4.14) 69
C Finite-Key Analysis 71
D Decoy-state method for SNSQKD 74
D.1 The model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
D.2 The lower bound for single-photon yield . . . . . . . . . . . . . . . . 75
D.3 A proof of Eq.(D.8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
E Optimized parameters of the key rates versus distance 78
dc.language.isoen
dc.title雙場量子密鑰分發協議之研究zh_TW
dc.titleA Study on the Twin-Field QKD Protocolen
dc.typeThesis
dc.date.schoolyear107-2
dc.description.degree碩士
dc.contributor.oralexamcommittee林俊達,李哲明
dc.subject.keyword量子密鑰分發,雙場協議,量子通訊,糾纏交換,量子密碼學,zh_TW
dc.subject.keywordquantum key distribution,twin-field QKD,quantum teleportation,entanglement swapping,quantum cryptography,en
dc.relation.page80
dc.identifier.doi10.6342/NTU201903013
dc.rights.note有償授權
dc.date.accepted2019-08-13
dc.contributor.author-college理學院zh_TW
dc.contributor.author-dept物理學研究所zh_TW
顯示於系所單位:物理學系

文件中的檔案:
檔案 大小格式 
ntu-108-1.pdf
  目前未授權公開取用
6.52 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved