首页 | 官方网站   微博 | 高级检索  
     

Quantum Cryptography in Spin Networks
作者姓名:邓洪亮  方细明
作者单位:Key Laboratory of Quantum Structure and Quantum Control of Ministry of education and Department of Physics, Hunan Normal University; Ghangsha 410081
基金项目:Supported by the National Science Foundation under Grant No 2007CB925204.
摘    要:In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By" conditional Faraday- rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary" distances is obtained in a spin chain by" a proper choice of coupling strengths and using spin memory- technique improved. We also analyse the security" of the scheme against the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity- achieved by" an eavesdropper for entanglement-based cryptography.

关 键 词:量子密码  自旋结网圈  圈量子引力  量子学
收稿时间:2007-03-13

Quantum Cryptography in Spin Networks
DENG Hong-Liang,FANG Xi-Ming.Quantum Cryptography in Spin Networks[J].Chinese Physics Letters,2007,24(11):3051-3054.
Authors:DENG Hong-Liang  FANG Xi-Ming
Affiliation:Key Laboratory of Quantum Structure and Quantum Control of Ministry of education and Department of Physics, Hunan Normal University, Changsha 410081
Abstract:In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By conditional Faraday rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary distances is obtained in a spin chain by a proper choice of coupling strengths and using spin memory technique improved. We also analyse the security of the schemeagainst the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity achieved by an eavesdropper for entanglement-based cryptography.
Keywords:03  67  Dd  78  67  Hc  03  67  -a
本文献已被 维普 等数据库收录!
点击此处可从《中国物理快报》浏览原始摘要信息
点击此处可从《中国物理快报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号