首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Hwang et al. (Phys. Scr. 83:045004, 2011) proposed a high efficient multiparty quantum secret sharing by using Greenberger-Horne-Zeilinger (GHZ) states. But Liu et al. (Phys. Scr. 84:045015, 2011) analyzed the security of Hwang et al.’s protocol and found that it was insecure for Charlie who might obtain half of information about the dealer’s secret directly. They put forward an improved protocol by adding operation on photons in sequence S 3. However, we point out Liu et al.’s protocol is not secure too if a dishonest participant Charlie carries out intercept-resend attack. And a further improved quantum secret sharing protocol is proposed based on Bell states in this paper. Our newly proposed protocol can stand against participant attack, provide a higher efficiency in transmission and reduce the complexity of implementation.  相似文献   

2.
Recently, Hong et al. (Chin. Phys. Lett. 29:050303, 2012) put forward two quantum secret sharing (QSS) protocols of quantum direct communication (QDC) by using χ-type entangled states. Later, some studies (Gao et al. in Chin. Phys. Lett. 29:110305, 2012; Chin. Phys. Lett. 30:079904, 2013; Liu et al. in Chin. Phys. Lett. 30:039901, 2013; Hong and Yang in Chin. Phys. Lett. 30:069901, 2013; Liu and Chen in Chin. Phys. Lett. 30:079903, 2013) made up for the drawbacks of Hong et al.’s two protocols to some extent. However, the information leakage weakness is still not thoroughly solved. In this Letter, the author analyzes the inner reason of information leakage weakness in detail at first. And then he suggests an effective encoding rule to avoid this weakness.  相似文献   

3.
Yuan et al. (Int. J. Theor. Phys. 51:3443, 2012) proposed a multiparty quantum secret sharing protocol using Bell states and continuous variable operations. Zhang and Qin (Int. J. Theor. Phys. 52:3953, 2013) showed that their protocol is not secure. In this paper, we will give an improvement of Yuan et al. protocol. Our improved protocol can stand against not only Zhang et al. attack strategies, but also the other ones efficiently.  相似文献   

4.
In 2011, Kang and Fang (Commun. Theor. Phys. 55:239–243, 2011) presented a quantum direct communication protocol using single photons. This study points out a pitfall in Kang and Fang’s scheme, in which an eavesdropper can launch a measure-and-resend attack on this scheme to reveal the secret message. Furthermore, an improved scheme is proposed to avoid the attack.  相似文献   

5.
In hadron resonances different structures of hadronic composite (molecule) and elementary (quark-intrinsic) natures may coexist. We sketch discussions based on our previous publications on the origin of hadron resonances (Hyodo et al. Phys. Rev. C 78:025203, 2008) on exotic ${\bar D (B)}$ meson–nucleons as candidates of hadronic composites (Yamaguchi et al. Phys. Rev. D 84:014032, 2011) and on a 1 for the coexistence/mixing of the two different natures (Nagahiro et al. Phys. Rev. D 83:111504, 2011).  相似文献   

6.
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73:042305, 2006] were recently proposed by Lee, Lim and Yang, based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states. However, Zhang et al. showed that in the two protocols the authenticator Trent can eavesdrop the secret message by subtle strategies [Phys. Rev. A 75:026301, 2007]. In this paper, we propose two authenticated quantum direct communication (AQDC) protocols using Bell states. Users can identify each other by checking the correlation of Bell states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining Bell states after authentication. The two proposed AQDC protocols are implemented under the condition that there is a quantum link between Alice and Bob and that there is no quantum link between Alice and Bob respectively, similar to the ones proposed by Lee, Lim and Yang [Phys. Rev. A 73:042305, 2006]. The proposed AQDC protocols not only fix the leaks in the AQDC protocols proposed by Lee, Lim and Yang, but also economize the quantum resource.  相似文献   

7.
The decoherent histories formalism, developed by Griffiths, Gell-Mann, and Hartle (in Phys. Rev. A 76:022104, 2007; arXiv:1106.0767v3 [quant-ph], 2011; Consistent Quantum Theory, Cambridge University Press, 2003; arXiv:gr-qc/9304006v2, 1992) is a general framework in which to formulate a timeless, ‘generalised’ quantum theory and extract predictions from it. Recent advances in spin foam models allow for loop gravity to be cast in this framework. In this paper, I propose a decoherence functional for loop gravity and interpret existing results (Bianchi et al. in Phys. Rev. D 83:104015, 2011; Phys. Rev. D 82:084035, 2010) as showing that coarse grained histories follow quasiclassical trajectories in the appropriate limit.  相似文献   

8.
Recently, we have investigated the dynamics of the universe in tachyon cosmology with non-minimal coupling to matter (Farajollahi et al. in Mod Phys Lett A 26(15):1125–1135, 2011; Phys Lett B 711(3–4)15:225–231,2012; Phys Rev D 83:124042, 2011; JCAP 10:014, 20112011; JCAP 05:017, 2011). In particular, for the interacting holographic dark energy (IHDE), the model is studied in Farajollahi et al. (Astrophys Space Sci 336(2):461–467, 2011). In the current work, a significant observational program has been conducted to unveil the model’s thermodynamic properties. Our result shows that the IHDE version of our model better fits the observational data than $\Lambda $ CDM model. The first and generalized second thermodynamics laws for the universe enveloped by cosmological apparent and event horizon are revisited. From the results, both first and generalized second laws, constrained by the observational data, are satisfied on cosmological apparent horizon.In addition, the total entropy is verified with the observation only if the horizon of the universe is taken as apparent horizon. Then, due to validity of generalized second law, the current cosmic acceleration is also predicted.  相似文献   

9.
In a recent study (Yang et al. in Int. J. Theor. Phys. 50:395–400, 2011), Yang et al. pointed out that the controller’s role in the quantum secure direct communication protocol (Zhang et al. in Int. J. Theor. Phys. 48:2971–2976, 2009) could be excluded unknowingly, the receiver can directly obtain the sender’s message without the permission of the controller, and then they presented an improved protocol. However, in this paper, we show that the dishonest controller in the improved protocol can steal the sender’s secret message without being detected. Meanwhile, we show that the controller’s role still can be excluded unknowingly in the improved protocol. An improvement is proposed to avoid these two flaws.  相似文献   

10.
Recently, Liu et al. (Opt. Commun. 284:3160, 2011) proposed a protocol for quantum private comparison of equality (QPCE) based on symmetric W state. However, Li et al. (Eur. Phys. J. D 66:110, 2012) pointed out that there is a flaw of information leak, and they proposed a new protocol based on EPR pairs. While examining these two protocols, we find that there exists a same flaw: the third party (TP) can know the comparison result. In this paper, through introducing and constructing a special class of asymmetric W state, a secure QPCE protocol based on this asymmetric W state is presented. Analysis shows the present protocol can not only effectively avoid the information leak found by Li et al., but also ensure TP would not get any information about the comparison result.  相似文献   

11.
The parafermionic observable has recently been used by number of authors to study discrete models, believed to be conformally invariant and to prove convergence results for these processes to SLE (Beffara and Duminil-Copin in arXiv:1010.0526v2, 2011; Duminil-Copin and Smirnov in arXiv:1007.0575v2, 2011; Hongler and Smirnov in arXiv:1008.2645v3, 2011; Ikhlef and Cardy in J. Phys. A 42:102001, 2009; Lawler in preprint, 2011; Rajabpour and Cardy in J. Phys. A 40:14703, 2007; Riva and Cardy in J. Stat. Mech. Theory Exp., 2006; Smirnov in International Congress of Mathematicians, vol. II, pp. 1421?C1451, 2006; Smirnov in Ann. Math. 172(2):1435?C1467, 2010; Smirnov in Proceedings of the International Congress of Mathematicians, Hyderabad 2010, vol.?I, pp. 595?C621, 2010). We provide a definition for a one parameter family of continuum versions of the parafermionic observable for SLE, which takes the form of a normalized limit of expressions identical to the discrete definition. We then show the limit defining the observable exists, compute the value of the observable up to a finite multiplicative constant, and prove this constant is non-zero for a wide range of ??. Finally, we show our observable for SLE becomes a holomorphic function for a particular choice of the parameter, which provides a new point of view on a fundamental property of the discrete observable.  相似文献   

12.
Recently, Shen et al. (Int. J. Theor. Phys. doi:10.1007/s10773-012-1276-6, 2012) proposed a quantum dialogue with authentication protocol based on Bell states. This study points out that Shen et al.’s protocol suffers from a man-in-the-middle attack. By manipulating the photons and classical information transmitted between two communicants, an attacker can not only pass the mutual identity authentication, but also obtain their secret messages and new authentication keys without being detected.  相似文献   

13.
Recently, Liu et al. proposed a quantum private comparison (QPC) based on Bell entangled states (Liu et al. in Commun. Theor. Phys. 57(4): 583, 2012). This paper points out a security loophole in Liu et al.’s protocol, in which the third party can disclose the private information of both users. In addition, an improvement is proposed to avoid the loophole.  相似文献   

14.
In Yang et al.’s literatures (J. Phys. A: Math. 42, 055305, 2009; J. Phys. A: Math. 43, 209801, 2010), a quantum private comparison protocol based on Bell states and hash function is proposed, which aims to securely compare the equality of two participants’ information with the help of a dishonest third party (TP). However, this study will point out their protocol cannot resist a special kind of attack, TP’s same initial states attack, which is presented in this paper. That is, the dishonest TP can disturb the comparison result without being detected through preparing the same initial states. Finally, a simple improvement is given to avoid the attack.  相似文献   

15.
We present a mathematical derivation of some of the most important physical quantities arising in topological bilayer systems with permutation twist defects as introduced by Barkeshli et al. (Phys Rev B 87:045130_1-23, 2013). A crucial tool is the theory of permutation equivariant modular functors developed by Barmeier et al. (Int Math Res Notices 2010:3067–3100, 2010; Transform Groups 16:287–337, 2011).  相似文献   

16.
Recently, Hwang et al. (Eur. Phys. J. D 61:785, 2011) and Yuan et al. (Int. J. Theor. Phys. 50:2403, 2011) have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.  相似文献   

17.
The security of a multi-user quantum communication network protocol using χ-type entangled states (Chang et al., J. Korean Phys. Soc. 61:1–5, 2012) is analyzed. We find that, by using one χ-type state in this protocol, two participants can only share 2 bits of information, not 4 bits as the authors stated. In addition, we give a special attack strategy by which an eavesdropper can elicit half of the secret information without being detected. Finally, we improve the protocol to be secure against all the present attacks.  相似文献   

18.
Understanding of the production processes of the η meson will strongly rely on the precise determination of spin observables. So far these observables have been determined only for few excess energies and with low statistics (Winter et al. Eur. Phys. J. A18, 355 2003; Czyzykiewicz et al. Phys. Rev. Lett. 98, 122003 2007; Balestra et al. Phys. Rev. C69, 064003 2004). In the year 2010 WASA detector was used for the measurement of the \(\overrightarrow {p}p\rightarrow pp\eta \) reaction with the polarized proton beam of COSY (Moskal and Hodana J. Phys. Conf. Ser 295, 012080 2011). The measurement was done for the excess energy of Q = 15 MeV and Q = 72 MeV. In total about 106 events corresponding to the \(\overrightarrow {p}p\rightarrow pp\eta \) reaction have been collected.  相似文献   

19.
High harmonic generation (HHG) of intense infrared laser radiation (Ferray et al., J. Phys. B: At. Mol. Opt. Phys. 21:L31, 1988; McPherson et al., J. Opt. Soc. Am. B 4:595, 1987) enables coherent vacuum-UV (VUV) to soft-X-ray sources. In the usual setup, energetic femtosecond laser pulses are strongly focused into a gas jet, restricting the interaction length to the Rayleigh range of the focus. The average photon flux is limited by the low conversion efficiency and the low average power of the complex laser amplifier systems (Keller, Nature 424:831, 2003; Südmeyer et al., Nat. Photonics 2:599, 2008; Röser et al., Opt. Lett. 30:2754, 2005; Eidam et al., IEEE J. Sel. Top. Quantum Electron. 15:187, 2009) which typically operate at kilohertz repetition rates. This represents a severe limitation for many experiments using the harmonic radiation in fields such as metrology or high-resolution imaging. Driving HHG with novel high-power diode-pumped multi-megahertz laser systems has the potential to significantly increase the average photon flux. However, the higher average power comes at the expense of lower pulse energies because the repetition rate is increased by more than a thousand times, and efficient HHG is not possible in the usual geometry. So far, two promising techniques for HHG at lower pulse energies were developed: external build-up cavities (Gohle et al., Nature 436:234, 2005; Jones et al., Phys. Rev. Lett. 94:193, 2005) and resonant field enhancement in nanostructured targets (Kim et al., Nature 453:757, 2008). Here we present a third technique, which has advantages in terms of ease of HHG light extraction, transverse beam quality, and the possibility to substantially increase conversion efficiency by phase-matching (Paul et al., Nature 421:51, 2003; Ren et al., Opt. Express 16:17052, 2008; Serebryannikov et al., Phys. Rev. E (Stat. Nonlinear Soft Matter Phys.) 70:66611, 2004; Serebryannikov et al., Opt. Lett. 33:977, 2008; Zhang et al., Nat. Phys. 3:270, 2007). The interaction between the laser pulses and the gas occurs in a Kagome-type Hollow-Core Photonic Crystal Fiber (HC-PCF) (Benabid et al., Science 298:399, 2002), which reduces the detection threshold for HHG to only 200 nJ. This novel type of fiber guides nearly all of the light in the hollow core (Couny et al., Science 318:1118, 2007), preventing damage even at intensities required for HHG. Our fiber guided 30-fs pulses with a pulse energy of more than 10 μJ, which is more than five times higher than for any other photonic crystal fiber (Hensley et al., Conference on Lasers and Electro-Optics (CLEO), IEEE Press, New York, 2008).  相似文献   

20.
Consistent supercurrent multiplets are naturally associated with linearized off-shell supergravity models. In S.M. Kuzenko, J. High Energy Phys. 1004, 022 (2010) we presented the hierarchy of such supercurrents which correspond to all the models for linearized 4D $\mathcal{N}=1$ supergravity classified a few years ago. Here we analyze the correspondence between the most general supercurrent given in S.M. Kuzenko, J. High Energy Phys. 1004, 022 (2010) and the one obtained eight years ago in M. Magro et al., Ann. Phys. 298, 123 (2002) using the superfield Noether procedure. We apply the Noether procedure to the general $\mathcal{N}=1$ supersymmetric nonlinear sigma-model and show that it naturally leads to the so-called $\mathcal{S}$ -multiplet, revitalized in Z. Komargodski, N. Seiberg, J. High Energy Phys. 1007, 017 (2010).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号