首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
我们提出了一个在热腔中产生多原子GHZ态的方法来检验量子非定域性。在这个方法中,三个原子被同时送入一个热腔中,它们初始时处于相同的态。这个方法既对腔的衰减不敏感又对热场不敏感,这为检验量子力学的基本方面提供了新的前景。  相似文献   

2.
通过纠缠交换实现N粒子任意态的概率传态   总被引:1,自引:1,他引:0  
量子隐形传态的杰出安全特性使其在未来的通讯领域充满潜力.量子力学的不确定性原理和不可克隆定理禁止对量子态进行直接复制,因此,量子隐形传态将量子态划分为经典和量子两部分,信息分别经由经典和量子通道从发送者Alice传递给远方的接收者Bob,根据这两种信息,Bob实行相应操作就可以以一定的几率重建初始传送态.利用一般意义的隐形传态方案,提出一种简便的新方法实现了一个N粒子任意态的概率传态.方法采用N个非最大纠缠的三粒子GHZ态作为量子通道,避免了引入额外的辅助粒子.为了实现传态,Alice将所有粒子分成N份,对第i份的粒子对(i,xi)实行Bell测量并将结果通过经典通道通知Bob,Bob对粒子(yi,zi)进行相应的操作就可以完成第i个粒子信息的传送.当完成N次相似的重复操作后,Bob就可以准确地重建初始传送态.文中以Bell态测量为基本手段,重复的操作同时也降低了实验难度,作为一个特例,文中给出了一个两粒子任意态的传态方案.  相似文献   

3.
Oneofthemostintriguingandexcitingrecentdevelopmentsinquantummechanicsisthepredictionanddemonstrationofacryptographickeydistri...  相似文献   

4.
    
As a multi-particle entangled state, the Greenberger–Horne–Zeilinger (GHZ) state plays an important role in quantum theory and applications. In this study, we propose a flexible multi-user measurement-device-independent quantum key distribution (MDI-QKD) scheme based on a GHZ entangled state. Our scheme can distribute quantum keys among multiple users while being resistant to detection attacks. Our simulation results show that the secure distance between each user and the measurement device can reach more than 280 km while reducing the complexity of the quantum network. Additionally, we propose a method to expand our scheme to a multi-node with multi-user network, which can further enhance the communication distance between the users at different nodes.  相似文献   

5.
赵加强  曹连振  王晓芹  逯怀新 《物理学报》2012,61(17):170301-170301
实验研究了Bell不等式、Mermin不等式和Svetlichny不等式在GHZ态中对定域实在论结果的破坏. 采用目标态密度矩阵的方法给出了实验制备的GHZ态的保真度, 得到了三个不等式在GHZ态中的测量值. 实验结果表明, 三个Bell型不等式在同一个状态下对定域实在论结果破坏程度不同, 在量子密钥分配中可以选择合适的非定域性描述方式考察所用信道的安全性.  相似文献   

6.
Using simple quantum analysis we describe the correlations of Greenberger-Horne-Zeilinger (GHZ) states by the use of Hilbert-Schmidt (HS) representation. Our conclusion is that while these states disprove local-realism they do not prove any nonlocality property.  相似文献   

7.
N个热囚禁离子的GHZ态的制备   总被引:1,自引:1,他引:0  
我们提出了一个简单的方法产生N个囚禁离子的GHZ态.在这个方法中,初始时处于相同态的N个两能级离子被囚禁在一个线性阱中,同时被两束均匀的经典激光照射.这个方法对振动模的加热不敏感,从退相干的观点来看这点很重要.  相似文献   

8.
  总被引:1,自引:0,他引:1       下载免费PDF全文
郑小娟  方卯发  蔡建武  廖湘萍 《中国物理》2006,15(12):2840-2846
We propose a most simple and experimentally feasible scheme for teleporting unknownatomic entangled states in driven cavity quantum electrodynamics (QED). In ourscheme, the joint Bell-state measurement (BSM) is not required, and the successfulprobability can reach 1.0. Furthermore, the scheme is insensitive to the cavitydecay and the thermal field.  相似文献   

9.
In this paper, we describe a new design of laser diode driver system based on MOSFET current mirror and digital signal controller (DSC). The system is designed to emit stream pairs of photons from three semiconductor laser diodes. The DSC is able to switch between the three laser diodes at constant rate. The duty cycle is maintained at 1% in order to reduce its thermal effect and thus prolong the laser diodes’ life cycles. The MOSFET current mirror circuits are capable of delivering constant modulation current with peak current up to 58 mA to each laser diode. This laser driver system will allow the generating biphotons automatically with qubit rate around 8-13% for μ less than or equal to 1, thus making it practical for six-states quantum key distribution implementation.  相似文献   

10.
         下载免费PDF全文
For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack.  相似文献   

11.
《Physics letters. A》2014,378(38-39):2808-2812
By employing a nondeterministic noiseless linear amplifier, we propose to increase the maximum transmission distance of continuous-variable quantum key distribution with noisy coherent states. With the covariance matrix transformation, the expression of secret key rate under reverse reconciliation is derived against collective entangling cloner attacks. We show that the noiseless linear amplifier can compensate the detrimental effect of the preparation noise with an enhancement of the maximum transmission distance and the noise resistance.  相似文献   

12.
         下载免费PDF全文
吴晓东  廖骎  黄端  吴湘华  郭迎 《中国物理 B》2017,26(11):110304-110304
We show that the secret key generation rate can be balanced with the maximum secure distance of four-state continuous-variable quantum key distribution(CV-QKD) by using the linear optics cloning machine(LOCM). Benefiting from the LOCM operation, the LOCM-tuned noise can be employed by the reference partner of reconciliation to achieve higher secret key generation rates over a long distance. Simulation results show that the LOCM operation can flexibly regulate the secret key generation rate and the maximum secure distance and improve the performance of four-state CV-QKD protocol by dynamically tuning parameters in an appropriate range.  相似文献   

13.
         下载免费PDF全文
We investigate the effect of collective-rotation noise on the security of the six-state quantum key distribution. We study the case where the eavesdropper, Eve, performs an intercept-resend attack on the quantum communication between Alice, the sender, and Bob, the receiver. We first derive the collective-rotation noise model for the six-state protocol and then parameterize the mutual information between Alice and Eve. We then derive quantum bit error rate for three interceptresend attack scenarios. We observe that the six-state protocol is robust against intercept-resend attacks on collective rotation noise channels when the rotation angle is kept within certain bounds.  相似文献   

14.
尹逊汝  马文平  申冬苏  王丽丽 《物理学报》2013,62(17):170304-170304
提出了基于两粒子纠缠态的一个三方量子密钥协商协议. 方案中的三个参与者是完全对等的, 且对建立的共享密钥具有相同的贡献. 除此之外, 三方中的任何一方或两方都不能事先单独决定共享密钥. 安全分析表明本协议既能抵抗外部窃听者的攻击, 又能抵抗内部参与者攻击.关键词:量子密码学量子密钥协商Bell态  相似文献   

15.
陈华  安雪碧  伍娟  银振强  王双  陈巍  韩正甫 《中国物理 B》2016,25(2):20305-020305
Recently,the Hong-Ou-Mandel(HOM) interference between two independent weak coherent pulses(WCPs) has been paid much attention due to the measurement-device-independent(MDI) quantum key distribution(QKD).Using classical wave theory,articles reported before show that the visibility of this kind of HOM-type interference is ≤ 50%.In this work,we analyze this kind of interference using quantum optics,which reveals more details compared to the wave theory.Analyses confirm the maximum visibility of 50%.And we conclude that the maximum visibility of 50%comes from the two single-photon states in WCPs,without considering the noise.In the experiment,we successfully approach the visibility of 50%by using WCPs splitting from the single pico-second laser source and phase scanning.Since this kind of HOM interference is immune to slow phase fluctuations,both the realized and proposed experiment designs can provide stable ways of high-resolution optical distance detection.  相似文献   

16.
    
This paper proposes a new semi‐quantum key distribution protocol, allowing two “classical” participants without sophisticated quantum capability to establish a shared secret key under an untrusted third party (a quantum server). The proposed protocol is free from several well‐known attacks. Furthermore, the efficiency is better than the existing three‐party SQKD protocol in which the classical participants must have the quantum measurement capability.  相似文献   

17.
         下载免费PDF全文
A fast scheme to generate Greenberger-Horne-Zeilinger states between different cavities in circuit QED systems is proposed. To implement this scheme, we design a feasible experimental device with three qubits and three cavities. In this device, all the couplings between qubit and qubit, cavity and qubit are tunable and are independent with frequencies, and thus the shortcut to adiabaticity technique can be directly applied in our scheme. It is demonstrated that the GHZ state can be generated rapidly with high fidelity in our scheme.  相似文献   

18.
    
The semiquantum techniques have been explored recently to bridge the classical communications and the quantum communications.In this paper,we present one scheme to distribute the messages from one quantum participate to one weak quantum participate who can only measure the quantum states.It is proved to be robust by combining the classical coding encryption,quantum coding and other quantum techniques.  相似文献   

19.
  总被引:1,自引:0,他引:1  
A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed.In the proposed scheme,communicators share key information by exchanging one travelling photon with two random and secret polarization angles.The security of the distributed key is guaranteed by three checking phases in three-way channel and the communicators' secret polarization angles.  相似文献   

20.
    
We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key.By adding a controlled blocking operation module to the original protocol [T.G.Noh,Phys.Rev.Lett.103(2009) 230501],the correlation between the polarizations of the two parties,Alice and Bob,is extended,therefore,one can distribute both deterministic keys and random ones using our protocol.We have also given a simple proof of the security of our protocol using the technique we ever applied to the original protocol.Most importantly,our analysis produces a bound tighter than the existing ones.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号