首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We propose a prepare-and-measure scheme for quantum key distribution with two-qubit quantum codes. The protocol is unconditionally secure under all types of intercept-and-resend attack. Given the symmetric and independent errors to the transmitted qubits, our scheme can tolerate a bit of an error rate up to 26% in four-state protocol and 30% in six-state protocol, respectively. These values are higher than all currently known threshold values for the prepare-and-measure protocols. Moreover, we give a practically implementable linear optics realization for our scheme.  相似文献   

2.
In this paper, we propose DiLizium: a new lattice-based two-party signature scheme. Our scheme is constructed from a variant of the Crystals-Dilithium post-quantum signature scheme. This allows for more efficient two-party implementation compared with the original but still derives its post-quantum security directly from the Module Learning With Errors and Module Short Integer Solution problems. We discuss our design rationale, describe the protocol in full detail, and provide performance estimates and a comparison with previous schemes. We also provide a security proof for the two-party signature computation protocol against a classical adversary. Extending this proof to a quantum adversary is subject to future studies. However, our scheme is secure against a quantum attacker who has access to just the public key and not the two-party signature creation protocol.  相似文献   

3.
A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are required,which makes the scheme more convenient than others in practical applications.By distributing a random key between both sides of the communication and performing classical XOR operation,we realize a one-time-pad scheme,therefore our protocol achieves unconditional secure.Because only user with legitimate identity string can decrypt the secret,our protocol can resist man-in-the middle attack.The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping.The detection rate reaches 75% per qubit.  相似文献   

4.
We propose a quantum secure direct communication scheme based on non-orthogonal entangled pairs and local measurement. In this scheme, we use eight non-orthogonal entangled pairs to act as quantum channels. Due to the non-orthogonality of the quantum channels, the present protocol can availably prohibit from all kinds of valid eavesdropping and acquire a secure quantum channel. By local measurement, the sender acquires a secret random sequence. The process of encoding on the random sequence is identical to the one in one-time-pad. So the present protocol is secure. Even for a highly lossy channel, our scheme is also valid. The scheme is feasible with present-day techniques.  相似文献   

5.
We propose a scheme for implementing three-party quantum secure sharing via a four-particle cluster state in driven cavity QED. In our protocol, each of the two receivers can read out the sender’s secret communication message only if they choose to cooperate with each other. The protocol does not require the joint Bell-state measurement needed in the previous schemes and can considerably reduce the realization difficulty in experiment. Moreover, the cavity is only virtually excited and thus is insensitive to the cavity decay and the thermal field. The probability of success in our scheme can reach 1.0.  相似文献   

6.
Abstract According to the protocol of Agrawal et al., we propose a cavity QED scheme for realization of teleportation and dense coding. Instead of using EPR states and GHZ states, our scheme is more insensitive to the loss of one particle by using a W-class state as a quantum channel. Besides, our scheme is immune to thermal field, and does not require the cavity to remain in the vacuum state throughout the procedure.  相似文献   

7.
In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle,which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli's scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli's scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks.  相似文献   

8.

In this paper, a quantum sealed-bid protocol based on semi-quantum bidders is proposed. The protocol uses Bell states to encrypt message and realizes the process that bidders can directly transmit bidding information to the auction center safely. Its essence is a semi-quantum secure direct communication protocol using Bell states. Unlike most similar protocols, our scheme eliminates the trusted third-party Trent and sets the auction center Charlie as completely honest. Considering that the auction involves human activities, too many quantum servers are not only costly, but also unrealistic. Therefore, we set the bidders as semi-quantum users and implement the Vickrey auction. In addition, the security analysis shows that our scheme has high security and is completely feasible.

  相似文献   

9.
We consider a passive and active hybrid interferometer for phase estimation, which can reach the sub-shot-noise limit in phase sensitivity with only the cheapest coherent sources. This scheme is formed by adding an optical parametric amplifier before a Mach-Zehnder interferometer. It is shown that our hybrid protocol can obtain a better quantum Cramer-Rao bound than the pure active(e.g., SU(1,1)) interferometer, and this precision can be reached by implementing the parity measurements. Furthermore, we also draw a detailed comparison between our scheme and the scheme suggested by Caves[Phys. Rev. D 23 1693(1981)], and it is found that the optimal phase sensitivity gain obtained in our scheme is always larger than that in Caves' scheme.  相似文献   

10.

BB84-state is the non-orthogonal single-photon state which has the advantage of easy implementation compared with the quantum multi-photon entanglement states. In this paper, based on BB84-state, by introducing a trusted third-party voting center, a quantum voting scheme is proposed. In this scheme, by performing corresponding unitary operation on BB84-state, all voters send their voting information to the tallyman Charlie, then Charlie counts all votes under the supervision of voting management center Bob, which ensures that the protocol can resist inside attacks. Moreover, by utilizing the decoy particles, our scheme can efficiently prevent outside attacks. Compared with other related quantum voting protocols, our protocol has higher qubit efficiency and fewer interactive times.

  相似文献   

11.
吕桦  陈爱喜  闫旭东 《中国物理》2007,16(10):2862-2866
In this paper, we present a two-way quantum dense key distribution protocol. With double check modes, our scheme is secure regardless of the presence of noises. And with a quantum teleportation process, secret message can be encoded deterministically even if the quantum channel is highly lossy. Therefore, our scheme can be used in a realistic quantum channel regardless of the presence of noises and channel losses.  相似文献   

12.
Following the theoretical protocol described by Fortescue and Lo [Fortescue B and Lo H K 2007 Phys. Rev. Lett. 98 2605011, we present a scheme in which one can distill maximally entangled bi-partite states from a tri-partite W state with cavity QED. Our scheme enables the concrete physical system to realize its protocol. In our scheme, the rate distillation also asymptotically approaches one. Based on the present cavity QED techniques, we discuss the experimental feasibility.  相似文献   

13.
We propose a new quantum key distribution scheme that uses the blind polarization basis. In our scheme the sender and the receiver share key information by exchanging qubits with arbitrary polarization angles without basis reconciliation. As only random polarizations are transmitted, our protocol is secure even when a key is embedded in a not-so-weak coherent-state pulse. We show its security against the photon-number splitting attack and the impersonation attack.  相似文献   

14.
近几年来,人们从理论和实验两个方面探讨了利用自由原子系综作为量子记忆体的可能性. 基于固定于格点上Λ型“原子”系综的准自旋波激发的研究, 提出了实现光子信息量子存贮的新方案. 这个方案的目标是为了克服自由原子系综量子存贮方案中存在的量子态漏损诱导退相干的致命问题. 研究过程中发现了系综型量子记忆体中隐藏动力学的对称性和其绝热暗态演化的选择定则. 为了确切地表述这个工作的意义,还扼要地介绍这个方案建立的前期关于原子系综对称集体激发的系列工作. In this article we reviews a new protocol of quantum memory based on the quasi pin wave excitation of the Λ systems fixed the sites of lattice. This protocol tries to avoid the disadvantage of the quantum memory scheme based on free atom ensemble, the quantum decoherence induced by the quantum leakage of collective state. Especially,we discover a universal dynamic symmetry hidden in various ensemble based quantum storage scheme. To understand the significance of this work exactly, we also give a brief introduction to our systematical studies on collective symmetric excitons in quantum ensemble,which is the necessary to propose the present scheme for quantum memory.  相似文献   

15.
By combining the idea of quantum secure direct communication (QSDC) and BB84 quantum key distribution (QKD), we propose a secure quantum dialogue protocol via single photons. Comparing with the previous bidirectional quantum secure communication scheme [24] in which the EPR pairs are used, our protocol is not only feasible in practice but also can overcome the drawback “information leakage” or “classical correlation”. Our scheme possesses the characters of security and high efficiency.  相似文献   

16.
Qubits are realized as polarization state of photons or as superpositions of the spin states of electrons. In this paper we propose a scheme to probabilistically teleport an unknown arbitrary two-qubit state using a non-maximally entangled GHZ-like state and a non-maximally Bell state simultaneously as quantum channels. We also discuss the success probability of our scheme. We perform POVM in the protocol which is operationally advantageous. In our scheme we show that the non-maximal quantum resources perform better than maximal resources.  相似文献   

17.
何娟  叶柳  倪致祥 《中国物理 B》2008,17(5):1597-1600
An experimentally feasible protocol for realizing dense coding by using a class of W-state in cavity quantum electrodynamics (QED) is proposed in this paper. The prominent advantage of our scheme is that the successful probability of the dense coding with a W-class state can reach 1. In addition, the scheme can be implemented by the present cavity QED techniques.  相似文献   

18.
We put forward an experimentally feasible protocol for realizing a perfect teleportation by using a class of W-state in QED. The simple way of generating the entangled channel and distinguishing the measurement bases is the distinct feature of our scheme. In addition, the probability of teleportation is up to 100%. The scheme can be implemented by the present cavity QED techniques.  相似文献   

19.
Quantum Secret Sharing with Two-Particle Entangled States   总被引:1,自引:0,他引:1       下载免费PDF全文
We present a new protocol for the quantum secret sharing (QSS) task among multiparties with two-particle entangled states. In our scheme, the secret is split among a number of participatlng partners and the reconstruction requires collaboration of all the authorized partners. Instead of multiparticle Greenberger-Horne-Zeillnger states, only two-particle entangled states are employed in this scheme. By local operations and individual measurements on either of the two entangled particles, each authorized partner obtains a sequence of secret bits shared with other authorized partners. This protocol can be experimentally realized using only linear optical elements and simple entanglement source. It is scalable in practice.  相似文献   

20.
司斌  苏石磊  孙立莉  程留永  王洪福  张寿 《中国物理 B》2013,22(3):30305-030305
We propose an entanglement concentration protocol to concentrate an arbitrary partially-entangled four-photon cluster state.As a pioneering three-step entanglement concentration scheme,our protocol only needs a single-photon resource to assist the concentration in each step,which makes this protocol more economical.With the help of the linear optical elements and weak cross-Kerr nonlinearity,one can obtain a maximally-entangled cluster state via local operations and classical communication.Moreover,the protocol can be iterated to obtain a higher success probability and is feasible under current experimental conditions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号