首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 609 毫秒
1.
Quantum Key Distribution against Trojan Horse Attacks   总被引:1,自引:0,他引:1       下载免费PDF全文
蔡庆宇  吕桦 《中国物理快报》2007,24(5):1154-1157
Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.  相似文献   

2.
Quantum teleportation is one of the most important subjects in quantum information science. This is because quantum teleportation can be regarded as not only quantum information transfer but also a building block for universal quantum information processing. Furthermore, deterministic quantum information processing is very important for efficient processing and it can be realized with continuous-variable quantum information processing. In this review, quantum teleportation for continuous variables and related quantum information processing are reviewed from these points of view.  相似文献   

3.
G. Abal  H. Fort 《Physica A》2008,387(21):5326-5332
Iterated bipartite quantum games are implemented in terms of the discrete-time quantum walk on the line. Our proposal allows for conditional strategies, as two rational agents make a choice from a restricted set of two-qubit unitary operations. We discuss how several classical strategies are related to families of quantum strategies. A quantum version of the well known Prisoner’s Dilemma bipartite game, in which both players use mixed strategies, is presented as a specific example.  相似文献   

4.
We propose an approach to connect components of a quantum computer by using a linear cluster state, with which an arbitrary N-particle state can be perfectly propagated between quantum components in two ways that are based on feedback measurements and local transformation.  相似文献   

5.
With the two forms of the quantum entanglement control, the quantum entanglement swapping and preservation are demonstrated in a three-qubit nuclear magnetic resonance quantum computer. The pseudopure state is prepared to represent the quantum entangled states through macroscopic signals. Entanglement swapping is directly realized by a swap operation. By controlling the interactions between the system and its environment,we can preserve an initial entangled state for a longer time. The experimental results are in agreement with the experiment.  相似文献   

6.
We consider the model of quantum computer, which is represented as a Ising spin lattice, where qubits (spin-half systems) are separated by the isolators (two spin-half systems). In the idle mode or at the single bit operations the total spin of isolators is 0. There are no need of complicated protocols for correcting the phase and probability errors due to permanent interaction between the qubits. We present protocols for implementation of universal quantum gates with the rectangular radio-frequency pulses.  相似文献   

7.
邓洪亮  方细明 《中国物理快报》2007,24(11):3051-3054
In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By" conditional Faraday- rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary" distances is obtained in a spin chain by" a proper choice of coupling strengths and using spin memory- technique improved. We also analyse the security" of the scheme against the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity- achieved by" an eavesdropper for entanglement-based cryptography.  相似文献   

8.
To implement long-distance quantum communication, quantum repeaters have been proposed. The distribution and storage of quantum entanglement are essential to implement quantum repeaters. Here, we propose a new quantum repeaters protocol which is based on single atom-cavity QED. We use simple long-life two-level atoms to store quantum entanglement unlike three-level atoms which are commonly used in other quantum repeaters proposals. The property of long life-time (T1) and transverse decay time (T2) between excited level and ground level, such as rare-earth atoms, may store quantum entanglement as long as possible. Modulations of cavity mode and rate of coupling between cavity mode and output mode are also key steps to our scheme. And the efficiency of our protocol is analyzed by quantum trajectory theory.  相似文献   

9.
A quantum dialogue network is constructed, which uses GHZ states as quantum channel. As its application, a quantum dialogue protocol using entanglement swapping is presented. If the network is safe, any two users in the network can communicate under the control of the other users.  相似文献   

10.
We present a general theory of quantum information processing devices, that can be applied to human decision makers, to atomic multimode registers, or to molecular high-spin registers. Our quantum decision theory is a generalization of the quantum theory of measurement, endowed with an action ring, a prospect lattice and a probability operator measure. The algebra of probability operators plays the role of the algebra of local observables. Because of the composite nature of prospects and of the entangling properties of the probability operators, quantum interference terms appear, which make actions noncommutative and the prospect probabilities nonadditive. The theory provides the basis for explaining a variety of paradoxes typical of the application of classical utility theory to real human decision making. The principal advantage of our approach is that it is formulated as a self-consistent mathematical theory, which allows us to explain not just one effect but actually all known paradoxes in human decision making. Being general, the approach can serve as a tool for characterizing quantum information processing by means of atomic, molecular, and condensed-matter systems.  相似文献   

11.
Using high-dimensional quantum error-avoiding code, we present two new quantum key distribution protocols over a collective noisy channel, i.e. six-photon and five-photon quantum error-avoiding codes. Compared with the previous protocols using four-photon and three-photon quantum error-avoiding code, the qubit efficiencies of the new protocols have increases of 16.67% and 5% respectively. In addition, the security of these protocols is analysed with a conclusion that the new protocols are much more secure than the four-photon and three-photon ones.  相似文献   

12.
Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein- Podolsky Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators.  相似文献   

13.
We report a method to realize the arbitrary inverse unitary transformation imposed by a single-mode fibre on photon's polarization by the succession of two quarter-wave plates and a half-wave plate. The process of realization is analysed on a Poincar6 sphere due to the fact that unitary transformation does not change the angle formed by polarization state vector. The method is meaningful in quantum communication experiment such as quantum teleportation, in which an unknown arbitrary quantum state should be kept to be unchanged in the case of using a single-mode fibre for time delay.[第一段]  相似文献   

14.
A quantum telephone protocol including the dialing process and the talking one is proposed. In the dialing process, with their respective secret keys, the legitimate communicators Alice and Bob can pass the authentication by Charlie acting as a telephone company. In the talking process, Charlie provides the authenticated Alice and Bob with a quantum channel sequence, on which Alice and Bob can communicate with each other directly and privately by virtue of some encoding operations. Different from the insecure classical telephone having been used in our lives, the proposed quantum telephone protocol has asymptotically security and the communicators cannot disavow having used the quantum channels.  相似文献   

15.
We present a tripartite quantum information splitting scheme which splits a qutrit state via two GHZ states. The scheme is then generalized to splitting a qudit state among any number of receivers. We show that this scheme is also applicable to splitting any multi-qudit entangled states.  相似文献   

16.
A class of unlockable bound entangled states and their applications are presented. They can be considered as quasi generalized Smolin states [Phys. Rev. A 63 (2001) 032306], which are the states of N + N qubits. No pure entanglement can be distilled from this class of states by local quantum operations and classical communications. However, if certain parties group together, they become distillable. Although they are bound entangled states, they could be used to achieve some non-trivial tasks, such as quantum secret sharing shown in the study.  相似文献   

17.
We theoretically propose a feasible scheme to realize holonomic quantum computation with charge-phase qubits placed in a microwave cavity. By appropriately adjusting the controllable parameters, each charge-phase qubit is set as an effective four-level subsystem, based on which a universal set of holonomic quantum gates can be realized. Further analysis shows that our system is robust to the first-order fluctuation of the gate charges, and the intrinsic leakages between energy levels can be ignored.  相似文献   

18.
We suggest a general approach for extending quantum key distribution (Q, KD) protocols possessing discrete rotational symmetry into quantum secret sharing (QSS) schemes among multiparty, under certain conditions. Only local unitary operations are required for this generalization based on the almost mature technologies of Q, KD. Theoretically, the number of the participating partners can be arbitrary high. As an application of this method, we propose a fault-tolerant QSS protocol based on a fault-tolerant QKD implementation. The 6-state protocol is also discussed.  相似文献   

19.
Taking into account the main noises in superconducting charge qubits (SCQs), we propose a feasible scheme to realize quantum computing (QC) in a specially-designed decoherence-free subspace (DFS). In our scheme two physical qubits are connected with a common inductance to form a strong coupling subsystem, which acts as a logical qubit. Benefiting from the well-designed DFS, our scheme is helpful to suppress certain decoherence effects.  相似文献   

20.
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73 (2006) 042305] were recently indicated to be insecure against the authenticator Trent attacks [Phys. Rev. A 75 (2007) 026301]. We present two efficient protocols by using four Panli operations, which are secure against inner Trent attacks as well as outer Eve attacks. Finally, we generalize them to multiparty quantum direction communication.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号