首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
刘云  王朴  彭双艳 《中国物理 B》2013,(10):287-291
In this paper, we suggest a doubly degenerate four-level system, in which the transition takes place between the hyperfine energy 52S1/2 F = 1 and 52P3/2 F = 2 in rubidium 87 D2 line, for studying atomic phase grating based on the cross-Kerr and phase conjugation effects. The phase grating with high efficiency can be obtained by tuning phase shift Ф between the coupling and probe field, when the coupling intensity is much stronger than the strength of probe field. Under different coupling intensities, a high diffraction efficiency can be maintained. A new and simple way of implementing phase grating is presented. However, in such an atomic system, two main limitations must be taken into account. First, the independence between steady state probe susceptibility and the coupling intensity, when the population decay rate is larger than the Rabi frequency of the coupling field, cannot result in diffraction grating; second, the sample to be prepared should not be too long.  相似文献   

2.
We present an efficient scheme for sharing an arbitrary m-qubit state with n agents. In our scheme, the sender Alice first shares m Bell states with the agent Bob, who is designated to recover the original m-qubit state. Furthermore, Alice introduces n- 1 auxiliary particles in the initial state |0), applies Hadamard (H) gate and Controlled-Not (CNOT) gate operations on the particles, which make them entangled with one of m particle pairs in Bell states, and then sends them to the controllers (i.e., other n - 1 agents), where each controller only holds one particle in hand. After Alice performing m Bell-basis measurements and each controller a single-particle measurement, the recover Bob can obtain the original unknown quantum state by applying the corresponding local unitary operations on his particles. Its intrinsic efficiency for qubits approaches 100%, and the total efficiency really approaches the maximal value.  相似文献   

3.
许鹏  王栋  叶柳 《中国物理 B》2013,(10):119-124
We investigate the quantum characteristics of a three-particle W-class state and reveal the relationship between quan- tum discord and quantum entanglement under decoherence. We can also identify the state for which discord takes a maximal value for a given decoherence factor, and present a strong bound on quantum entanglement-quantum discord. In contrast, a striking result will be obtained that the quantum discord is not always stronger than the entanglement of formation in the case of decoherence. Furthermore, we also theoretically study the variation trend of the monogamy of quantum correlations for the three-particle W-class state under the phase flip channel, and find that the three-particle W-class state could transform from polygamous into monogamous, owing to the decoherence.  相似文献   

4.
A scheme for implementing discrete quantum Fourier transform is proposed via quantum dots embedded in a microcavity, and then some of its applications are investigated, i.e., Deutsch 3ozsa. algorithm and Shor's quantum factoring. In particular, the detailed process of implementing one~qubit Deutsch Jozsa algorithm and the factorization of N = 15 are given. The microcavity mode is only virtually excited in the whole interaction, so the effective decoherent has slight effect on the current scheme. These schemes would be an important step to fabricate a solid quantum computer.  相似文献   

5.
In this paper, we study a quantum anti-Zeno effect (QAZE) purely induced by repetitive measurements for an artificial atom interacting with a structured bath. This bath can be artificially realized with coupled resonators in one dimension and possesses photonic band structure like Bloeh electron in a periodic potential. In the presence of repetitive measurements, the pure QAZE is discovered as the observable decay is not negligible even for the atomic energy level spacing outside of the energy band of the artificial bath. If there were no measurements, the decay would not happen outside of the band. In this sense, the enhanced decay is completely induced by measurements through the relaxation channels provided by the bath. Besides, we also discuss the controversial golden rule decay rates originated from the van Hove's singularities and the effects of the counter-rotating terms.  相似文献   

6.
付向群  鲍皖苏  李发达  张宇超 《中国物理 B》2014,23(2):20306-020306
Since the difficulty in preparing the equal superposition state of amplitude is 1/√N, we construct a quantile transform of quantum Fourier transform (QFT) over ZN based on the elementary transforms, such as Hadamard transform and Pauli transform. The QFT over Z_N can then be realized by the quantile transform, and used to further design its quantum circuit and analyze the requirements for the quantum register and quantum gates. However, the transform needs considerable quantum computational resources and it is difficult to construct a high-dimensional quantum register. Hence, we investigate the design of t-bit quantile transform, and introduce the definition of t-bit semiclassical QFT over Z_N. According to probability amplitude, we prove that the transform can be used to realize QFT over ZN and further design its quantum circuit. For this transform, the requirements for the quantum register, the one-qubit gate, and two-qubit gate reduce obviously when compared with those for the QFT over Z_N.  相似文献   

7.
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator.  相似文献   

8.
The security of the multiparty quantum secret sharing protocol proposed by Gao [G. Gao, Commun. Theor. Phys. 52 (2009) 421] is analyzed. It is shown that this protocol is vulnerable since the agents' imperfect encryption scheme can be attacked by a powerful participant. We introduce a attack strategy called participant forcible manipulation and analyze the information leakage in this protocol under this attack. At last, we give an improved version of the original protocol. The improved protocol is robust and has the same efficiency as the original one.  相似文献   

9.
Metric of States     
MA Zhi-Hao 《理论物理通讯》2008,50(11):1069-1070
Metric of quantum states plays an important role in quantum information theory. In this letter, we find the deep connection between quantum logic theory and quantum information theory. Using the method of quantum logic, we can get a famous inequality in quantum information theory, and we answer a question raised by S. Gudder.  相似文献   

10.
A theoretical scheme of quantum secure communication using a class of three-particle W states is proposed. In the scheme, two communicators may communicate after they test the security of the quantum channel. The receiver can obtain the secret message determinately if the quantum channel is safe. The present scheme can be realized without using teleportation.  相似文献   

11.
In this paper we propose a scheme for transferring quantum states and preparing quantum networks. Compared with the previous schemes, this scheme is more efficient, since three or four-dimensional quantum states can be transferred with a single step and information interchange of three-dimensional quantum states can be realized, which is a significant improvement. It is based on the resonant interaction of a three-mode cavity field with an atom. As a consequence, the interaction time is shortened greatly. Furthermore, we give some discussions about the feasibility of the scheme.  相似文献   

12.
Based on the quantum Vlasov equation, the effect of frequency chirp on electron-positron pair production is investigated. The cycle parameter, which characterizes the laser field cycle degree within the pulse, is also considered. In both supercycle and subcycle laser pulses the frequency chirp can greatly enhance the momentum distribution function of created pairs and the pair number density. The pair number density created by a supercycle laser pulse is larger than that by a subcycle pulse under the same laser frequency and chirping. There exists an optimal cycle parameter corresponding to the maximum value of the created pair number density for different chirp rates. It is found that the pair number density is sensitive/insensitive to chirping rate when the cycle parameter lies below/above the optimal one.  相似文献   

13.
The full-core plus correlation method with multi-configuration interaction wave functions is extended to the calcu- lation of the non-relativistic energies of ls2nd (n ≤9) states for the lithium isoelectronic sequence from Z = 11 to 20. Relativistic and mass-polarization effects on the energy are calculated as the first-order perturbation correction. The quantum-electrodynamics correction is also included. The fine structure splittings are determined from the expectation values of spin-orbit and spin-other-orbit interaction operators in the Pauli-Breit approximation. Combining the term energies of lowly excited states obtained with the quantum defects calculated by the single channel quantum defect theory, each of which is a smooth function of energy and approximated by a weakly varying function of energy, the ion potentials of highly excited states (n ≥ 6) are obtained with the semi-empirical iteration method. The results are compared with experimental data in the literature and found to be closely consistent with the regularity.  相似文献   

14.
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.  相似文献   

15.
In this paper, we derive the explicit transformations of the optimal 1 → 3, 4, 5 phase-covariant cloning in three dimensions, and then generalize them to the cases of 1 → M = 3n, 3n + 1, 3n + 2(n ≥ 1 integer) cloning. The clone fidelities are coincident with the theoretical bounds found.  相似文献   

16.
The nonlinear theory of interaction between the q analogue of a single-mode field and a Ξ-type threelevel atom has been established. And the formal solution of the Schrodinger equation in the representation and its average number are obtained. Then, the photon squeezing effects are studied through numerical calculation. The results show that the q deformation nonlinear action has a lot of influence on the quantum coherence and quantum properties. When q approaches 1, the theory reduces to the common linear theory.  相似文献   

17.
A theoretical protocol of quantum dialogue is proposed, which uses a class of three-photon W states as quantum channel. After two-step security check, four-bit secret message can be transmitted to each other by transmitting of single photon with the aid of two-bit classical information.  相似文献   

18.
In the quantum mechanical Hilbert space formalism, the probabilistic interpretation is a later ad-hoc add-on, more or less enforced by the experimental evidence, but not motivated by the mathematical model itself. A model involving a clear probabilistic interpretation from the very beginning is provided by the quantum logics with unique conditional probabilities. It includes the projection lattices in von Neumann algebras and here probability conditionalization becomes identical with the state transition of the Lueders-von Neumann measurement process. This motivates the definition of a hierarchy of five compatibility and comeasurability levels in the abstract setting of the quantum logics with unique conditional probabilities. Their meanings are: the absence of quantum interference or influence, the existence of a joint distribution, simultaneous measurability, and the independence of the final state after two successive measurements from the sequential order of these two measurements. A further level means that two elements of the quantum logic (events) belong to the same Boolean subalgebra. In the general case, the five compatibility and comeasurability levels appear to differ, but they all coincide in the common Hilbert space formalism of quantum mechanics, in von Neumann algebras, and in some other cases.  相似文献   

19.
Here in this letter, we study the difference between quantum and classical deletion. We point out that the linear mapping deletion operation used in the impossibility proof for quantum systems applies also to classical system. The general classical deletion operation is a combined operation of measurement and transformation, i.e., first read the state and then transfer the state to the standard blank state. Though both quantum information and classical information can be deleted in an open system, quantum information cannot be recovered while classical information can be recovered.  相似文献   

20.
We extend the method that Banerjee and Majhi have used to discuss Hawking radiation. Under the condition that the total energy and electrical charge of spacetime are conserved, we investigate Hawking radiation of the charged black hole by a new Tortoise coordinate transformation. Taking the reaction of the radiation of the particle to the spacetime into consideration, we not only derive the radiation spectrum that satisfies the unitary principle in quantum mechanics but also show that the contribution of ingoing particles is equal to the one of outgoing particles on the similar chemical potential term in radiation spectrum caused by charged particles.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号