共查询到19条相似文献,搜索用时 62 毫秒
1.
基于量子远程通信的原理, 本文借助双模压缩真空态和相干态, 提出一种连续变量量子确定性密钥分配协议. 在利用零差探测法的情况下协议的传输效率达到了100%. 从信息论的角度分析了协议的安全性, 结果表明该协议可以安全传送预先确定的密钥. 在密钥管理中, 量子确定性密钥分配协议具有量子随机性密钥分配协议不可替代的重要地位和作用. 与离散变量量子确定性密钥分配协议相比, 该协议分发密钥的速率和效率更高, 又协议中用到的连续变量量子态易于产生和操控、适于远距离传输, 因此该协议更具有实际意义. 相似文献
2.
3.
提出利用单个三粒子最大Greenberger-Horne-Zeilinger (GHZ)态或两个Einstein-Podolsky-Rosen (EPR)态作为量子信道确定性隐形传送任意三粒子GHZ态的两个方案,并将方案推广至隐形传送任意n(n≥4)粒子GHZ态的情况.讨论了量子信道受噪声影响时隐形传态的保真度.研究发现,当作为量子信道的单个三粒子最大GHZ态受到噪声影响时,隐形传态的保真度仅与量子信道的纠缠度有关,而当作为量子信道的两个EPR态受到噪声影响时,隐形传态的保真度不仅与量子信道的纠缠度有关,还与待传送态的纠缠度有关.所提出的方案具有节省量子信道纠缠资源的特点.
关键词:
隐形传态
三粒子Greenberger-Horne-Zeilinger态
量子逻辑门
保真度 相似文献
4.
5.
基于通信双方预先共享d维二粒子最大纠缠态非定域相关性,信息发送方Bob只需要向信息接收者Alice传送一个粒子,就可以传送logd22比特经典信息,为保护信息的安全,方案采用诱骗光子技术,安全性等价于改进后的原始量子密钥分配方案(Bennett-Brassard 1984,BB84).本文讨论了基于高维纯纠缠态超密编码方案.即通过引入一个附加量子比特,信息接收方对手中的纠缠粒子和附加粒子在执行相应的幺正演化,可以获取dαk2logd2+logd2(αk=minαj,j∈0,L,d-1)比特经典信息.通信双方采用诱骗光子技术确保量子信道的安全建立.与其他方案相比,该方案具有通信效率较高、实用性较强的优点. 相似文献
6.
本文提出了一种基于旋转不变态的偏振无关测量设备量子密钥分配协议,既适用于偏振编码测量设备无关量子密钥分配系统,也应用于相位编码测量设备无关量子密钥分配系统的相干过程.通过在线偏振基进入信道传输前嵌入2块q玻片,使得在传输过程中将线偏振基转化为旋转不变的圆偏振基,而第三方对接收到的脉冲进行Bell态测量前,利用q玻片的算符可逆性,将圆偏振基还原为线偏振基进行测量,可以有效消除信道传输中偏振旋转导致的误码.本文分析了偏振无关的三诱骗态测量设备无关量子密钥分配系统的误码率,研究了密钥生成率与安全传输距离的关系,仿真结果表明,对于偏振编码测量设备无关量子密钥分配系统,该协议可以有效提高系统的最大安全通信距离,为实用的量子密钥分配实验提供了重要的理论参数. 相似文献
7.
8.
提出了一个基于高维2m+1粒子纠缠态的任意m粒子态量子可控离物传态方案,发送方Alice对需传送的未知态量子系统和手中的纠缠粒子执行m个广义Bell基测量,控制方执行广义X基测量,依据预先共享量子纠缠态非定域相关性,接收方对手中的粒子执行相应的幺正操作就可以重建原来未知量子态.与其他方案相比,方案减少了任意高维多粒子态可控离物传送所需传送粒子数.我们进一步讨论了基于纯纠缠信道的概率量子可控离物传态方案,通过与发送方和控制方合作,接收方只需对手中的纠缠粒子和引入的附加粒子执行联合幺正演化和投影测量,就可以在他的粒子上概率的重建原来的未知量子态,最后,方案计算讨论了基于纯纠缠态量子可控离物传态成功概率与信道纠缠度之间的关系. 相似文献
9.
10.
设计了一组新的量子远程态制备步骤,在发送方对手中的粒子完成测量后,接收方采用该步骤可以有效降低远程态制备的经典通信消耗-给出一种利用部分纠缠的三粒子Greenberger-Horne-Zeilinger(GHZ)态和部分纠缠的二粒子态作信道,远程制备一个三粒子GHZ态的方案,以此方案为例具体说明上述方法的运用步骤并给出了该方法的适用范围-结果表明,运用该方法后只需消耗1bit经典信息即可远程制备一个三粒子GHZ态-
关键词:
远程态制备
经典通信消耗
三粒子Greenberger-Horne-Zeilinger态
量子信道 相似文献
11.
We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key.By adding a controlled blocking operation module to the original protocol [T.G.Noh,Phys.Rev.Lett.103(2009) 230501],the correlation between the polarizations of the two parties,Alice and Bob,is extended,therefore,one can distribute both deterministic keys and random ones using our protocol.We have also given a simple proof of the security of our protocol using the technique we ever applied to the original protocol.Most importantly,our analysis produces a bound tighter than the existing ones. 相似文献
12.
This paper proposes a new semi‐quantum key distribution protocol, allowing two “classical” participants without sophisticated quantum capability to establish a shared secret key under an untrusted third party (a quantum server). The proposed protocol is free from several well‐known attacks. Furthermore, the efficiency is better than the existing three‐party SQKD protocol in which the classical participants must have the quantum measurement capability. 相似文献
13.
In this paper, we study the thermodynamic features of a two-dimensional charged black hole. Weinhold curvature and Ruppeiner curvature are explored as information geometry, respectively. Moreover, based on the Legendre invariant proposed by Hernando Quevedo, the geometro-thermodynamics behavior of this black hole is investigated. 相似文献
14.
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noneloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503]. 相似文献
15.
16.
A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed.In the proposed scheme,communicators share key information by exchanging one travelling photon with two random and secret polarization angles.The security of the distributed key is guaranteed by three checking phases in three-way channel and the communicators' secret polarization angles. 相似文献
17.
量子保密通信包括量子密钥分发、量子安全直接通信和量子秘密共享等主要形式.在量子密钥分发和秘密共享中,传输的是随机数而不是信息,要再经过一次经典通信才能完成信息的传输.在量子信道直接传输信息的量子通信形式是量子安全直接通信.基于量子隐形传态的量子通信(简称量子隐形传态通信)是否属于量子安全直接通信尚需解释.构造了一个量子隐形传态通信方案,给出了具体的操作步骤.与一般的量子隐形传态不同,量子隐形传态通信所传输的量子态是计算基矢态,大大简化了贝尔基测量和单粒子操作.分析结果表明,量子隐形传态通信等价于包含了全用型量子密钥分发和经典通信的复合过程,不是量子安全直接通信,其传输受到中间介质和距离的影响,所以不比量子密钥分发更有优势.将该方案与量子密钥分发、量子安全直接通信和经典一次性便笺密码方案进行对比,通过几个通信参数的比较给出各个方案的特点,还特别讨论了各方案在空间量子通信方面的特点. 相似文献
18.
GUO Ying CHEN Zhi-Gang HUANG Da-Zu ZENG Gui-Hua 《理论物理通讯》2008,49(1):93-99
Exploiting the encoding process of the stabilizer quantum code [[n, k, d]], a deterministic quantum communication scheme, in which n - 1 photons are distributed forward and backward in two-way channel, is proposed to transmit the secret messages with unconditional security. The present scheme can be implemented to distribute the secret quantum (or classical) messages with great capacity in imperfect quantum channel since the utilized code encodes k-qubit messages for each scheme run. 相似文献