首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
朱伟  聂敏 《物理学报》2013,62(13):130304-130304
本文提出了量子信令交换机的模型, 该交换机由经典信息控制模块、交换控制模块和量子交换模块三部分组成. 经典控制模块负责将纠缠初态信息传送给纠缠测量及交换单元并更新路由信息. 交换控制模块实现通路选择, 为纠缠对的分发提供通路. 量子交换模块制备纠缠对, 进行Bell态的测量, 完成纠缠交换. 量子信令交换机可以实现多用户间的信令传输及局域网通信. 通过对交换机的性能分析与仿真, 结果表明该交换机结构简单、安全保密、便于扩展、时延小, 对于构建量子通信网有很好的支撑作用. 关键词: 量子通信 量子信令网 量子信令交换机 纠缠交换  相似文献   

2.
叶天语 《光子学报》2014,43(5):502701
提出一个无信息泄露的受控双向量子安全直接通信协议.协议中合法通信双方Alice和Bob在控制者Charlie的控制下实现彼此秘密信息的安全交换,利用3个Bell态纠缠交换后的测量相关性来克服信息泄露问题.由于该协议仅利用Bell态作为量子资源,而且仅需要进行Bell测量,所以方便实现.安全性分析表明,该协议不仅能检测到外部窃听者的主动攻击,而且还能检测到控制者Charlie的不诚实行为,因此,具备良好的安全性.  相似文献   

3.
多数传统的指定验证者签名方案无法抵抗量子计算机的攻击.本文给出一种具有强安全性的指定验证者量子签名方案.在方案中,参与方利用量子密钥分配协议和量子直接通信协议共享密钥.密钥生成中心制备Bell态序列并将其分配给签名者和指定验证者.签名者利用其密钥和受控量子态对消息进行签名.同时,指定的验证者可以利用对称的签名步骤对量子签名进行仿真.而验证者仿真的量子签名与签名者产生的量子签名完全一样.这使得量子签名具有不可传递的属性.本文所给出的签名方案可以抵抗伪造攻击,截获重放攻击和木马攻击.并且,其理论上的信息安全属性可以得到证明.同时,密钥生成中心无需完全可信.方案无需使用量子单向函数.当产生量子签名时,签名者无需制备纠缠态序列.当验证签名时,验证者无需执行量子态比较算法.方案的量子比特效率达到100%.因此,与类似方案相比,本文所给的方案具有较好的安全性和效率.  相似文献   

4.
一种基于纠缠态的量子中继通信系统   总被引:1,自引:5,他引:1  
裴昌幸  阎毅  刘丹  韩宝彬  赵楠 《光子学报》2008,37(12):2422-2426
提出了一种基于纠缠态的量子中继通信系统,该系统应用纠缠为基本资源.纠缠为量子隐形传态和绝对安全的量子通信提供了保证.量子中继器用来延长高纠缠度的纠缠光子对的纠缠距离,利用纠缠交换和纠缠纯化在系统的发信者与受信者之间建立光子对的纠缠.应用量子隐形传态的原理传输量子信息.系统分析表明,量子通信系统的吞吐率随着通信双方成功建立纠缠的概率增大而显著增加,量子信号的传输距离取决于量子中继节点的级数.  相似文献   

5.
利用三粒子纠缠态建立量子隐形传态网络的探讨   总被引:10,自引:0,他引:10       下载免费PDF全文
周小清  邬云文 《物理学报》2007,56(4):1881-1887
利用W态纠缠源可以产生三纠缠粒子,用这些相互纠缠的粒子作为量子信道,再辅以经典信道传送Bell基联合测量信息和von Neumann测量信息,便可实现量子隐形传态网络.基于上述思想,研究了三纠缠粒子量子隐形传态网络的物理基础,得到了基于三粒子W 关键词: 量子通信 量子隐形传态 W态')" href="#">W态  相似文献   

6.
利用量子点与单模腔场共振相互作用模型提出了激子Bell类和W类纠缠态的制备方案.借助于超算符方法和态的保真度考察了所制备的激子纠缠态的消相干特性,结果表明:激子Bell类和W态的纠缠特性非常脆弱,在极短的时间里演变为消纠缠态.基于腔场与两量子点共振相互作用模型设计了一个量子交换门.  相似文献   

7.
具有双向认证功能的量子秘密共享方案   总被引:3,自引:0,他引:3       下载免费PDF全文
利用两粒子纠缠态作为经典信息的载体,结合Hash函数和量子本地操作提出了一种可以实现双向认证功能的量子秘密共享方案,并且分析了它的安全性. 这种方案的安全性基于秘密共享双方的认证密钥和传输过程中粒子排列次序的保密. 若不考虑认证和窃听检测所消耗的粒子,平均1个Bell态共享2 bit经典信息. 关键词: 量子秘密共享 认证密钥 量子双向认证 两粒子量子纠缠  相似文献   

8.
提出了一个利用六粒子最大纠缠态作为纠缠资源的双向量子控制隐形传态方案.该理论方案中,六粒子最大纠缠态作为量子通道来连系着合法的三方——通信双方和控制方,通信双方既是发送方同时也是接收方.传输过程中,Alice传输一个任意单粒子态a给Bob的同时Bob也传输一个任意的单粒子态b给Alice;由控制方Charlie来控制和协助通信双方完成最终的量子态的交换;Bob先对自己手中的粒子作一个幺正操作,用户双方再各自对自己手中的粒子执行Bell基测量,测量完成后通过经典信道将自己的测量结果公开宣布,用户双方根据对方所公布的测量结果做相应的幺正操作,从而成功地实现双向量子控制隐形传态.  相似文献   

9.
双向隐形传态方案及安全性分析   总被引:1,自引:1,他引:0  
提出了一种用Bell纠缠态作为量子信道,实现双向隐形传态的方案.通信双方Alice、Bob事先共享二对Bell纠缠态,通信开始后,Alice、Bob分别对自己拥有的部分粒子作Bell基联合测量,并将测量结果通过经典信道告诉对方.Alice、Bob根据对方提供的测量结果,做相应的幺正变换,即在己方的粒子上,再现对方要传的量子态信息,从而实现双向传态的目的.为了提高量子双向隐形传态的安全性,加入第三方控制,分析表明,通过增加控制方的粒子数可以增加系统的安全性,但增加到一定数量后,将无助于量子信道安全性的提高.  相似文献   

10.
单光子纠缠态的纠缠转移和量子隐形传态   总被引:19,自引:19,他引:0  
使用光学分束器和单光子源,利用单光子态和真空态制备出了纠缠单光子态.利用光学分束器作用和单光子探测,实现了三个通讯伙伴之间的纠缠转移.提出了一个关于纠缠单光子态的量子隐形传态方案.在这个方案中,被传送的是一个未知的单光子纠缠态.通讯双方使用的量子信道是两个单光子纠缠态.通过使用分束器作用和对输出态进行光子测量以及在经典信息的帮助下,纠缠转移和量子隐形传态的过程被完成.  相似文献   

11.
<正>In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed.In this scheme a message to be signed is coded with unitary operators.Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message.Combining the entangled states generated by the TTP’s Bell measurement with the signature information,the verifier can verify the authentication of a signature through a single quantum state measurement.Compared with previous schemes,our scheme is more efficient and less complex, furthermore,our scheme can ensure the anonymity of the signer.  相似文献   

12.
A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence coding, local collective unitary operations, and entanglement swapping. In this protocol, during the process of trans- mission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using symmetric two-dimensional states. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping.  相似文献   

13.
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making use of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.  相似文献   

14.
刘佳丽  施荣华  石金晶  吕格莉  郭迎 《中国物理 B》2016,25(8):80306-080306
A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations(corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed.An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank.  相似文献   

15.
A protocol for quantum secure direct communication by using entangled qutrits and swapping quantum entanglement is proposed. In this protocol, a set of ordered two-qutrit entangled states is used as quantum information channels for sending secret messages directly. During the process of transmission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using usual two-dimensional Bell-basis states as quantum channel. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping.  相似文献   

16.
GAO Gan 《理论物理通讯》2009,51(5):820-822
Based on entanglement swapping, a quantum key distribution (QKD) scheme is proposed. In this scheme, the secret keys are formed by comparing initial Bell states and outcomes of entanglement swapping. Moreover, all initial Bell states prepared by Alice and Bob are completely arbitrary. As the classical information exchanged between two parties is very little, this QKD scheme has a high efficiency. In addition, in order to prevent eavesdropping, decoy particles are used.  相似文献   

17.
连续变量无条件纠缠交换 --纠缠态的量子离物传送   总被引:1,自引:0,他引:1  
利用自行设计的两台非简并光学参量放大器,获得了一对具有经典相干性且量子起伏相互独立的连续变量纠缠态光场,并用它完成了连续变量的无条件纠缠交换,即纠缠态的量子离物传送.通过联合贝尔态探测与纠缠塌缩,使两个初始不纠缠而又从未发生过直接相互作用的光场产生了量子纠缠,其正交振幅和位相分量的量子起伏关联方差被直接测量,其测量值分别低于散离噪声极限1.23dB和1.12dB.理论计算与实验结果基本符合.  相似文献   

18.
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states.  相似文献   

19.
At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented by using the entanglement swapping technology for two logical Bell states. One works well over a collective-dephasing noise channel, while the other takes effect over a collective-rotation noise channel. The negative influence of noise is erased by using logical Bell states as the traveling quantum states. The problem of information leakage is avoided by swapping entanglement between two logical Bell states. In addition, only Bell state measurements are used for decoding, rather than four-qubit joint measurements.  相似文献   

20.
An experimental feasible scheme of multiparty secret sharing of classical messages is proposed, based on a cavity quantum electrodynamic system. The secret messages are imposed on atomic Bell states initially in the sender's possession by local unitary operations. By swapping quantum entanglement of atomic Bell states, the secret messages are split into several parts and each part is distributed to a separate party. In this case, any subset of the entire party group can not read out the secret message but the entirety via mutual cooperations. In this scheme, to discriminate atomic Bell states, additional classical fields are employed besides the same highlydetuned single-mode cavities used to prepare atomic Bell states. This scheme is insensitive to the cavity decay and the thermal field, and usual joint Bell-state measurements are unnecessary.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号