首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We present a method for calculating the various spin amplitudes for QED processes in which an arbitrary number of photons is radiated in directions nearly parallel to the fermion directions. This is accomplished by introducing explicit polarization vectors for the photons and by working in the high energy limit, where finite mass effects are treated in leading order.  相似文献   

2.
Quantum dense coding (QDC) is a process originally proposed to send two classical bits information from a sender to a receiver by sending only one qubit. Our scheme of QDC is proposed following some ideas on secret sharing with entanglement in cavity QED. Based on the theory of secret sharing the QDC process can be more secure.  相似文献   

3.
应用BFV路径积分量子化方案,给出含Chern-Simons项的标量电动力学的量子化,得到了量子系统守恒的能量、动量和角动量,指出在量子水平上系统具有分数自旋性质.  相似文献   

4.
超强激光驱动的辐射反作用力效应与极化粒子加速   总被引:2,自引:0,他引:2       下载免费PDF全文
光强超过10~(22) W/cm~2的极端超强激光将光与物质的相互作用推进到辐射主导区域,激发高能伽马光子辐射,产生明显的辐射反作用力效应.辐射反作用力可以显著影响强场中带电粒子的动力学行为,并从根本上改变了极端强场区域的激光等离子体相互作用规律.如何理解和验证辐射反作用力效应是强场物理研究的核心内容之一.本文结合该方向的国内外研究进展,论述了辐射反作用力的经典形式与强场量子电动力学的理论计算与模拟方法,详细讨论了单粒子在强场中的反射、量子随机辐射、自旋-辐射耦合等效应,介绍了激光等离子体相互作用中的电子冷却、辐射俘获、高效伽马辐射等机制,并给出了目前辐射反作用力效应的实验验证方法与进展.针对自旋在强场量子电动力学方面的效应,介绍了激光加速产生极化粒子源的方法.  相似文献   

5.
We report the implementation of projective measurement on a single 1/2 nuclear spin of the (171)Yb atom by measuring the polarization of cavity-enhanced fluorescence. To obtain cavity-enhanced fluorescence having a nuclear-spin-dependent polarization, we construct a two-mode cavity QED system, in which two cyclic transitions are independently coupled to each of the orthogonally polarized cavity modes, by manipulating the energy level of (171)Yb. This system can associate the nuclear spin degrees of freedom with the polarization of photons, which will facilitate the development of hybrid quantum systems.  相似文献   

6.
提出了一个基于腔QED技术的量子信息的多方秘密共享方案.该方案不受腔的衰减和热场的影响,并考虑了几种可能偷听下的安全性.  相似文献   

7.
We propose a quantum key distribution (QKD) scheme based on entanglement swapping. In this scheme, the methods to form secret keys are so interesting. By comparing initial Bell state and outcome of entanglement swapping, the secret keys between Alice and Bob are generated involuntarily.  相似文献   

8.
用QED理论建立多电子原子的精细结构哈密顿   总被引:22,自引:8,他引:14  
利用QED理论,采用一种类似于代数的方法,建立了多电子原子的精细结构哈密顿,并将自旋-其他轨道、自旋-自旋以及轨道-轨道等相互作用项转化成便于计算的球张量形式.  相似文献   

9.

A quantum dialogue scheme based on entanglement swapping and Hadamard operation via cavity QED is proposed, which effectively uses the evolution law of atom in cavity QED. The proposed scheme uses Bell states and GHZ states as quantum resource and only needs single-atom measurements. The proposed scheme is secure against active attacks from an eavesdropper and can transmit 4 secret bits per round communication.

  相似文献   

10.
Two different kinds of synchronization have been applied to cryptography: synchronization of chaotic maps by one common external signal and synchronization of neural networks by mutual learning. By combining these two mechanisms, where the external signal to the chaotic maps is synchronized by the nets, we construct a hybrid network which allows a secure generation of secret encryption keys over a public channel. The security with respect to attacks, recently proposed by Shamir et al., is increased by chaotic synchronization.  相似文献   

11.
In this review we consider the high energy processes in QED frames in peripherical kinematics. The key feature of this kinematics is that processes have a large cross section which do not decrease with the increasing of the initial center of mass energy. Two purposes to study peripheral processes are: the background processes with large total cross sections and the structure of jets in the fragmentation region.We describe the various QED peripherical processes in terms of Impact Factors and give the explicit expressions for the differential distributions and spin correlation effects, as well as estimates of the total cross section of peripheral processes in photon-photon, photon-lepton and lepton-lepton collisions.A special attention is paid to the small-angle Bhabha scattering process which is relevant for beam monitoring at LEP I, LEP II.Based on analytical properties of the amplitudes some relations (QED sum rules) between the high energy asymptotic of the cross sections of inelastic processes in e + e ? collisions and higher order perturbative contributions to the electron Dirac and Pauli form-factors are derived.For practical using we present some loop momentum integrals.  相似文献   

12.
We present finite temperature (T) extension of the (2+1)-dimensional QED (QED3) theory of under-doped cuprates. The theory describes nodal quasiparticles whose interactions with quantum proliferated hc/2e vortex-antivortex pairs are represented by an emergent U(1) gauge field. Finite T introduces a scale beyond which the spatial fluctuations of vorticity are suppressed. As a result, the spin susceptibility of the pseudogap state is bounded by T2 at low T and crosses over to approximately T at higher T, while the low-T specific heat scales as T2, reflecting the thermodynamics of QED3. The Wilson ratio vanishes as T-->0; the pseudogap state is a "thermal (semi)metal" but a "spin-charge dielectric." This non-Fermi liquid behavior originates from two general principles: spin correlations induced by "gauge" interactions of quasiparticles and fluctuating vortices and the "relativistic" scaling of the T=0 fixed point.  相似文献   

13.
A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED together with the Hadamard operation. The quantum steganography protocol is insensitive to cavity decay and the thermal field. The capacity, imperceptibility and security against eavesdropping are analyzed in detail in the protocol. It turns out that the protocol not only has good imperceptibility but also possesses good security against eavesdropping. In addition, its capacity for a hidden channel achieves five bits, larger than most of the previous quantum steganography protocols.  相似文献   

14.
An experimentally feasible scheme to securely distribute and reconstruct a single-atom quantum state between two parties via a tripartite entangled state in cavity QED has been proposed. If they collaborate, both users can reconstruct and read the distributed secret information.  相似文献   

15.

Quantum networks can extend the advantages of quantum key distribution protocols to more than two remote participants. Based on Shamir threshold secret sharing scheme, a new quantum key agreement protocol on a quantum network with any number of participants is proposed. First, each participant and distributor negotiate a sub-secret key using a kind of quantum key distribution protocol, and then each of these participants, as distributor, shares these sub-secret keys with other participants using Shamir threshold secret sharing scheme. Furthermore, each participant combines all these shared sub-secret keys and his own sub-secret key in sequence to form secret key, and sends the hash function values of this secret key to the master distributor to authenticate, finally they obtain the security key. Our scheme is practical and secure, and it can also prevent fraudulent from participants.

  相似文献   

16.
Post-processing is indispensable in quantum key distribution(QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.  相似文献   

17.
The quantized stationary spin wave modes in one-dimensional antiferromagnetic spin chains with easy axis on-site anisotropy have been studied by means of Landau-Lifshitz-Gilbert spin dynamics. We demonstrate that the confined antiferromagnetic chains show a unique behavior having no equivalent, neither in ferromagnetism nor in acoustics. The discrete energy dispersion is split into two interpenetrating n and n' levels caused by the existence of two sublattices. The oscillations of individual sublattices as well as the standing wave pattern strongly depend on the boundary conditions. Particularly, acoustical and optical antiferromagnetic spin waves in chains with boundaries fixed (pinned) on different sublattices can be found, while an asymmetry of oscillations appears if the two pinned ends belong to the same sublattice.  相似文献   

18.
This paper will put forward a novel chaotic image encryption algorithm with confusion–diffusion architecture. First of all, secret keys will be processed by key generator before they can really be used in the encryption scheme, and in this stage this paper associates plain image with secret keys; Secondly, by imitating the trajectory of water wave movement, encryption algorithm will do scrambling operations to the image. Thirdly, this paper combines water drop motion and dynamic look up table to realize diffusion operations. For an 8 bits pixel, this algorithm will just dispose the higher 4 bits, which is because the higher 4 bits contain the vast majority of information of the image. At last, the experiment results and security analysis show that this proposed algorithm has a desirable encryption effect. Its key space is large enough, it is sensitive to keys and plain image, its encryption speed is fast and it can resist cryptanalysis such as brute attack, differential attack, etc.  相似文献   

19.
The quantum electrodynamic (QED) corrections to the coupling energy of valence electrons in heavy and superheavy nuclei are calculated in the effective local-potential approximation, as well as by the Hartree-Fock-Dirac self-consistent method. It is clearly shown that the contribution from the QED corrections is within the accuracy of modern calculations, which do not take into account QED effects. It is shown that, in certain cases, to exactly calculate the coupling energy of electrons in heavy and superheavy atoms, it is necessary to take into account the self-consistency, which shows that the inaccuracy of the use of the method of the effective local potential in calculations of QED effects can exceed 10%, which is also within the limits of calculations of the coupling energy without taking into account QED effects.  相似文献   

20.
A novel multiple color-image fusion and watermarking using optical interference and wavelet transform is proposed. In this method, each secret color image is encoded into three phase-only masks (POMs). One POM is constructed as user identity key and the other two POMs are generated as user identity key modulated by corresponding secret color image in gyrator transform domain without using any time-consuming iterative computations or post-processing of the POMs to remove inherent silhouette problem. The R, G, and B channels of different user identity keys POM are then individually multiplied to get three multiplex POMs, which are exploited as encrypted images. Similarly the R, G, and B channels of other two POMs are independently multiplied to obtain two sets of three multiplex POMs. The encrypted images are fused with gray-level cover image to produce the final encrypted image as watermarked image. The secret color images are shielded by encrypted images (which have no information about secret images) as well as cover image (which reveals no information about encrypted images). These two remarkable features of the proposed system drastically reduce the probability of the encrypted images to be searched and attacked. Each individual user has an identity key and two phase-only keys as three decryption keys besides transformation angles regarded as additional keys. Theoretical analysis and numerical simulation results validate the feasibility of the proposed method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号