排序方式: 共有57条查询结果,搜索用时 15 毫秒
31.
量子信息讲座续讲
第二讲 量子信息安全系统 总被引:2,自引:0,他引:2
详细介绍了量子密码的相关内容,包括量子密码理论基础、量子保密系统、量子认证系统、量子密码与其他学科的关系以及量子密码的应用与展望,并追踪了量子信息安全系统的最新研究进展. 相似文献
32.
高速的安全量子密钥传输对于实际应用有很大的意义,本文从提高密钥分发的速率为出发点,提出一种基于FPGA的高速连续变量量子密钥分发的解决方案。从而有望使安全密钥分发的速率在长距离传输下达到Mbps数量级。 相似文献
33.
34.
We find that second-order coherence as well as a Hanbury-Brown-Twiss intensity interferometer may provide an optimal approach for eavesdropping detection in the quantum key distribution based on two-mode squeezed vacuum states. With this approach, eavesdropping can be easily detected without sacrificing extra secret bits as the test key. In addition, the efficiency of the quantum key distribution protocol is enhanced greatly. 相似文献
35.
36.
37.
Motivated by the complementary relations of the Greenberger-Horne-Zeilinger (GHZ) entangled tripletparticle states, a novel way of realizing quantum distributed ballot scheme is proposed. The ballot information is encoded by local operations performed on the particles of entangled GHZ triplet states, which ensures the security of the present scheme. In order to guarantee the security of this scheme, the checking phase is designed in detail on the basis of the entangled GHZ triplet state. The analysis shows the security of the proposed scheme. 相似文献
38.
A polarization diversity receiver scheme is presented for improving efficiency of balance homodyne detection. The proposed scheme may mitigate polarization fluctuation between signal and local oscillator field. With simple linear optical component and electronic processing circuit, the noise caused by differential phase and polarization mode between signed and local oscillators may be significantly decreased. To track the polarization fluctuation, a novel algorithm based on polarization diversity receiver which can achieve better performance in terms of linear quantum optics principle is proposed. 相似文献
39.
In this paper security of the quantum key distribution scheme using
correlations of continuous variable Einstein--Podolsky--Rosen (EPR)
pairs is investigated. A new approach for calculating the secret
information rate Δ I is proposed by using the Shannon
information theory. Employing an available parameter F which is
associated with the entanglement of the EPR pairs, one can detect
easily the eavesdropping. Results show that the proposed scheme is
secure against individual beam splitter attack strategy with a
proper squeeze parameter. 相似文献
40.
This paper proposes a deterministic quantum key distribution scheme based
on Gaussian-modulated continuous variable EPR correlations. This
scheme can implement fast and efficient key distribution. The
security is guaranteed by continuous variable EPR entanglement correlations
produced by nondegenerate optical parametric amplifier. For
general beam splitter eavesdropping strategy, the secret
information rate $\Delta I=I(\alpha,\beta)-I(\alpha,\epsilon)$ is
calculated in view of Shannon information theory. Finally the
security analysis is presented. 相似文献