排序方式: 共有75条查询结果,搜索用时 218 毫秒
11.
We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy.The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission,which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states.It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security,especially in large-scale votes. 相似文献
12.
We propose a new framework combining weak measurement and second-order correlated technique.The theoretical analysis shows that weak value amplification(WVA) experiment can also be implemented by a second-order correlated system.We then build two-dimensional second-order correlated function patterns for achieving higher amplification factor and discuss the signal-to-noise ratio influence.Several advantages can be obtained by our proposal.For instance,detectors with high resolution are not necessary.Moreover,detectors with low saturation intensity are available in WVA setup.Finally,type-one technical noise can be effectively suppressed. 相似文献
13.
14.
Parameter estimation of continuous variable quantum key distribution system via artificial neural networks 下载免费PDF全文
Continuous-variable quantum key distribution(CVQKD)allows legitimate parties to extract and exchange secret keys.However,the tradeoff between the secret key rate and the accuracy of parameter estimation still around the present CVQKD system.In this paper,we suggest an approach for parameter estimation of the CVQKD system via artificial neural networks(ANN),which can be merged in post-processing with less additional devices.The ANN-based training scheme,enables key prediction without exposing any raw key.Experimental results show that the error between the predicted values and the true ones is in a reasonable range.The CVQKD system can be improved in terms of the secret key rate and the parameter estimation,which involves less additional devices than the traditional CVQKD system. 相似文献
15.
In this paper, by using properties of quantum controlled-not
manipulation and entanglement states, we have designed a novel (2,
3) quantum threshold scheme based on the Greenberger- Horne
-Zeilinger (GHZ) state. The proposed scheme involves two phases,
i.e. a secret sharing phase and a secret phase. Detailed proofs
show that the proposed scheme is of unconditional security. Since
the secret is shared among three participants, the proposed scheme
may be applied to quantum key distribution and secret sharing. 相似文献
16.
17.
18.
研究了光学双稳系统在处理带噪声周期信号时的一种新的功能,并对输入任意周期小信号时的输出特性进行了研究。 相似文献
19.
20.
Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack 下载免费PDF全文
For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack. 相似文献