排序方式: 共有75条查询结果,搜索用时 93 毫秒
51.
52.
53.
Motivated by the complementary relations of the Greenberger-Horne-Zeilinger (GHZ) entangled tripletparticle states, a novel way of realizing quantum distributed ballot scheme is proposed. The ballot information is encoded by local operations performed on the particles of entangled GHZ triplet states, which ensures the security of the present scheme. In order to guarantee the security of this scheme, the checking phase is designed in detail on the basis of the entangled GHZ triplet state. The analysis shows the security of the proposed scheme. 相似文献
54.
A polarization diversity receiver scheme is presented for improving efficiency of balance homodyne detection. The proposed scheme may mitigate polarization fluctuation between signal and local oscillator field. With simple linear optical component and electronic processing circuit, the noise caused by differential phase and polarization mode between signed and local oscillators may be significantly decreased. To track the polarization fluctuation, a novel algorithm based on polarization diversity receiver which can achieve better performance in terms of linear quantum optics principle is proposed. 相似文献
55.
本文基于量子图态的几何结构特征,利用生成矩阵分割法,提出了一种量子秘密共享方案.利用量子图态基本物理性质中的稳定子实现信息转移的模式、秘密信息的可扩展性以及新型的组恢复协议,为安全的秘密共享协议提供了多重保障.更重要的是,方案针对生成矩阵的循环周期问题和因某些元素不存在本原元而不能构造生成矩阵的问题提出了有效的解决方案.在该方案中,利用经典信息与量子信息的对应关系提取经典信息,分发者根据矩阵分割理论获得子秘密集,然后将子秘密通过酉操作编码到量子图态中,并分发给参与者,最后依据该文提出的组恢复协议及图态相关理论得到秘密信息.理论分析表明,该方案具有较好的安全性及信息的可扩展性,适用于量子网络通信中的秘密共享,保护秘密数据并防止泄露. 相似文献
56.
Balancing four-state continuous-variable quantum key distribution with linear optics cloning machine 下载免费PDF全文
We show that the secret key generation rate can be balanced with the maximum secure distance of four-state continuous-variable quantum key distribution(CV-QKD) by using the linear optics cloning machine(LOCM). Benefiting from the LOCM operation, the LOCM-tuned noise can be employed by the reference partner of reconciliation to achieve higher secret key generation rates over a long distance. Simulation results show that the LOCM operation can flexibly regulate the secret key generation rate and the maximum secure distance and improve the performance of four-state CV-QKD protocol by dynamically tuning parameters in an appropriate range. 相似文献
57.
In this paper security of the quantum key distribution scheme using
correlations of continuous variable Einstein--Podolsky--Rosen (EPR)
pairs is investigated. A new approach for calculating the secret
information rate Δ I is proposed by using the Shannon
information theory. Employing an available parameter F which is
associated with the entanglement of the EPR pairs, one can detect
easily the eavesdropping. Results show that the proposed scheme is
secure against individual beam splitter attack strategy with a
proper squeeze parameter. 相似文献
58.
This paper proposes a deterministic quantum key distribution scheme based
on Gaussian-modulated continuous variable EPR correlations. This
scheme can implement fast and efficient key distribution. The
security is guaranteed by continuous variable EPR entanglement correlations
produced by nondegenerate optical parametric amplifier. For
general beam splitter eavesdropping strategy, the secret
information rate $\Delta I=I(\alpha,\beta)-I(\alpha,\epsilon)$ is
calculated in view of Shannon information theory. Finally the
security analysis is presented. 相似文献
59.
60.
Gaussian-modulated coherent state quantum key distribution is gradually moving towards practical application. Generally, the involved scheme is based on the binary random basis choice. To improve the performance and security, we present a scheme based on a continuous random basis choice. The results show that our scheme obviously improves the performance, such as the secure communication distance. Our scheme avoids comparing the measurement basis and discarding the key bits, and it can be easily implemented with current technology. Moreover, the imperfection of the basis choice can be well removed by the known phase compensation algorithm. 相似文献