首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1篇
  免费   2篇
数学   1篇
物理学   2篇
  2012年   1篇
  2006年   2篇
排序方式: 共有3条查询结果,搜索用时 5 毫秒
1
1.
采用CSSCI数据库中收录的全部期刊数据,通过相关分析、区间数据主成分分析等方法建立模型,客观地对整个数据库中期刊的整体特征进行全面、系统的分析,探寻其中的特征、规律以及原因,提出了办好学术期刊的一些方式方法.  相似文献   
2.
In practical quantum key distribution (QKD), weak coherent states as the photon source have a limit in the secure key rate and transmission distance because of the existence of multi-photon pulses and heavy loss in transmission line. The decoy-state method and the nonorthogonal encoding protocol are two important methods to combat these effects. Here, we combine both the methods and propose an efficient method that can substantially improve the performance of QKD. We find a 78-kin increase over the prior record using the decoy-state method and a 123-km increase over the result of the SARG04 protocol in transmission distance.  相似文献   
3.
The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal state is still an open question. We present a simple formula to analyse the problem. We also give a simple method to derive the bounds of the necessary counting rates and quantum bit error rates for BB84 and SARG04; the latter was previously proposed by Scarani et al. [Phys. Rev. Lett. 92 (2004)057901] We then propose a multi-signal-state method which employs different coherent states either as the decoy state or as the signal state to carry out quantum key distribution. We find our protocol more efficient and feasible.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号