排序方式: 共有7条查询结果,搜索用时 171 毫秒
1
1.
2.
This paper introduces Bohmian mechanics (BM) into the
intense laser-atom physics to study high-order harmonic generation.
In BM, the trajectories of atomic electron in an intense laser field can
be obtained with the Bohm--Newton equation. The power spectrum with the
trajectory of an atomic electron is calculated, which is found to be irregular.
Next, the power spectrum associated with an atom
ensemble from BM is considered, where the power spectrum becomes
regular and consistent with that from quantum mechanics. Finally,
the reason of the generation of the irregular spectrum is discussed. 相似文献
3.
We show a deterministic secure direct communication protocol using single qubit in a mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized by the current technologies. 相似文献
4.
For Hawking radiation, treated as a tunneling process, the no-hair theorem of black hole together with the law of energy conservation is utilized to postulate that the tunneling rate only depends on the external qualities (e.g., the mass for the Schwarzschild black hole) and the energy of the radiated particle. This postulate is justified by the WKB approximation for calculating the tunneling probability. Based on this postulate, a general formula for the tunneling probability is derived without referring to the concrete form of black hole metric. This formula implies an intrinsic correlation between the successive processes of the black hole radiation of two or more particles. It also suggests a kind of entropy conservation and thus resolves the puzzle of black hole information loss in some sense. 相似文献
5.
This paper proves that it is impossible to identify orthogonally time-separated Bell states. If two qubits of a Bell state interact with the measurement apparatus at different time, any attempt to identify this state will disturb it. 相似文献
6.
Using the single-photon nonlocality, we propose a quantum novel overloading cryptography scheme, in which a single photon carries two bits information in one-way quantum channel. Two commutative modes of the single photon, the polarization mode and the spatial mode, are used to encode secret information. Strict time windows are set to detect the impersonation attack. The spatial mode which denotes the existence of photons is noncommutative with the phase of the photon, so that our scheme is secure against photon-number-splitting attack. Our protocol may be secure against individual attack. 相似文献
7.
Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology. 相似文献
1