首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   5篇
物理学   7篇
  2014年   1篇
  2010年   1篇
  2008年   1篇
  2007年   2篇
  2004年   1篇
  2002年   1篇
排序方式: 共有7条查询结果,搜索用时 171 毫秒
1
1.
用一维谐振子模型计算了强激光场中的高次谐波的产生, 给出了只有束缚态存在时高次谐波会很快衰减但是不存在平台部分, 而且高次谐波并不会产生明显的截断等一系列有明确物理意义的结论.  相似文献   
2.
赖炫扬  蔡庆宇  詹明生 《中国物理 B》2010,19(2):20302-020302
This paper introduces Bohmian mechanics (BM) into the intense laser-atom physics to study high-order harmonic generation. In BM, the trajectories of atomic electron in an intense laser field can be obtained with the Bohm--Newton equation. The power spectrum with the trajectory of an atomic electron is calculated, which is found to be irregular. Next, the power spectrum associated with an atom ensemble from BM is considered, where the power spectrum becomes regular and consistent with that from quantum mechanics. Finally, the reason of the generation of the irregular spectrum is discussed.  相似文献   
3.
Deterministic Secure Communication Without Using Entanglement   总被引:17,自引:0,他引:17       下载免费PDF全文
We show a deterministic secure direct communication protocol using single qubit in a mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized by the current technologies.  相似文献   
4.
For Hawking radiation, treated as a tunneling process, the no-hair theorem of black hole together with the law of energy conservation is utilized to postulate that the tunneling rate only depends on the external qualities (e.g., the mass for the Schwarzschild black hole) and the energy of the radiated particle. This postulate is justified by the WKB approximation for calculating the tunneling probability. Based on this postulate, a general formula for the tunneling probability is derived without referring to the concrete form of black hole metric. This formula implies an intrinsic correlation between the successive processes of the black hole radiation of two or more particles. It also suggests a kind of entropy conservation and thus resolves the puzzle of black hole information loss in some sense.  相似文献   
5.
This paper proves that it is impossible to identify orthogonally time-separated Bell states. If two qubits of a Bell state interact with the measurement apparatus at different time, any attempt to identify this state will disturb it.  相似文献   
6.
Using the single-photon nonlocality, we propose a quantum novel overloading cryptography scheme, in which a single photon carries two bits information in one-way quantum channel. Two commutative modes of the single photon, the polarization mode and the spatial mode, are used to encode secret information. Strict time windows are set to detect the impersonation attack. The spatial mode which denotes the existence of photons is noncommutative with the phase of the photon, so that our scheme is secure against photon-number-splitting attack. Our protocol may be secure against individual attack.  相似文献   
7.
Quantum Key Distribution against Trojan Horse Attacks   总被引:1,自引:0,他引:1       下载免费PDF全文
蔡庆宇  吕桦 《中国物理快报》2007,24(5):1154-1157
Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号