排序方式: 共有57条查询结果,搜索用时 0 毫秒
1.
2.
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext space expanded greatly. The security of the proposed algorithm is analysed in detail and the schematic physical implementation is also provided. It is shown that the algorithm, which can prevent quantum attack strategy as well as classical attack strategy, is effective to protect qubits. Finally, we extend our algorithm to encrypt classical binary bits and quantum entanglements. 相似文献
3.
4.
In this paper, by using properties of quantum controlled-not
manipulation and entanglement states, we have designed a novel (2,
3) quantum threshold scheme based on the Greenberger- Horne
-Zeilinger (GHZ) state. The proposed scheme involves two phases,
i.e. a secret sharing phase and a secret phase. Detailed proofs
show that the proposed scheme is of unconditional security. Since
the secret is shared among three participants, the proposed scheme
may be applied to quantum key distribution and secret sharing. 相似文献
5.
6.
7.
密钥协商是量子密钥分发(QKD)中的重要组成部分.Cascade协议是实际中使用最广泛的量子密钥协商协议.本文基于[6]的工作提出一种对Cascade协议的改进方案.计算机仿真显示我们的方案比原始Cascade和一些其它改进方案有更高的效率. 相似文献
8.
We propose a new framework combining weak measurement and second-order correlated technique.The theoretical analysis shows that weak value amplification(WVA) experiment can also be implemented by a second-order correlated system.We then build two-dimensional second-order correlated function patterns for achieving higher amplification factor and discuss the signal-to-noise ratio influence.Several advantages can be obtained by our proposal.For instance,detectors with high resolution are not necessary.Moreover,detectors with low saturation intensity are available in WVA setup.Finally,type-one technical noise can be effectively suppressed. 相似文献
9.
10.