首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  免费   5篇
物理学   5篇
  2010年   1篇
  2008年   2篇
  2007年   1篇
  2005年   1篇
排序方式: 共有5条查询结果,搜索用时 0 毫秒
1
1.
邓洪亮  方细明 《中国物理快报》2007,24(11):3051-3054
In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By" conditional Faraday- rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary" distances is obtained in a spin chain by" a proper choice of coupling strengths and using spin memory- technique improved. We also analyse the security" of the scheme against the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity- achieved by" an eavesdropper for entanglement-based cryptography.  相似文献   
2.
We propose an optical scheme to generate cluster states of atomic qubits, with each trapped in separate optical cavity, via atom-cavity-laser interaction. The quantum information of each qubit is encoded on the degenerate ground states of the atom, hence the entanglement between them is relatively stable against spontaneous emission. A single-photon source and two classical fields are employed in the present scheme. By controlling the sequence and time of atom-cavity-laser interaction, we show that the atomic cluster states can be produced deterministically.  相似文献   
3.
We propose an extension of quantum key distribution based on encoding the key into quiNits, i.e. quantum statesin an iv-dimensional Hilbert space. In our protocol, we adopt asymmetric measurement scheme resulting in an efficiency higher than previous protocols and a generalized Bell inequality [Phys. Rev. Lett. 92 (2004) 130404] is employed to detect the presence of an eavesdropper Eve. We also derive the information gained by a potential eavesdropper Eve applying a cloning-based attack and the maximal error rate which measures the robustness of the protocol. The result shows that the security of our scheme increases with the dimension N.  相似文献   
4.
This paper considers a generalized spin star system which can be solved exactly, with the central spin-1/2 system embedded in an outer ring of N spin-1/2 particles(denoted as spin bath). In this model, in addition to the central-outer interaction, each pair of nearest neighbour of the bath interacts within themselves. The general expressions of the eigenstates as well as the eigenvalues of the model are derived with the use of the symmetries of system. It analyses the quantum state transfer and the dynamical behaviour of entanglement created during quantum communication. It also analyses the efficiency of the configuration regarded as quantum phase covariant clone or decoherence model. Some interesting results are discovered concerning the properties of quantum communication in this model.  相似文献   
5.
We present an efficient one-step scheme for a single spin measurement based on nuclear magnetic resonance (NMR) techniques. This scheme considerably reduces the time of operation using a spin star network where a target spin and an ancillary spin are coupled to a ring of N spins. As opposed to the proposal in [Phys. Rev. Lett. 97 (2006) 100501] using a cubic lattice crystal to achieve a cubic speedup, the distinct advantage of this scheme is that under ideal conditions it requires the application of only one step to create a system of N correlated spins. In the process of single spin measurement, the total macroscopic magnetization, the individual magnetization and the transfer fidelity are calculated analytically as simple cosine functions of time and the amplitude of irradiation.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号