排序方式: 共有75条查询结果,搜索用时 281 毫秒
1.
2.
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function,together with high-dimensional superdense-coding, provide convenience, security, and large capability quantum channel forsecret distribution and recovering. Analysis shows the security of the scheme. 相似文献
3.
Improving continuous-variable quantum key distribution under local oscillator intensity attack using entanglement in the middle 下载免费PDF全文
A modified continuous-variable quantum key distribution(CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator(LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection. 相似文献
4.
Security Simulation of Continuous-Variable Quantum Key Distribution over Air-to-Water Channel Using Monte Carlo Method 下载免费PDF全文
Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable(CV) quantum key distribution(QKD) based air-to-water channel. The effects of the absorption and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously.Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle. 相似文献
5.
We propose a new framework combining weak measurement and second-order correlated technique.The theoretical analysis shows that weak value amplification(WVA) experiment can also be implemented by a second-order correlated system.We then build two-dimensional second-order correlated function patterns for achieving higher amplification factor and discuss the signal-to-noise ratio influence.Several advantages can be obtained by our proposal.For instance,detectors with high resolution are not necessary.Moreover,detectors with low saturation intensity are available in WVA setup.Finally,type-one technical noise can be effectively suppressed. 相似文献
6.
We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy.The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission,which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states.It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security,especially in large-scale votes. 相似文献
7.
Finite-size analysis of eight-state continuous-variable quantum key distribution with the linear optics cloning machine 下载免费PDF全文
We propose a method to improve the secret key rate of an eight-state continuous-variable quantum key distribution(CVQKD) by using a linear optics cloning machine(LOCM). In the proposed scheme, an LOCM is exploited to compensate for the imperfections of Bob's apparatus, so that the generated secret key rate of the eight-state protocol could be well enhanced. We investigate the security of our proposed protocol in a finite-size scenario so as to further approach the practical value of a secret key rate. Numeric simulation shows that the LOCM with reasonable tuning gain λ and transmittance τcan effectively improve the secret key rate of eight-state CVQKD in both an asymptotic limit and a finite-size regime.Furthermore, we obtain the tightest bound of the secure distance by taking the finite-size effect into account, which is more practical than that obtained in the asymptotic limit. 相似文献
8.
We extend an optimal entanglement distillation of the triplet Greenberger-Horne-Zeilinger (GHZ) state via entanglement concentrating in the three-partite partially electron-spin-entangled systems. Two entanglement concen- tration protocols are similarly designed in detail with the post-selection in quantum-dot (QD) and micro-cavity coupled systems. The proposed protocol can be repeated several rounds to achieve an optimal success probability with an as- sistance of the ancillary QD, where only the single photon needs to pass through the micro-cavity for each round. It increases the total success probability of the distillation even if the implemented cavity is imperfect in practice during the whole process. 相似文献
9.
In this paper, by using properties of quantum controlled-not
manipulation and entanglement states, we have designed a novel (2,
3) quantum threshold scheme based on the Greenberger- Horne
-Zeilinger (GHZ) state. The proposed scheme involves two phases,
i.e. a secret sharing phase and a secret phase. Detailed proofs
show that the proposed scheme is of unconditional security. Since
the secret is shared among three participants, the proposed scheme
may be applied to quantum key distribution and secret sharing. 相似文献
10.