首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  免费   52篇
  国内免费   2篇
数学   2篇
物理学   73篇
  2022年   3篇
  2021年   1篇
  2020年   1篇
  2019年   2篇
  2018年   5篇
  2017年   3篇
  2016年   4篇
  2015年   3篇
  2014年   3篇
  2013年   2篇
  2012年   2篇
  2011年   5篇
  2010年   3篇
  2009年   6篇
  2008年   5篇
  2007年   6篇
  2006年   2篇
  2005年   4篇
  2002年   1篇
  2001年   1篇
  2000年   2篇
  1999年   2篇
  1998年   1篇
  1997年   3篇
  1996年   3篇
  1995年   2篇
排序方式: 共有75条查询结果,搜索用时 281 毫秒
1.
理论分析相干态位移参数估计在弱测量方法下的放大效应.引入偏振态作为附属态(Ancilla States),分别进行初选择和后选择,中间的相互作用采用了偏振相关的弱位移操作算符.通过最后检测光子数的分布来估计位移参数;在牺牲检测光子强度的情况下可以有效提高放大效应.  相似文献   
2.
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function,together with high-dimensional superdense-coding, provide convenience, security, and large capability quantum channel forsecret distribution and recovering. Analysis shows the security of the scheme.  相似文献   
3.
杨芳丽  郭迎  石金晶  王焕礼  潘矜矜 《中国物理 B》2017,26(10):100303-100303
A modified continuous-variable quantum key distribution(CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator(LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection.  相似文献   
4.
Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable(CV) quantum key distribution(QKD) based air-to-water channel. The effects of the absorption and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously.Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle.  相似文献   
5.
崔挺  黄靖正  刘翔  曾贵华 《中国物理 B》2016,25(2):20301-020301
We propose a new framework combining weak measurement and second-order correlated technique.The theoretical analysis shows that weak value amplification(WVA) experiment can also be implemented by a second-order correlated system.We then build two-dimensional second-order correlated function patterns for achieving higher amplification factor and discuss the signal-to-noise ratio influence.Several advantages can be obtained by our proposal.For instance,detectors with high resolution are not necessary.Moreover,detectors with low saturation intensity are available in WVA setup.Finally,type-one technical noise can be effectively suppressed.  相似文献   
6.
施荣华  肖伊  石金晶  郭迎 《中国物理 B》2016,25(6):60301-060301
We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy.The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission,which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states.It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security,especially in large-scale votes.  相似文献   
7.
We propose a method to improve the secret key rate of an eight-state continuous-variable quantum key distribution(CVQKD) by using a linear optics cloning machine(LOCM). In the proposed scheme, an LOCM is exploited to compensate for the imperfections of Bob's apparatus, so that the generated secret key rate of the eight-state protocol could be well enhanced. We investigate the security of our proposed protocol in a finite-size scenario so as to further approach the practical value of a secret key rate. Numeric simulation shows that the LOCM with reasonable tuning gain λ and transmittance τcan effectively improve the secret key rate of eight-state CVQKD in both an asymptotic limit and a finite-size regime.Furthermore, we obtain the tightest bound of the secure distance by taking the finite-size effect into account, which is more practical than that obtained in the asymptotic limit.  相似文献   
8.
We extend an optimal entanglement distillation of the triplet Greenberger-Horne-Zeilinger (GHZ) state via entanglement concentrating in the three-partite partially electron-spin-entangled systems. Two entanglement concen- tration protocols are similarly designed in detail with the post-selection in quantum-dot (QD) and micro-cavity coupled systems. The proposed protocol can be repeated several rounds to achieve an optimal success probability with an as- sistance of the ancillary QD, where only the single photon needs to pass through the micro-cavity for each round. It increases the total success probability of the distillation even if the implemented cavity is imperfect in practice during the whole process.  相似文献   
9.
李渊  曾贵华 《中国物理》2007,16(10):2875-2879
In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. The proposed scheme involves two phases, i.e. a secret sharing phase and a secret phase. Detailed proofs show that the proposed scheme is of unconditional security. Since the secret is shared among three participants, the proposed scheme may be applied to quantum key distribution and secret sharing.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号