排序方式: 共有2条查询结果,搜索用时 0 毫秒
1
1.
The most severe problem of a two-way "plug-and-play" (p & p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an üntrusted source". This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered. 相似文献
2.
We consider the fourth-order nonlinear Schr?dinger equation(4NLS)(i?t+εΔ+Δ2)u=c1um+c2(?u)um-1+c3(?u)2um-2,and establish the conditional almost sure global well-posedness for random initial data in Hs(Rd) for s ∈(sc-1/2,sc],when d≥3 and m≥5,where sc:=d/2-2/(m-1) is the scaling critical regularity of 4NLS with the second order derivative nonlinea... 相似文献
1