首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1篇
  免费   1篇
数学   1篇
物理学   1篇
  2023年   1篇
  2011年   1篇
排序方式: 共有2条查询结果,搜索用时 0 毫秒
1
1.
陈明娟  刘翔 《中国物理 B》2011,20(10):100305-100305
The most severe problem of a two-way "plug-and-play" (p & p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an üntrusted source". This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered.  相似文献   
2.
We consider the fourth-order nonlinear Schr?dinger equation(4NLS)(i?t+εΔ+Δ2)u=c1um+c2(?u)um-1+c3(?u)2um-2,and establish the conditional almost sure global well-posedness for random initial data in Hs(Rd) for s ∈(sc-1/2,sc],when d≥3 and m≥5,where sc:=d/2-2/(m-1) is the scaling critical regularity of 4NLS with the second order derivative nonlinea...  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号