首页 | 本学科首页   官方微博 | 高级检索  
     

Quantum Cryptography in Spin Networks
引用本文:邓洪亮 方细明. Quantum Cryptography in Spin Networks[J]. 中国物理快报, 2007, 24(11): 3051-3054
作者姓名:邓洪亮 方细明
作者单位:Key Laboratory of Quantum Structure and Quantum Control of Ministry of education and Department of Physics, Hunan Normal University; Ghangsha 410081
基金项目:Supported by the National Science Foundation under Grant No 2007CB925204.
摘    要:In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By" conditional Faraday- rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary" distances is obtained in a spin chain by" a proper choice of coupling strengths and using spin memory- technique improved. We also analyse the security" of the scheme against the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity- achieved by" an eavesdropper for entanglement-based cryptography.

关 键 词:量子密码 自旋结网圈 圈量子引力 量子学
收稿时间:2007-03-13

Quantum Cryptography in Spin Networks
DENG Hong-Liang,FANG Xi-Ming. Quantum Cryptography in Spin Networks[J]. Chinese Physics Letters, 2007, 24(11): 3051-3054
Authors:DENG Hong-Liang  FANG Xi-Ming
Affiliation:Key Laboratory of Quantum Structure and Quantum Control of Ministry of education and Department of Physics, Hunan Normal University, Changsha 410081
Abstract:In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By conditional Faraday rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary distances is obtained in a spin chain by a proper choice of coupling strengths and using spin memory technique improved. We also analyse the security of the schemeagainst the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity achieved by an eavesdropper for entanglement-based cryptography.
Keywords:03.67.Dd  78.67.Hc  03.67.-a
本文献已被 维普 等数据库收录!
点击此处可从《中国物理快报》浏览原始摘要信息
点击此处可从《中国物理快报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号