首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
邓洪亮  方细明 《中国物理快报》2007,24(11):3051-3054
In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By" conditional Faraday- rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary" distances is obtained in a spin chain by" a proper choice of coupling strengths and using spin memory- technique improved. We also analyse the security" of the scheme against the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity- achieved by" an eavesdropper for entanglement-based cryptography.  相似文献   

2.
Quantum teleportation is of significant meaning in quantum information. In this paper, we study the probabilistic teleportation of a two-qubit entangled state via a partially entangled Greenberger- Horne-Zeilinger (GHZ) state when the quantum channel information is only available to the sender. We formulate it as an unambiguous state discrimination problem and derive exact optimal positive-operator valued measure (POVM) operators for maximizing the probability of unambiguous discrimination. Only one three-qubit POVM for the sender, one two-qubit unitary operation for the receiver, and two cbits for outcome notification are required in this scheme. The unitary operation is given in the form of a concise formula, and the fidelity is calculated. The scheme is further extended to more general case for transmitting a two-qubit entangled state prepared in arbitrary form. We show this scheme is flexible and applicable in the hop-by-hop teleportation situation.  相似文献   

3.
Two nonlocal and unknown pure qubit states can, with a certain probability of success, be discriminated unambiguously with the aid of local operations, classical communication, and shared entanglements (LOCCSE). We present a scheme for such kind of nonlocal unambiguous quantum state discrimination. This scheme consists of a nonlocal positive operator valued measurement (POVM). This nonlocal POVM can be realized by performing nonlocal unitary operations on initial system and ancillary qubits, and local von Neumann projective measurements on the ancilla plus initial system. By utilizing the degrees of freedom of the original system Hilbert space, we need far more simpler operations than those required by the original Neumark approach. We construct a quantum logic network to implement the required nonlocal POVM.  相似文献   

4.
Quantum asymmetric cryptography with symmetric keys   总被引:1,自引:0,他引:1  
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstrated.  相似文献   

5.
Positive-operator-value-measurement (POVM) is one of the essential components of quantum information processing ( QIP). Recently a 'binary measurement tree' (BST) strategy (PRA 77, 052104) is suggested for implementing arbitrary POVM by sequential two-operator POVMs. We present a simple novel two-operator POVM module via linear optics, which is employed as block to construct a 'binary measurement tree' for implementing arbitrary POVM on single photonic polarization qubit. The total complexity of the experimental setup is significantly reduced in contrast to the previous works. As an example, we give the detailed settings of a well-known POVM.  相似文献   

6.
A quantum scheme for an optimal attack on protocol BB84, the most studied protocol of quantum cryptography, is constructed. The physical implementation of this scheme on the basis of linear fiber-optical elements and the two-particle “controlled NOT” quantum transformation is proposed.  相似文献   

7.
Positive-operator-value measurement (POVM) is the most general class of quantum measurement. We propose a scheme to deterministically implement arbitrary POVMs of single atomic qubit via cavity QED catalysed by only one ancilla atomic qubit. By appropriately entangling two atomic qubits and sequentially measuring the ancilla qubit, any POVM can be implemented step by step. As an application of our scheme, the realization of a specific POVM for optimal unambiguous discrimination (OUD) between two nonorthogonal states is given.  相似文献   

8.
In this Letter, first, we investigate the security of a continuous-variable quantum cryptographic scheme with a postselection process against individual beam splitting attack. It is shown that the scheme can be secure in the presence of the transmission loss owing to the postselection. Second, we provide a loss limit for continuous-variable quantum cryptography using coherent states taking into account excess Gaussian noise on quadrature distribution. Since the excess noise is reduced by the loss mechanism, a realistic intercept-resend attack which makes a Gaussian mixture of coherent states gives a loss limit in the presence of any excess Gaussian noise.  相似文献   

9.
张盛  王剑  唐朝京 《中国物理 B》2012,21(6):60303-060303
Counterfactual quantum cryptography,recently proposed by Noh,is featured with no transmission of signal particles.This exhibits evident security advantages,such as its immunity to the well-known photon-number-splitting attack.In this paper,the theoretical security of counterfactual quantum cryptography protocol against the general interceptresend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin’s proposal [Phys.Rev.A 82 042335(2010)].It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses,by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.  相似文献   

10.
《Physics letters. A》2020,384(30):126760
Quantum discord is a measure based on local projective measurements which captures quantum correlations that may not be fully captured by entanglement. A change in the measurement process, achieved by replacing rank-one projectors with a weak positive operator-valued measure (POVM), allows one to define weak variants of quantum discord. In this work, we experimentally simulate the effect of a weak POVM on a nuclear magnetic resonance quantum information processor. The two-qubit system under investigation is part of a three-qubit system, where one of the qubits is used as an ancillary to implement the phase damping channel. The strength of the weak POVM is controlled by varying the strength of the phase damping channel. We experimentally observed two weak variants of quantum discord namely, super quantum discord and weak quantum discord, in two-qubit Werner and Bell-diagonal states. The resultant dynamics of the states is investigated as a function of the measurement strength.  相似文献   

11.

In today’s era, a fascinating discipline is immensely influencing a wide miscellany in different fields of science and technology known as quantum cryptography. The amalgamation of different unconventional themes of information security and fast computing have appended inventiveness and creativity into the performance of quantum systems which exhibits astonishing outcomes surprisingly for the most complicated nonlinear models. The exploitation of chaos theory at quantum scale is a dynamical new approach towards the system of information security. Regarding this a novel image encryption approach based on modern standards of chaos, fast computing and quantum encryption has been proposed in this article. In the designed scheme, Walsh transformation is exploited to get standard image compression as to reduce data being processed resulting in fast computing. Quantum spinning and rotation operators leading new protocols, compressed data is encrypted using quantum spinning and rotation operators. For adding more confusion capability in contemplated algorithm discrete fractional chaotic Lorenz system is also accomplished. The proposed system has been validated through statistical analysis, the assessments accordingly by statistical analysis tests clearly emphasis that proposed scheme of encryption is comparatively equitable for the digital images security.

  相似文献   

12.
Realizing the logic operations with small-scale states is pursued to improve the utilization of quantum resources and to simplify the experimental setup. We propose a scheme to realize a general single-mode Gaussian operation with a two-mode entangled state by utilizing only one nondegenerate optical parametric amplifier and by adjusting four angle parameters. The fidelity of the output mode can be optimized by changing one of the angle parameters.This scheme would be utilized as a basic efficient element in the future large-scale quantum computation.  相似文献   

13.
This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys.This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT(CNOT)extraction attack.A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.  相似文献   

14.
Our purpose in this paper is to present a new tripartite quantum state sharing using partially quantum resources. The first scheme is to probabilistically split an unknown n-particle state using pre-shared a partially entangled four-particle cluster state as quantum resource by constructing some proper POVM. This scheme is further extended to share an unknown multi-particle cluster state using different states as quantum resources. Our schemes with general quantum channels are useful for various quantum information processing and quantum network tasks.  相似文献   

15.
陈立冰  谭鹏  董少光  路洪 《物理学报》2009,58(10):6772-6778
提出利用二粒子部分纠缠态概率性地实现开靶目标的非局域量子可控非(CNOT)门的操控方案.首先考虑利用3个二粒子部分纠缠态实现3个靶目标共享的非局域量子CNOT门的受控操作,然后将该方案推广到N个靶目标共享的情形. 在该方案中,控制端Alice的局域正定算符值测量(POVM)起着关键作用,给出了该测量算符的数学表式.值得注意的是, 用二粒子部分纠缠态可确定性地实现非局域CNOT门. 关键词: 二粒子部分纠缠态 非局域可控非门 开靶目标 正定算符值测量  相似文献   

16.
Remote quantum-state discrimination is a critical step for the implementation of quantum communication network and distributed quantum computation. We present a protocol for remotely implementing the unambiguous discrimination between nonorthogonal states using quantum entanglements, local operations, and classical communications. This protocol consists of a remote generalized measurement described by a positive operator valued measurement (POVM). We explicitly construct the required remote POVM. The remote POVM can be realized by performing a nonlocal controlled-rotation operation on two spatially separated qubits, one is an ancillary qubit and the other is the qubit which is encoded by two nonorthogonal states to be distinguished, and a conventional local Von Neumann orthogonal measurement on the ancilla. The particular pair of states that can be remotely and unambiguously distinguished is specified by the state of the ancilla. The probability of successful discrimination is not optimal for all admissible pairs. However, for some subset it can be very close to an optimal value in an ordinary local POVM.  相似文献   

17.
Using the single-photon nonlocality, we propose a quantum novel overloading cryptography scheme, in which a single photon carries two bits information in one-way quantum channel. Two commutative modes of the single photon, the polarization mode and the spatial mode, are used to encode secret information. Strict time windows are set to detect the impersonation attack. The spatial mode which denotes the existence of photons is noncommutative with the phase of the photon, so that our scheme is secure against photon-number-splitting attack. Our protocol may be secure against individual attack.  相似文献   

18.
We analyze the distribution of secure keys using quantum cryptography based on the continuous variable degree of freedom of entangled photon pairs. We derive the information capacity of a scheme based on the spatial entanglement of photons from a realistic source, and show that the standard measures of security known for quadrature-based continuous variable quantum cryptography (CV-QKD) are inadequate. A specific simple eavesdropping attack is analyzed to illuminate how secret information may be distilled well beyond the bounds of the usual CV-QKD measures.  相似文献   

19.
A new quantum key expansion scheme is proposed. The protocol of quantum key expansion proposed by Hwang is analyzed and the eavesdropping scheme is presented. We found that the using of the basis sequence shared by communicating parties is the weakness of the protocol. Hence we propose a ‘purification attack’ for the eavesdropper to steal partial information of the raw key and the new key between communicating parties. In view of this defect, we propose a new protocol of quantum key expansion, where the shared key is encrypted into a sequence of unitary operators which can be used securely against the presented attack.  相似文献   

20.
A complete measurement of a quantum observable (POVM) is a measurement of the maximally refined version of the POVM. Complete measurements give information on multiplicities of measurement outcomes and can be used as state preparation procedures. Moreover, any observable can be measured completely. In this Letter, we show that a complete measurement breaks entanglement completely between the system, ancilla and their environment. Finally, consequences for the quantum Zeno effect and complete position measurements are discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号