首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The key agreement protocols allow two or more users to negotiate a shared key for establishing a secure communication channel without a third trusted party in such a way that the shared key is determined by all authorized players rather than any subset of them. We propose the first real multiparty semiquantum key agreement(SQKA) protocols based on single-photons. Our protocols include only one quantum player, while the others are classical players who only need to measure and prepare states in the classical basis. We first present a symmetric three-party SQKA protocol,where two classical players can fairly negotiate a key with a quantum player by using single-photons as message carriers. Then we present an asymmetric SQKA protocol where a relatively low percentage of quantum states are used for eavesdropping detection. And we further extend them to an asymmetric multiparty SQKA protocol. Our SQKA protocols require fewer quantum resources than the previous SQKA protocols for classical players, especially without requirement of entanglement,which makes them easier to implement using current technologies. Our protocols are secure against external eavesdroppers and are fair against a minority of internal dishonest players.  相似文献   

2.
We show that in quantum logic of closed subspaces of Hilbert space one cannot substitute quantum operations for classical (standard Hilbert space) ones and treat them as primitive operations. We consider two possible ways of such a substitution and arrive at operation algebras that are not lattices what proves the claim. We devise algorithms and programs which write down any two-variable expression in an orthomodular lattice by means of classical and quantum operations in an identical form. Our results show that lattice structure and classical operations uniquely determine quantum logic underlying Hilbert space. As a consequence of our result, recent proposals for a deduction theorem with quantum operations in an orthomodular lattice as well as a, substitution of quantum operations for the usual standard Hilbert space ones in quantum logic prove to be misleading. Quantum computer quantum logic is also discussed.  相似文献   

3.
Measurement-device-independent quantum key distribution(MDI-QKD) is proven to be immune to all the detector side channel attacks.With two symmetric quantum channeis,the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD.An interesting question is whether the transmission distance can be extended further.In this work,we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD.Our numerical results show that the secure transmission distances are increased by about 12 km and 8 km when the 1 B and the2 B steps are implemented,respectively.  相似文献   

4.
曹帅  方卯发  郑小娟 《中国物理》2007,16(4):915-918
It has recently been realized that quantum strategies have a great advantage over classical ones in quantum games. However, quantum states are easily affected by the quantum noise, resulting in decoherence. In this paper, we investigate the effect of quantum noise on a multiplayer quantum game with a certain strategic space, with all players affected by the same quantum noise at the same time. Our results show that in a maximally entangled state, a special Nash equilibrium appears in the range of It has recently been realized that quantum strategies have a great advantage over classical ones in quantum games. However, quantum states are easily affected by the quantum noise, resulting in decoherence. In this paper, we investigate the effect of quantum noise on a multiplayer quantum game with a certain strategic space, with all players affected by the same quantum noise at the same time. Our results show that in a maximally entangled state, a special Nash equilibrium appears in the range of 0≤p≤0.622 (p is the quantum noise parameter), and then disappears in the range of 0.622 〈 p≤ 1. Increasing the amount of quantum noise leads to the reduction of the quantum player's payoff.  相似文献   

5.
We prove the conjectured existence of bound information, a classical analog of bound entanglement, in the multipartite scenario. We give examples of tripartite probability distributions from which it is impossible to extract any kind of secret key, even in the asymptotic regime, although they cannot be created by local operations and public communication. Moreover, we show that bound information can be activated: three honest parties can distill a common secret key from different distributions having bound information. Our results demonstrate that quantum information theory can provide useful insight for solving open problems in classical information theory.  相似文献   

6.
孙颖  赵尚弘  东晨 《物理学报》2015,64(14):140304-140304
针对量子中继器短时间内难以应用于长距离量子密钥分配系统的问题, 提出了基于量子存储的长距离测量设备无关量子密钥分配协议, 分析了其密钥生成率与存储效率、信道传输效率和安全传输距离等参数间的关系, 研究了该协议中量子存储单元的退相干效应对最终密钥生成率的影响, 比较了经典测量设备无关量子密钥分配协议和基于量子存储的测量设备无关量子密钥分配协议的密钥生成率与安全传输距离的关系. 仿真结果表明, 添加量子存储单元后, 协议的安全传输距离由无量子存储的216 km增加至500 km, 且量子存储退相干效应带来的误码对最终的密钥生成率影响较小. 实验中可以采取调节信号光强度的方式提高测量设备无关量子密钥分配系统的密钥生成率, 为实用量子密钥分配实验提供了重要的理论参数.  相似文献   

7.
In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification (QPV) protocol if the adversaries are allowed to previously share unlimited entanglements. Afterwards, people started to design secure QPV protocols in practical settings, e.g. the bounded-storage model, where the adversaries’ pre-shared entangled resources are supposed to be limited. Here we focus on another practical factor that it is very difficult for the adversaries to perform attack operations with unlimitedly high frequency. Concretely, we present a new kind of QPV protocols, called non-simultaneous QPV. And we prove the security of a specific non-simultaneous QPV protocol with the assumption that the frequency of the adversaries’ attack operations is bounded, but no assumptions on their pre-shared entanglements or quantum storage. Actually, in our nonsimultaneous protocol, the information whether there comes a signal at present time is also a piece of command. It renders the adversaries “blind”, that is, they have to execute attack operations with unlimitedly high frequency no matter whether a signal arrives, which implies the non-simultaneous QPV is also secure in the bounded-storage model.  相似文献   

8.
Noise is currently unavoidable in quantum communication environments. Eavesdroppers can exploit this issue by disguising themselves as channel noise to avoid detection during eavesdropping checks performed by legitimate communicants. This paper first proposes a new coding function comprising eight unitary operations for two orthogonal bases for six-qubit decoherence-free states. Subsequently, based on the coding function, the first deterministic secure quantum communication (DSQC) scheme for quantum channels with collective noise is developed. The developed DSQC is robust against both collective-dephasing noise and collective-rotation noise Senders can choose one of six-qubit decoherence-free states to encode their two-bit message, and receivers simply conduct Bell measurement to obtain the message. Analyses conducted verify that the proposed scheme is both secure and robust.  相似文献   

9.
We define a special class of quantum operations we call Markovian and show that it has the same spectral properties as a corresponding Markov chain. We then consider a convex combination of a quantum operation and a Markovian quantum operation and show that under a norm condition its spectrum has the same properties as in the conclusion of the Perron–Frobenius theorem if its Markovian part does. Moreover, under a compatibility condition of the two operations, we show that its limiting distribution is the same as the corresponding Markov chain. We apply our general results to partially decoherent quantum random walks with decoherence strength \(0 \le p \le 1\). We obtain a quantum ergodic theorem for partially decoherent processes. We show that for \(0 < p \le 1\), the limiting distribution of a partially decoherent quantum random walk is the same as the limiting distribution for the classical random walk.  相似文献   

10.
We generalize the unitary-operation-based deterministic secure quantum communication (UODSQC) model (protocol) to describe the conventional deterministic secure quantum communication (DSQC) protocols in which unitary operations are usually utilized for encoding or decoding message. However, it is found that unitary operation for message encoding or decoding is not required and can be replaced with classical operation in DSQC. So the classical-operation-based deterministic secure quantum communication (CODSQC) model (protocol) is put forward. Then the rigorous mathematical analysis to explain the reason why classical operations can replace unitary operations to encode or decode secret deterministic message is given. Although unitary operations are still possibly needed in the whole communication of CODSQC model (protocol), those used for message encoding or decoding are omitted and replaced with classical operations in CODSQC model (protocol). As a result, the CODSQC model (protocol) is simpler and even more robust than the UODSQC one.  相似文献   

11.
In this paper, a scheme is proposed for performing remote operation on quantum state among multiparty. We use three-particle GHZ state as quantum channels to prepare a state operator, which describes quantum correlation between states and operations. Based on the special characteristic of the state operator, observers can perform unitary operation on a system that is away from observers. Our studies show this process is deterministic. We further consider remote operation among N spatially distributed observers, and the results show the successful realization of remote operation needs collective participation of N parties, that is, there exists strong correlation among multiparty. In addition, we investigate the case in which observers share a three-particle W state as quantum channels to perform remote operation and studies find this process is probabilistic.  相似文献   

12.
G. Abal  H. Fort 《Physica A》2008,387(21):5326-5332
Iterated bipartite quantum games are implemented in terms of the discrete-time quantum walk on the line. Our proposal allows for conditional strategies, as two rational agents make a choice from a restricted set of two-qubit unitary operations. We discuss how several classical strategies are related to families of quantum strategies. A quantum version of the well known Prisoner’s Dilemma bipartite game, in which both players use mixed strategies, is presented as a specific example.  相似文献   

13.
Based on the deterministic secure quantum communication,we present a novel quantum dialogue protocol without information leakage over the collective noise channel.The logical qubits and four-qubit decoherence-free states are introduced for resisting against collective-dephasing noise,collective-rotation noise and all kinds of unitary collective noise,respectively.Compared with the existing similar protocols,the analyses on security and information-theoretical efficiency show that the proposed protocol is more secure and efficient.  相似文献   

14.
The quantum-classical hybrid algorithm is a promising algorithm with respect to demonstrating the quantum advantage in noisy-intermediate-scale quantum(NISQ) devices. When running such algorithms, effects due to quantum noise are inevitable. In our work, we consider a well-known hybrid algorithm, the quantum approximate optimization algorithm(QAOA). We study the effects on QAOA from typical quantum noise channels, and produce several numerical results. Our research indicates that the output state fidelity, i.e., the cost function obtained from QAOA, decreases exponentially with respect to the number of gates and noise strength. Moreover,we find that when noise is not serious, the optimized parameters will not deviate from their ideal values. Our result provides evidence for the effectiveness of hybrid algorithms running on NISQ devices.  相似文献   

15.
杨璐  马鸿洋  郑超  丁晓兰  高健存  龙桂鲁 《物理学报》2017,66(23):230303-230303
量子保密通信包括量子密钥分发、量子安全直接通信和量子秘密共享等主要形式.在量子密钥分发和秘密共享中,传输的是随机数而不是信息,要再经过一次经典通信才能完成信息的传输.在量子信道直接传输信息的量子通信形式是量子安全直接通信.基于量子隐形传态的量子通信(简称量子隐形传态通信)是否属于量子安全直接通信尚需解释.构造了一个量子隐形传态通信方案,给出了具体的操作步骤.与一般的量子隐形传态不同,量子隐形传态通信所传输的量子态是计算基矢态,大大简化了贝尔基测量和单粒子操作.分析结果表明,量子隐形传态通信等价于包含了全用型量子密钥分发和经典通信的复合过程,不是量子安全直接通信,其传输受到中间介质和距离的影响,所以不比量子密钥分发更有优势.将该方案与量子密钥分发、量子安全直接通信和经典一次性便笺密码方案进行对比,通过几个通信参数的比较给出各个方案的特点,还特别讨论了各方案在空间量子通信方面的特点.  相似文献   

16.
We study dense coding under the condition that the sender’s encoding operations be imperfect. In order to formally describe the effect of the imperfect encoding operations, we use four kinds of quantum noise processes. In this way, the imperfect operation is the corresponding perfect operation followed by a quantum noise process. We show the relation among the average probability of decoding the correct information, the non-maximally entangled state, the imperfect encoding operations, and the receiver’s measurement basis.  相似文献   

17.
This paper first proposes a new coding function for the six-qubit decoherence-free states that can resist both types of collective noise (i.e., dephasing and rotation noise) simultaneously. Subsequently, based on the coding function, a semi-quantum key distribution (SQKD) protocol is designed such that a sender with strong quantum capabilities can send a key to a classical receiver who can merely perform classical operations. This is the first SQKD protocol that can resist the combined collective noise. Analyses show that this protocol is secure and effective.  相似文献   

18.
We consider universal shot noise in ballistic chaotic cavities from a semiclassical point of view and show that it is due to action correlations within certain groups of classical trajectories. Using quantum graphs as a model system, we sum these trajectories analytically and find agreement with random-matrix theory. Unlike all action correlations which have been considered before, the correlations relevant for shot noise involve four trajectories and do not depend on the presence of any symmetry.  相似文献   

19.
We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment.  相似文献   

20.
The qubit (or a system of two quantum dots) has become a standard paradigm for studying quantum information processes. Our focus is decoherence due to interaction of the qubit with its environment, leading to noise. We consider quantum noise generated by a dissipative quantum bath. A detailed comparative study with the results for a classical noise source such as generated by a telegraph process, enables us to set limits on the applicability of this process vis à vis its quantum counterpart, as well as lend handle on the parameters that can be tuned for analysing decoherence. Both Ohmic and non-Ohmic dissipations are treated and appropriate limits are analysed for facilitating comparison with the telegraph process.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号