共查询到20条相似文献,搜索用时 31 毫秒
1.
We demonstrate experimentally an intrinsically stable polarization coding and decoding system composed of optical-fiber Sagnac interferometers with integrated phase modulators for quantum key distribution. An interference visibility of 98.35% can be kept longtime during the experiment without any efforts of active compensation for coding all four desired polarization states. 相似文献
2.
Goren Gordon 《Optics Communications》2010,283(1):184-4842
We show that non-maximally entangled states can be used to build a quantum key distribution (QKD) scheme where the key is probabilistically teleported from Alice to Bob. This probabilistic aspect of the protocol ensures the security of the key without the need of non-orthogonal states to encode it, in contrast to other QKD schemes. Also, the security and key transmission rate of the present protocol is nearly equivalent to those of standard QKD schemes and these aspects can be controlled by properly harnessing the new free parameter in the present proposal, namely, the degree of partial entanglement. Furthermore, we discuss how to build a controlled QKD scheme, also based on partially entangled states, where a third party can decide whether or not Alice and Bob are allowed to share a key. 相似文献
3.
Experimental Study on Practical Quantum Key Distribution Scheme with Time-Multiplexed Technique
下载免费PDF全文
![点击此处可从《中国物理快报》网站下载免费的PDF全文](/ch/ext_images/free.gif)
We present a scheme that is capable of detecting photon numbers during the quantum key distribution (QKD) based on an improved differential phase shift (DPS) system without Trojan horse attack. A time-multiplexed detector (TMD) is set in for the photon-number resolution. Two fibre loops are used for detecting photon numbers as well as distributing keys. The long-term stabilization is guaranteed by two Faraday mirrors (FM) at Bob's site to automatically compensate for polarization defect. Our experimental study (90km QKD is completed) indicates that such a system is stable and secure which nearly reaches the performance of a single photon scheme. 相似文献
4.
A linear optical protocol of random quantum key distribution by using polarization entangled photons
Wen-Zhen Cao 《Optics Communications》2010,283(3):502-505
Utilized polarization entangled photons, a linear optical protocol for generating random quantum key distribution (QKD) is proposed, which is made up of EPR-source, linear optical elements, and conventional photon detectors. It is shown that total efficiency of QKD η=100% in theory. 相似文献
5.
Decoy state quantum key distribution (QKD), being capable of beating PNS attack and being unconditionally secure has become attractive recently. However, in many QKD systems, disturbances of transmission channel make the quantum bit error rate (QBER) increase, which limits both security distance and key bit rate of real-world decoy state QKD systems. We demonstrate the two-intensity decoy QKD with a one-way Faraday- Michelson phase modulation system, which is free of channel disturbance and keeps an interference fringe visibility (99%) long period, over a 120 km single mode optical fibre in telecom (1550nm) wavelength. This is the longest distance fibre decoy state QKD system based on the two-intensity protocol. 相似文献
6.
Cryptanalysis of Multiparty Quantum Secret Sharing of Quantum State Using Entangled States
下载免费PDF全文
![点击此处可从《中国物理快报》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes. 相似文献
7.
基于相位调制偏振态QKD系统的量子信道校正发送方案 总被引:4,自引:1,他引:3
提出了一种基于相位调制偏振态QKD系统的量子信道校正发送的新方案—采用波导型相位调制器研制成电控连续可调光学相移器,它可随相位调制器输入电压的连续改变而产生连续的相移,从而控制输出的偏振态;在其前放置一个半波片,即可校正接收端偏振态量子态在信道中所发生的改变,从而保证信道传送密钥的可用性.通过理论推导和实验研究验证了基于相位调制偏振态QKD系统的量子信道校正发送方案的核心部件的可行性.由于本方案能实现高速调制(GHz),为解决光纤传输的偏振编码QKD系统中偏振态漂移问题提供了一种新的途径. 相似文献
8.
9.
We suggest a general approach for extending quantum key distribution (Q, KD) protocols possessing discrete rotational symmetry into quantum secret sharing (QSS) schemes among multiparty, under certain conditions. Only local unitary operations are required for this generalization based on the almost mature technologies of Q, KD. Theoretically, the number of the participating partners can be arbitrary high. As an application of this method, we propose a fault-tolerant QSS protocol based on a fault-tolerant QKD implementation. The 6-state protocol is also discussed. 相似文献
10.
Xin-Wen Wang 《Optics Communications》2008,281(20):5282-5285
Two schemes are proposed for generating atomic qubits cluster states in cavity quantum electrodynamics (QED). In the first scheme, only two-atom-cavity interactions are involved, and cluster states can be directly generated by using constructed two-qubit controlled phase gates. The second scheme needs the assistance of additional single-qubit rotations, but takes less time than the first one for two-atom operations in the cavity. In this scheme, two projective operators are constructed to prepare two-dimension or more complicated configurations of cluster states. Both schemes are insensitive to the cavity decay due to the fact that the cavity is only virtually excited during the interaction between atoms and the cavity. The idea can also be applied to the ion trap system. 相似文献
11.
Realization of Three-Qubit Controlled-Phase Gate Operation with Atoms in Cavity QED System 总被引:2,自引:0,他引:2
下载免费PDF全文
![点击此处可从《中国物理快报》网站下载免费的PDF全文](/ch/ext_images/free.gif)
We propose a scheme for realization of three-qubit controlled-phase gate via passing two three-level atoms through a high-Q optical cavity in a cavity QED system. In the presented protocol, the two stable ground states of the atoms act as the two controlling qubits and the zero- and one-photon Fock states of the cavity-field form the target qubit, and no auxiliary state or any measurement is required. The numerical simulation shows that the gate fidelities remain at a high level under the influence of the atomic spontaneous emission, the decay of the cavity mode and deviation of the coupling strength. The experimental feasibility of our proposal is also discussed. 相似文献
12.
We propose a scheme for optical realization of deterministic entanglement concentration of polarized photons. To overcome the difficulty due to the lack of sufficiently strong interactions between photons, teleportation is employed to transfer the polarization states of two photons onto the path and polarization states of a third photon, which is made possible by the recent experimental realization of the deterministic and complete Bell state measurement. Then the required positive operator-valued measurement and further operations can be implemented deterministically by using a linear optical setup. All these are within the reach of current technology. 相似文献
13.
Gu-hao Zhao Shang-hong Zhao Zhou-shi Yao Chen-Lu Hao Wen Meng Xiang Wang Zhi-hang Zhu Feng Liu 《Optik》2014
An improved quantum key distribution scheme via single-photon two-qubit states is proposed. The input–output model of the polarization state is established. And the influence of the interferometers to the polarization state is analyzed. Quantum bit error rate of polarization coding caused by birefringent and coordinate system difference between incident light and the fast and slow axes in fiber interferometer is simulated. Furthermore, maintaining conditions of polarization state are given on this basis. 相似文献
14.
15.
In a photonic realization of qubits the implementation of quantum logic is rather difficult due to the extremely weak interaction
on the few photon level. On the other hand, in these systems interference is available to process the quantum states. We formalize
the use of interference by the definition of a simple class of operations which include linear-optical elements, auxiliary
states and conditional operations.
We investigate an important subclass of these tools, namely linear-optical elements and auxiliary modes in the vacuum state.
For these tools, we are able to extend a previous qualitative result, a no-go theorem for perfect Bell-state analyzer on two
qubits in polarization entanglement, by a quantitative statement. We show that within this subclass it is not possible to
discriminate unambiguously four equiprobable Bell states with a probability higher than 50%.
Received: 18 July 2000 / Revised version: 15 September 2000 / Published online: 6 December 2000 相似文献
16.
Xin Li 《Physics letters. A》2008,372(30):4980-4984
In virtue of the quantum invariant theory, we obtain the rigorous solution of the isotropic bipartite system in rotational magnetic fields, based on which the general expression of the noncyclic geometric phase is worked out and the entanglement dependence of the noncyclic geometric phase in this model is investigated. We show that the influence of the coupling on noncyclic geometric phase depends on the initial condition of the system. We also show that when the magnetic fields are stationary, there is a more general class of states existed of which the noncyclic geometric phase could be interpreted solely in terms of the solid angle enclosed by the geodesically closed curve on a two-sphere parameterized by the evolving Schmidt coefficients. 相似文献
17.
In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By" conditional Faraday- rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary" distances is obtained in a spin chain by" a proper choice of coupling strengths and using spin memory- technique improved. We also analyse the security" of the scheme against the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity- achieved by" an eavesdropper for entanglement-based cryptography. 相似文献
18.
19.
With the two forms of the quantum entanglement control, the quantum entanglement swapping and preservation are demonstrated in a three-qubit nuclear magnetic resonance quantum computer. The pseudopure state is prepared to represent the quantum entangled states through macroscopic signals. Entanglement swapping is directly realized by a swap operation. By controlling the interactions between the system and its environment,we can preserve an initial entangled state for a longer time. The experimental results are in agreement with the experiment. 相似文献
20.
Gan Gao 《Optics Communications》2008,281(4):876-879
We propose a quantum key distribution (QKD) scheme based on entanglement swapping. In this scheme, the methods to form secret keys are so interesting. By comparing initial Bell state and outcome of entanglement swapping, the secret keys between Alice and Bob are generated involuntarily. 相似文献