首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
王郁武  韦相和  朱兆辉 《物理学报》2013,62(16):160302-160302
提出一种量子投票协议, 协议基于非对称量子通道受控量子局域幺正操作隐形传输(quantum operation teleportation, QOT). 由公正机构CA提供的零知识证明的量子身份认证, 保证选民身份认证的匿名性. 计票机构Bob制造高维Greenberger-Horne-Zeilinger 纠缠态建立一个高维量子通信信道. 选民对低维的量子选票进行局域幺正操作的量子投票, 是通过非对称基的测量和监票机构Charlie的辅助测量隐形传输的. Bob在Charlie帮助下可以通过幺正操作结果得到投票结果. 与其他一般的QOT量子投票协议相比, 该协议利用量子信息与传输的量子信道不同维, 使单粒子信息不能被窃取、防止伪造.选举过程由于有Charlie的监督, 使得投票公正和不可抵赖.由于量子局域幺正操作隐形传输的成功概率是1, 使量子投票的可靠性得以保证. 关键词: 量子投票 高维GHZ纠缠态 非对称基测量 量子操作隐形传输  相似文献   

2.
The preparation of multipartite entangled states is the prerequisite for exploring quantum information networks and quantum computation.In this paper,we review the experimental progress in the preparation of cluster states and multi-color entangled states with continuous variables.The preparation of lager scale multipartite entangled state provide valuable quantum resources to implement more complex quantum informational tasks.  相似文献   

3.
连续变量量子密码术   总被引:3,自引:0,他引:3  
文章综述了连续变量量子密码术的基本原理,突出了其在光源制备、光子探测以及量子密钥生成的码率等办面相对于单光子量子密码术的优越性,给出了连续变量量子密码术的安全性以及对线路噪声的具体要求,提出了连续变量量子密码术目前所面临的主要困难和今后的发展前景。  相似文献   

4.
陈进建  韩正甫  赵义博  桂有珍  郭光灿 《物理》2006,35(09):785-790
文章综述了连续变量量子密码术的基本原理,突出了其在光源制备、光子探测以及量子密钥生成的码率等方面相对于单光子量子密码术的优越性,给出了连续变量量子密码术的安全性以及对线路噪声的具体要求,提出了连续变量量子密码术目前所面临的主要困难和今后的发展前景.  相似文献   

5.
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.  相似文献   

6.
徐淑奖  陈秀波  钮心忻  杨义光 《中国物理 B》2013,22(6):60307-060307
Quantum steganography that utilizes quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, El Allati et al. proposed a new quantum steganography using GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.  相似文献   

7.
We mostly investigate two schemes. One is to teleport a multi-mode W-type entangled coherent state using a peculiar bipartite entangled state as the quantum channel different from other proposals. Based on our formalism,teleporting multi-mode coherent state or squeezed state is also possible. Another is that the tripartite entangled state is used as the quantum channel of controlled teleportation of an arbitrary and unknown continuous variable in the case of three participators.  相似文献   

8.
We mostly investigate two schemes. One is to teleport a multi-mode W-type entangled coherent state using a peculiar bipartite entangled state as the quantum channel different from other proposals. Based on our formalism,teleporting multi-mode coherent state or squeezed state is also possible. Another is that the tripartite entangled state is used as the quantum channel of controlled teleportation of an arbitrary and unknown continuous variable in the case of three participators.  相似文献   

9.
Based on quantum entanglement, secure anonymous ballot systems are introduced to realize voting among numerous candidates in this paper. By searching individuals, each voter may cast a vote for his desired candidates of which number may be more than one. Therefore, the system based on the proposed algorithm may be applied voting among many candidates, such as a network ballot with the development of a quantum network. Finally, the security of the present scheme is investigated.  相似文献   

10.
基于双模压缩态的量子投票协议   总被引:1,自引:0,他引:1       下载免费PDF全文
易智  何广强  曾贵华 《物理学报》2009,58(5):3166-3172
提出了一种基于双模压缩态的基本量子投票协议,该协议通过随机选择信号加载的方式,充分利用量子信号测不确定性原理实现了分布式投票系统.并在此基础上分析可能遇到的攻击.双模压缩态的模间关联性保证了该方案的安全性. 关键词: 量子投票协议 双模压缩态 不确定性原理  相似文献   

11.
与单光子量子密钥分配采用单光子探测器不同,连续变量量子密钥分配采用平衡零拍测量技术.分析了由于参考光的真空噪声、分束器的透射率和反射率不相等引入的平衡零拍测量误差,以及平衡零拍测量探测器的电子噪声对连续变量量子密钥传输的最大安全距离的限制,给出了平衡零拍测量的探测噪声、电子噪声和密钥量之间的定量表达式.  相似文献   

12.
A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information.Moreover,the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information.Then,the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users.After insuring the security of the quantum channel,they begin to hide the secret information in the cover of message.Comparing the scheme with the previous quantum steganographies,capacity and imperceptibility of hidden message are good.The security of the present scheme against many attacks is also discussed.  相似文献   

13.
Hengji Li 《中国物理 B》2022,31(9):90303-090303
Very recently, Lee et al. proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys. Rev. Lett. 124 060501 (2020)]. This quantum network is encoded with a maximally entangled GHZ state. In this paper, we consider a partially entangled GHZ state as the entanglement channel, where it can achieve, probabilistically, unity fidelity transfer of the state. Two kinds of strategies are given. One arises when an auxiliary particle is introduced and a general evolution at any receiver's location is then adopted. The other one involves performing a single generalized Bell-state measurement at the location of any sender. This could allow the receivers to recover the transmitted state with a certain probability, in which only the local Pauli operators are performed, instead of introducing an auxiliary particle. In addition, the successful probability is provided, which is determined by the degree of entanglement of the partially multipartite entangled state. Moreover, the proposed protocol is robust against the bit and phase flip noise.  相似文献   

14.
刘传龙  郑亦庄 《物理学报》2006,55(12):6222-6228
提出利用双模纠缠相干态作为量子信道,实现纠缠相干态量子隐形传态的方案. 分别在非正交的相干态表象和另一个由相干态构成的正交态表象对双模纠缠相干态的隐形传态进行具体分析. 发现在相干态表象,虽然只要线性光学元件就可以完成隐形传态,但成功的概率小于1/2,而在正交态表象,只要能分辨4个由相干态构成的Bell态,成功的概率就是1. 关键词: 隐形传态 纠缠相干态 纠缠相干态量子信道  相似文献   

15.
纠缠态量子探测是将量子力学与信息科学相结合,应用在目标探测领域的一种新技术,其在灵敏度、抗干扰能力等方面具有突破传统探测技术的潜力.在雷达探测领域,恒虚警检测是一项具有重要的意义和应用价值的技术.然而,对于纠缠态量子探测系统中恒虚警检测方法的研究还没有展开,本文针对这一问题,提出了一种纠缠态量子探测系统的恒虚警检测方法.该方法通过系统对噪声的实时估计,自适应调整检测门限,使得纠缠态量子探测系统在检测过程中始终保持恒定的虚警概率.仿真结果表明,所提恒虚警检测方法是正确和有效的,能够实现纠缠态量子探测系统的恒虚警检测功能.该方法提升了纠缠态量子探测系统的灵活性和适应性,为量子探测技术进一步走向实用及应用奠定了理论基础.  相似文献   

16.
量子计算机原理及问题   总被引:4,自引:0,他引:4  
赵红敏  林家逖 《大学物理》2001,20(10):1-7,10
讨论了量子计算机的原理及特色,着重介绍了实现它所遇到的问题及解决办法。  相似文献   

17.
李艳玲  冯健  於亚飞 《物理学报》2007,56(12):6797-6802
提出一种任意两粒子纠缠态1→2普适远程克隆方案. 此方案仅需一个特殊的四粒子纠缠态作为量子信道, 就可使处于空间不同位置的两个接收者分别以5/6的保真度得到任意输入态的近似拷贝, 该保真度远高于已有方案中的保真度. 将方案推广到任意两粒子纠缠态1→N(N>2)普适远程克隆的情况, 可使处于不同地点的N个接收者分别以(2N+1)/(3N)的保真度得到输入态的近似拷贝. 另外, 提出一种以上述单个特殊四粒子纠缠态作为量子信道, 在多目标量子比特受控非门和 关键词: 量子纠缠态 普适远程克隆 保真度  相似文献   

18.
吴韬  叶柳  倪致祥 《中国物理》2006,15(11):2506-2509
In this paper, we propose a scheme for transferring an unknown atomic entangled state via cavity quantum electrodynamics (QED). This scheme, which has a successful probability of 100 percent, does not require Bell-state measurement and performing any operations to reconstruct an initial state. Meanwhile, the scheme only involves atom--field interaction with a large detuning and does not require the transfer of quantum information between the atoms and cavity. Thus the scheme is insensitive to the cavity field states and cavity decay. This scheme can also be extended to transfer ring an entangled state of $n$-atom.  相似文献   

19.
长距离长期稳定的量子密钥分发系统   总被引:6,自引:0,他引:6       下载免费PDF全文
介绍了最近完成的长距离长期稳定的量子密钥分发系统.该系统利用往返光路补偿光纤偏振 抖动和相位漂移的原理,采用结电容平衡魔T网络耦合的单光子探测技术,在506km单模 光纤中实现了长时间(大于12h)稳定的量子密钥分发实验.单脉冲平均光子数为007, 误码率为4%,其中单光子探测器的探测效率大于5%,单脉冲暗计数低于29×10-6. 关键词: 量子保密通信 量子密钥分发 单光子探测  相似文献   

20.
《中国物理 B》2021,30(7):70309-070309
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly,the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the quantum channel, to correct the errors in non-Clifford gate evaluation. By using the set synthesized by Clifford gates and T gates, it is feasible to perform the arbitrary quantum computation on the encrypted data. Secondly, our scheme is different from the previous scheme described by the quantum homomorphic encryption algorithm. From the perspective of application, a two-party probabilistic quantum homomorphic encryption scheme is proposed. It is clear what the computation and operation that the client and the server need to perform respectively, as well as the permission to access the data. Finally, the security of probabilistic quantum homomorphic encryption scheme is analyzed in detail. It demonstrates that the scheme has favorable security in three aspects, including privacy data, evaluated data and encryption and decryption keys.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号