首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
International Journal of Theoretical Physics - In this paper, we propose a two-party quantum private comparison (QPC) protocol using orthogonal product states. This protocol introduces a...  相似文献   

2.
International Journal of Theoretical Physics - A novel quantum protocol for privacy-preserving lexicographical string sorting problem based on POVM measurement is proposed. Using the POVM...  相似文献   

3.
The next relativistic correction to α to for bound state mass of two charged scalar particles is calculated in the quantum scalar electrodynamics by the functional integral method. Contribution of the “nonphysical” time variable turned out to be important and leads to nonanalytic dependence of the bound state mass on α.  相似文献   

4.
Quantum watermarking is the technique which embeds the invisible quantum signal such as the owner’s identification into quantum multimedia data (such as audio, video and image) for copyright protection. In this paper, a watermark strategy for quantum images is proposed based on flexible representation for quantum images (FRQI). Compared with the former strategy, which can only be used to verify the identity of the true owner of a carrier image, the proposed method can be used to find out who is the real owner, and our strategy’s capacity reaches the largest. It is impossible for anyone except the copyrighter to clear off or extract the watermark images.  相似文献   

5.
International Journal of Theoretical Physics - In this paper, a quantum payment protocol based on a special set of local indistinguishable orthogonal product states (X-LIOP) is proposed. In the...  相似文献   

6.
7.
The superselection sectors of two classes of scalar bilocal quantum fields in D ≥ 4 dimensions are explicitly determined by working out the constraints imposed by unitarity. The resulting classification in terms of the dual of the respective gauge groups U(N) and O(N) confirms the expectations based on general results obtained in the framework of local nets in algebraic quantum field theory, but the approach using standard Lie algebra methods rather than abstract duality theory is complementary. The result indicates that one does not lose interesting models if one postulates the absence of scalar fields of dimension D−2 in models with global conformal invariance. Another remarkable outcome is the observation that, with an appropriate choice of the Hamiltonian, a Lie algebra embedded into the associative algebra of observables completely fixes the representation theory.  相似文献   

8.
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.  相似文献   

9.

A quantum protocol for millionaire problem based on commutative encryption is proposed. In our protocol, Alice and Bob don’t have to use the entangled character, joint measurement of quantum states. They encrypt their private information and privately get the result of their private information with the help of a third party (TP). Correctness analysis shows that the proposed protocol can be used to get the result of their private information correctly. The proposed protocol can also resist various attacks and overcomes the problem of information leakage with acceptable efficiency. In theory, our protocol can be used to build complex secure protocols for other multiparty computation problems and also have lots of other important applications in distributed networks.

  相似文献   

10.

In this paper, we propose a new fault-tolerant quantum anonymous voting protocol, which is designed to be robust against the collective-phasing noise and the collective-rotation noise. In the proposed protocol, the scrutineer, Charlie, prepares the photons sequence, which is used not only as the quantum ballot ticket, but also to authenticate the voter’s (i.e., Alice) identity. Especially it can realize the detection of Alice’s identity during the voting process. At the same time, the proposed protocol solves the problem of non-reusability of the quantum anonymous voting. Compared with other quantum anonymous voting protocols, our quantum anonymous voting protocol is more secure and practical.

  相似文献   

11.
In this work the scalar product of Bethe vectors for the six-vertex model is studied by means of functional equations. The scalar products are shown to obey a system of functional equations originated from the Yang-Baxter algebra and its solution is given as a multiple contour integral.  相似文献   

12.
In this Letter, we propose a quantum secure direct communication protocol based on single photons without quantum memories. In the proposed protocol, quantum states are transmitted in a stream but not in a quantum data block, hence, quantum memories are unnecessary. Compare with other protocols the advantages of our protocol are smaller quantum space usage, lower cost and more easily being implemented experimentally.  相似文献   

13.
The valence component of the light-front wave function of a quantum of a scalar field is studied within a bosonic model. The light-front time projection of the inhomogeneous Bethe-Salpeter equation for the vertex function in the covariant ladder approximation is given. The valence wave function and distribution are obtained from the numerical solution of the light-front equation for the vertex with different values of the time-like off-shell momentum carried by the quantum.  相似文献   

14.
The quantum effects for a physical system can be described by the set E(H)\mathcal{E(H)} of positive operators on a complex Hilbert space H\mathcal{H} that are bounded above by the identity operator I. We denote the set of sharp effects by P(H){\mathcal{P(H) }}. For A,B ? E(H)A,B\in\mathcal{E(H)}, the operation of sequential product A°B=A\frac12BA\frac12A\circ B=A^{\frac{1}{2}}BA^{\frac{1}{2}} was proposed as a model for sequential quantum measurements. Denote by A*B=\fracAB+BA2A\ast B=\frac{AB+BA}{2} the Jordan product of A,B ? E(H)A,B\in\mathcal{E(H)}. The main purpose of this note is to study some of the algebraic properties of the Jordan product of effects. Many of our results show that algebraic conditions on AB imply that A and B commute for the usual operator product. And there are many common properties between Jordan product and sequential product of effects. For example, if AB satisfies certain associative laws, then AB=BA. Moreover, A*B ? P(H)A\ast B\in{\mathcal{P(H) }} if and only if A°B ? P(H)A\circ B\in{\mathcal{P(H)}}.  相似文献   

15.
Single Sign-On (SSO) is an important cryptography mechanism in distributed systems. Quantum cryptography has gained great successes and makes great influence on traditional cryptography. In this paper, A SSO protocol under almost pure quantum cryptography without entanglement is designed. Through security analysis, we show that this protocol has good security properties.  相似文献   

16.
A multi-proxy strong blind quantum signature scheme is proposed in this paper. An original signatory Alice delegates her signing authority to a group of proxy signatories by using a classical warrant. A blind factor is introduced by a sender U to blind a message, and the proxy signatories sign the message blindly via applying appropriate unitary operators. A receiver Bob verifies the generated signature with the help of an arbitrator Trent. The security of this scheme is based on a quantum key distribution protocol, a quantum one-time pad and other quantum properties. It is proved that our scheme has the properties of non-disavowal, non-counterfeit, multi-proxy, blindness, untraceability and can resist some common attacks.  相似文献   

17.
In this paper, we consider families of operators \({\{x_r\}_{r \in \Lambda}}\) in a tracial C*-probability space \({({\mathcal{A}}, \varphi)}\) , whose joint *-distribution is invariant under free complexification and the action of the hyperoctahedral quantum groups \({\{H_n^+\}_{n \in \mathbb {N}}}\) . We prove a strong form of Haagerup’s inequality for the non-self-adjoint operator algebra \({{\mathcal{B}}}\) generated by \({\{x_r\}_{r \in \Lambda}}\) , which generalizes the strong Haagerup inequalities for *-free R-diagonal families obtained by Kemp–Speicher (J Funct Anal 251:141–173, 2007). As an application of our result, we show that \({{\mathcal{B}}}\) always has the metric approximation property (MAP). We also apply our techniques to study the reduced C*-algebra of the free unitary quantum group \({U_n^+}\) . We show that the non-self-adjoint subalgebra \({{\mathcal{B}}_n}\) generated by the matrix elements of the fundamental corepresentation of \({U_n^+}\) has the MAP. Additionally, we prove a strong Haagerup inequality for \({{\mathcal{B}}_n}\) , which improves on the estimates given by Vergnioux’s property RD (Vergnioux in J Oper Theory 57:303–324, 2007).  相似文献   

18.
We describe a protocol for telecloning a quantum state to M distant users via an ( M + 1)-particle W state, In the scheme, two atoms interact simultaneously with a highly detuned cavity mode with the assistance of a classical field. The scheme is insensitive to the cavity decay and the thermal field. Moreover, the Bell-state measurement can be achieved by detecting two atoms separately. Thus telecloning can be realized in a simple way.  相似文献   

19.
On the basis of entanglement swapping of Bell states, Hwang et al. proposed a probabilistic quantum key distribution (PQKD) protocol Quantum Inf. Comput. 11(7-8), 615–637 (2011). Recently, Lin et al. Quantum Inf. Comput. 14(9-10), 757–762 (2014) proposed a unitary operation attack on Hwang et al.’s PQKD. However, unlike the unitary operation attack, this work points out that a malicious participant in Hwang et al.’s PQKD protocol can manipulate the secret key. As a result, the security requirements of a PQKD protocol, i.e., fairness, cannot be satisfied in their protocol. Moreover, the same attack can also crack the fairness requirement of the existing quantum key agreement (QKA) protocols. To overcome both problems, this paper proposes a new PQKD protocol based on the order rearrangement of the transmitted photons. Furthermore, the rearrangement method can also solve the key manipulation attack in QKA protocols.  相似文献   

20.
International Journal of Theoretical Physics - The proposed quantum secret sharing protocol in this article conveys n bit secret messages from the sender to the n receivers making use of a secure...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号