首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
International Journal of Theoretical Physics - In this paper, we propose a two-party quantum private comparison (QPC) protocol using orthogonal product states. This protocol introduces a...  相似文献   

2.
We study the interaction between a scalar quantum field $\hat \phi (x)$, and many different boundary configurations constructed from (parallel and orthogonal) thin planar surfaces on which $\hat \phi (x)$ is constrained to vanish, or to satisfy Neumann conditions. For most of these boundaries the Casimir problem has not previously been investigated. We calculate the canonical and improved vacuum stress tensors $ \langle \hat T_{\mu \nu } (x)\rangle\$ and $ \langle \Theta _{\mu \nu (x)} \rangle\$ of $\hat \phi (x)$; for each example. From these we obtain the local Casimir forces on all boundary planes. For massless fields, both vacuum stress tensors yield identical attractive local Casimir forces in all Dirichlet examples considered. This desirable outcome is not a priori obvious, given the quite different features of $ \langle \hat T_{\mu \nu } (x)\rangle\$ and $ \langle \Theta _{\mu \nu (x)} \rangle\$. For Neumann conditions. $ \langle \hat T_{\mu \nu } (x)\rangle\$ and $ \langle \Theta _{\mu \nu (x)} \rangle\$ lead to attractive Casimir stresses which are not always the same. We also consider Dirichlet and Neumann boundaries immersed in a common scalar quantum field, and find that these repel. The extensive catalogue of worked examples presented here belongs to a large class of completely solvable Casimir problems. Casimir forces previously unknown are predicted, among them ones which might be measurable.  相似文献   

3.
The next relativistic correction to α to for bound state mass of two charged scalar particles is calculated in the quantum scalar electrodynamics by the functional integral method. Contribution of the “nonphysical” time variable turned out to be important and leads to nonanalytic dependence of the bound state mass on α.  相似文献   

4.
5.
International Journal of Theoretical Physics - A novel quantum protocol for privacy-preserving lexicographical string sorting problem based on POVM measurement is proposed. Using the POVM...  相似文献   

6.
Quantum watermarking is the technique which embeds the invisible quantum signal such as the owner’s identification into quantum multimedia data (such as audio, video and image) for copyright protection. In this paper, a watermark strategy for quantum images is proposed based on flexible representation for quantum images (FRQI). Compared with the former strategy, which can only be used to verify the identity of the true owner of a carrier image, the proposed method can be used to find out who is the real owner, and our strategy’s capacity reaches the largest. It is impossible for anyone except the copyrighter to clear off or extract the watermark images.  相似文献   

7.
We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept resend attacks. Furthermore, it is eifficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the etfficiency of the protocol.  相似文献   

8.
International Journal of Theoretical Physics - In this paper, a quantum payment protocol based on a special set of local indistinguishable orthogonal product states (X-LIOP) is proposed. In the...  相似文献   

9.
The superselection sectors of two classes of scalar bilocal quantum fields in D ≥ 4 dimensions are explicitly determined by working out the constraints imposed by unitarity. The resulting classification in terms of the dual of the respective gauge groups U(N) and O(N) confirms the expectations based on general results obtained in the framework of local nets in algebraic quantum field theory, but the approach using standard Lie algebra methods rather than abstract duality theory is complementary. The result indicates that one does not lose interesting models if one postulates the absence of scalar fields of dimension D−2 in models with global conformal invariance. Another remarkable outcome is the observation that, with an appropriate choice of the Hamiltonian, a Lie algebra embedded into the associative algebra of observables completely fixes the representation theory.  相似文献   

10.
In this work the scalar product of Bethe vectors for the six-vertex model is studied by means of functional equations. The scalar products are shown to obey a system of functional equations originated from the Yang-Baxter algebra and its solution is given as a multiple contour integral.  相似文献   

11.
12.

In this paper, we propose a new fault-tolerant quantum anonymous voting protocol, which is designed to be robust against the collective-phasing noise and the collective-rotation noise. In the proposed protocol, the scrutineer, Charlie, prepares the photons sequence, which is used not only as the quantum ballot ticket, but also to authenticate the voter’s (i.e., Alice) identity. Especially it can realize the detection of Alice’s identity during the voting process. At the same time, the proposed protocol solves the problem of non-reusability of the quantum anonymous voting. Compared with other quantum anonymous voting protocols, our quantum anonymous voting protocol is more secure and practical.

  相似文献   

13.
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.  相似文献   

14.
Quantum key distribution is a practically implementable cryptographic communication methodology from the hardware and software point of view. It is an information‐theoretic secure method for transmitting keys to remote partners practicing quantum communication. After examining various protocols from the most basic on, BBM92, DPSK, SARG04 and MDI (Measurement Device Independent) protocols are described in view of targeting the longest possible communication distance with the highest secret key bitrate. How any protocol can be optimized with respect to distance is discussed by analyzing the various steps impacting hardware and software that are developed, starting from the underlying assumptions proper to every protocol and ending with the corresponding performance in each case.  相似文献   

15.

A quantum protocol for millionaire problem based on commutative encryption is proposed. In our protocol, Alice and Bob don’t have to use the entangled character, joint measurement of quantum states. They encrypt their private information and privately get the result of their private information with the help of a third party (TP). Correctness analysis shows that the proposed protocol can be used to get the result of their private information correctly. The proposed protocol can also resist various attacks and overcomes the problem of information leakage with acceptable efficiency. In theory, our protocol can be used to build complex secure protocols for other multiparty computation problems and also have lots of other important applications in distributed networks.

  相似文献   

16.
The valence component of the light-front wave function of a quantum of a scalar field is studied within a bosonic model. The light-front time projection of the inhomogeneous Bethe-Salpeter equation for the vertex function in the covariant ladder approximation is given. The valence wave function and distribution are obtained from the numerical solution of the light-front equation for the vertex with different values of the time-like off-shell momentum carried by the quantum.  相似文献   

17.
In this Letter, we propose a quantum secure direct communication protocol based on single photons without quantum memories. In the proposed protocol, quantum states are transmitted in a stream but not in a quantum data block, hence, quantum memories are unnecessary. Compare with other protocols the advantages of our protocol are smaller quantum space usage, lower cost and more easily being implemented experimentally.  相似文献   

18.
The quantum effects for a physical system can be described by the set E(H)\mathcal{E(H)} of positive operators on a complex Hilbert space H\mathcal{H} that are bounded above by the identity operator I. We denote the set of sharp effects by P(H){\mathcal{P(H) }}. For A,B ? E(H)A,B\in\mathcal{E(H)}, the operation of sequential product A°B=A\frac12BA\frac12A\circ B=A^{\frac{1}{2}}BA^{\frac{1}{2}} was proposed as a model for sequential quantum measurements. Denote by A*B=\fracAB+BA2A\ast B=\frac{AB+BA}{2} the Jordan product of A,B ? E(H)A,B\in\mathcal{E(H)}. The main purpose of this note is to study some of the algebraic properties of the Jordan product of effects. Many of our results show that algebraic conditions on AB imply that A and B commute for the usual operator product. And there are many common properties between Jordan product and sequential product of effects. For example, if AB satisfies certain associative laws, then AB=BA. Moreover, A*B ? P(H)A\ast B\in{\mathcal{P(H) }} if and only if A°B ? P(H)A\circ B\in{\mathcal{P(H)}}.  相似文献   

19.
In this paper, we consider families of operators \({\{x_r\}_{r \in \Lambda}}\) in a tracial C*-probability space \({({\mathcal{A}}, \varphi)}\) , whose joint *-distribution is invariant under free complexification and the action of the hyperoctahedral quantum groups \({\{H_n^+\}_{n \in \mathbb {N}}}\) . We prove a strong form of Haagerup’s inequality for the non-self-adjoint operator algebra \({{\mathcal{B}}}\) generated by \({\{x_r\}_{r \in \Lambda}}\) , which generalizes the strong Haagerup inequalities for *-free R-diagonal families obtained by Kemp–Speicher (J Funct Anal 251:141–173, 2007). As an application of our result, we show that \({{\mathcal{B}}}\) always has the metric approximation property (MAP). We also apply our techniques to study the reduced C*-algebra of the free unitary quantum group \({U_n^+}\) . We show that the non-self-adjoint subalgebra \({{\mathcal{B}}_n}\) generated by the matrix elements of the fundamental corepresentation of \({U_n^+}\) has the MAP. Additionally, we prove a strong Haagerup inequality for \({{\mathcal{B}}_n}\) , which improves on the estimates given by Vergnioux’s property RD (Vergnioux in J Oper Theory 57:303–324, 2007).  相似文献   

20.
A multi-proxy strong blind quantum signature scheme is proposed in this paper. An original signatory Alice delegates her signing authority to a group of proxy signatories by using a classical warrant. A blind factor is introduced by a sender U to blind a message, and the proxy signatories sign the message blindly via applying appropriate unitary operators. A receiver Bob verifies the generated signature with the help of an arbitrator Trent. The security of this scheme is based on a quantum key distribution protocol, a quantum one-time pad and other quantum properties. It is proved that our scheme has the properties of non-disavowal, non-counterfeit, multi-proxy, blindness, untraceability and can resist some common attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号