首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A quantum secret sharing scheme is proposed by making use of quantum registers. In the proposed scheme, secret message state is encoded into multipartite entangled states. Several identical multi-particle entanglement states are generated and each particle of the entanglement state is filled in different quantum registers which act as shares of the secret message. Two modes, i.e. the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the secret message may be recovered. The security analysis shows that the proposed scheme is secure against eavesdropping of eavesdropper and cheating of participants.  相似文献   

2.
Physics of Atomic Nuclei - We discuss the problem of the time variable in the nearly standard formulation of the quantum mechanics. In order to be able to describe the outcome of some of the...  相似文献   

3.
This article discusses the separability of the pure and mixed states of the quantum network of four nodes by means of the criterion of entanglement in terms of the covariance correlation tensor in quantum network theory.  相似文献   

4.
The effective energy of the approximate gauge-field configuration customarily known as the Copenhagen vacuum is calculated in the single-loop approximation. It is shown that this quantity is always positive and so it is impossible to make any statements about the spontaneous generation of such a field. The possibility of the temperature stabilization of a homogeneous chromomagnetic field is also discussed.Translated from Izvestiya Vysshikh Uchebnykh Zavedenii, Fizika, No. 5, pp. 74–79, May, 1986.  相似文献   

5.
Does the quantum state represent reality or our knowledge of reality? In making this distinction precise, we are led to a novel classification of hidden variable models of quantum theory. We show that representatives of each class can be found among existing constructions for two-dimensional Hilbert spaces. Our approach also provides a fruitful new perspective on arguments for the nonlocality and incompleteness of quantum theory. Specifically, we show that for models wherein the quantum state has the status of something real, the failure of locality can be established through an argument considerably more straightforward than Bell’s theorem. The historical significance of this result becomes evident when one recognizes that the same reasoning is present in Einstein’s preferred argument for incompleteness, which dates back to 1935. This fact suggests that Einstein was seeking not just any completion of quantum theory, but one wherein quantum states are solely representative of our knowledge. Our hypothesis is supported by an analysis of Einstein’s attempts to clarify his views on quantum theory and the circumstance of his otherwise puzzling abandonment of an even simpler argument for incompleteness from 1927.  相似文献   

6.
The question of the cause of inertial reaction forces and the validity of Mach's principle are investigated. A recent claim that the cause of inertial reaction forces can be attributed to an interaction of the electrical charge of elementary particles with the hypothetical quantum mechanical zero-point fluctuation electromagnetic field is shown to be untenable. It fails to correspond to reality because the coupling of electric charge to the electromagnetic field cannot be made to mimic plausibly the universal coupling of gravity and inertia to the stress-energy-momentum (i.e., matter) tensor. The gravitational explanation of the origin of inertial forces is then briefly laid out, and various important features of it explored in the last half-century are addressed.  相似文献   

7.
We report the low threshold current density operation of strain-compensated In0.64 Ga0.36As/In0.3sAl0.62As quantum cascade lasers emitting near 4.94 μm. By employing an enlarged strain-compensated structure and optimizing the injector doping density, a rather low threshold current density of 0.57kA/cm^2 at 80 K is achieved/or an uncoated 20-μm-wide and 2.5-mm-long laser.  相似文献   

8.

Under the actions of different Hamiltonians on the different two-qubit input states by using the quantum Yang-Baxterization approach, we investigate the behaviors of the fidelity and the trace distance as measures of ‘closeness’ and distinguishability of two quantum states. The results show that the fidelity that is the main figure of merit for any communication and computing process can be kept to high values depending on the choice of the initial states and the Hamiltonians constructed by the Yang-Baxter equation. On the other hand, by choosing the initial states and Yang-Baxter systems which are the various extensions of the Yang-Baxter equations for several matrices, these quantifiers can be adjusted as desired to achieve many quantum computing and computational tasks. Furthermore, to quantify the performance of quantum teleportation we examine the teleportation fidelity for the outputs that correspond to the different two-qubit X-type states under the actions of the different Hamiltonians. It is possible to obtain high fidelity to use the quantum teleportation process.

  相似文献   

9.
Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587–2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.’s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.’s research (2015), Xu et al.’s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.  相似文献   

10.
By fitting the E2 transition spectra of superdeformed bands in A~190 region, the coefficients of Bohr-Mottelson's I(I+1) expansion are determined and moments of inertia of band head are calculated out. All results show that the moments of inertia of odd-A nuclei are systematically larger than those of the neighboring even-even nuclei, and the moments of inertia of odd-odd nuclei are systematically larger than those of the neighboring odd-A nuclei. The odd-even difference of moment of inertia of nuclear superdeformed states is obvious.  相似文献   

11.
One-photon and two-photon superposition states are the fundamental quantum states, which have shown interesting features, such as squeezing and anti-bunching. In this paper we discuss the quantum teleportation of such quantum states with the continuous-wave EPR states. Fidelity as a function of EPR correlation is obtained. We also compared the results with Fock state and coherent state teleportation.  相似文献   

12.
Electron States of Few—Electron Quantum dots   总被引:2,自引:0,他引:2       下载免费PDF全文
We study few-electron semiconductor quantum dots using the unrestricted Hartree-Fock-Roothaan method hased on the Gaussian basis.Our emphasis is on the energy level calculation for quantum dots.The confinement potential in a quantum dot is assumed to be in a form of three-dimensional spherical finite potential well.Some valuable results,such as the rearrangement of the energy level,have been obtained.  相似文献   

13.
郑仕标 《中国物理快报》2006,23(9):2356-2359
We describe a protocol for quantum state teleportation via mixed entangled pairs. With the help of an ancilla, near-perfect teleportation might be achieved. For pure entangled pairs, perfect teleportation might be achieved with a certain probability without using an ancilla. The protocol is generalized to teleportation of multiparticle states and quantum secret sharing.  相似文献   

14.
Recently, Liu et al. proposed a quantum private comparison (QPC) based on Bell entangled states (Liu et al. in Commun. Theor. Phys. 57(4): 583, 2012). This paper points out a security loophole in Liu et al.’s protocol, in which the third party can disclose the private information of both users. In addition, an improvement is proposed to avoid the loophole.  相似文献   

15.
With the purpose of introducing a useful tool for researches concerning foundations of quantum mechanics and applications to quantum technologies, here we address three quantumness quantifiers for bipartite optical systems: one is based on sub-shot-noise correlations, one is related to antibunching and one springs from entanglement determination. The specific cases of parametric downconversion seeded by thermal, coherent and squeezed states are discussed in detail.  相似文献   

16.
Marchildon's (favorable) assessment (Foundations of Physics, foregoing paper) of the Pondicherry interpretation of quantum mechanics raises several issues, which are addressed. Proceeding from the assumption that quantum mechanics is fundamentally a probability algorithm, this interpretation determines the nature of a world that is irreducibly described by this probability algorithm. Such a world features an objective fuzziness, which implies that its spatiotemporal differentiation does not go all the way down. This result is inconsistent with the existence of an evolving instantaneous state, quantum or otherwise.  相似文献   

17.
By optimizing the molecule beam epitaxy growth condition, the quality of quantum cascade (QC) material has greatly been improved. The spectrum of double x-ray diffraction indicates that the interface between the constituent layers is very smooth, the lattice mismatch between the epilayer and the substrate is less than 0.1%,and the periodicity fluctuation of the active region is not more than 4.2%. The QC laser with the emission wavelength of about 5.1μm is operated at the threshold of 0.73 kA/cm^2 at liquid nitrogen temperature with the repetition rate of lOkHz and at a duty cycle of 1%. Meanwhile, the performance of the laser can be improved with suitable post process techniques such as the metallic ohmic contact technology.  相似文献   

18.
宋杰  张寿 《中国物理快报》2006,23(6):1383-1836
We show that a potential eavesdropper can eavesdrop whole secret information when the legitimate users use secure carrier to encode and decode classical information repeatedly in the protocol proposed by Bagherinezhad S and Karimipour V [Phys. Rev. A 67(2003)044302]. Then we present a revised quantum secret sharing protocol by using the Greenberger-Horne-Zeilinger state as secure carrier. Our protocol can resist Eve's attack.  相似文献   

19.

Table of Contents

Contents of the Proceedings of the 11th International Colloquium on Quantum Groups Quantum Groups and Integrable Systems  相似文献   

20.
宋杰 《量子光学学报》2006,12(B08):51-51
We show that a potential eavesdropper can eavesdrop whole secret information when the legitimate users use secure carrier to encode and decode classical information repeatedly in the protocol proposed by Bagherinezhad S and Karimipour V [ Phys. Rev. A 67 (2003) 044302 ]. Then we present a revised quantum secret sharing protocol by using the Greenberger-Horne-Zeilinger state as secure carrier. Our protocol can resist Eve' s attack.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号