首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
2.
Quantum Key Distribution against Trojan Horse Attacks   总被引:1,自引:0,他引:1       下载免费PDF全文
蔡庆宇  吕桦 《中国物理快报》2007,24(5):1154-1157
Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.  相似文献   

3.
Since the original Cai-Li protocol [Chin. Phys. Lett. 21 (2004)601] can be used only in an ideal quantum communication, we present the modified Cai-Li protocol that can be used in the a noisy quantum channel by using Calderbank-Shor-Steane (CSS) codes to correct errors. We also give a tight bound on the connection between information Eve eavesdropped with a measurement attack in line B → A and detection probability,which shows that the Cai-Li protocol can be used as a quasisecure direct quantum communication.  相似文献   

4.
We derive an optimal 2→ M phase-covariant quantum broadcasting of mixed equatorial qubits. This quantum broadcasting is optimal in the sense that the shrinking factor between the input and the output single qubit achieves the upper bound. The result shows that we can copy two identical mixed equatorial qubits with the same quality as those of two identical pure equatorial states.  相似文献   

5.
Quantum teleportation is one of the most important subjects in quantum information science. This is because quantum teleportation can be regarded as not only quantum information transfer but also a building block for universal quantum information processing. Furthermore, deterministic quantum information processing is very important for efficient processing and it can be realized with continuous-variable quantum information processing. In this review, quantum teleportation for continuous variables and related quantum information processing are reviewed from these points of view.  相似文献   

6.
We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept resend attacks. Furthermore, it is eifficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the etfficiency of the protocol.  相似文献   

7.
We show that non-maximally entangled states can be used to build a quantum key distribution (QKD) scheme where the key is probabilistically teleported from Alice to Bob. This probabilistic aspect of the protocol ensures the security of the key without the need of non-orthogonal states to encode it, in contrast to other QKD schemes. Also, the security and key transmission rate of the present protocol is nearly equivalent to those of standard QKD schemes and these aspects can be controlled by properly harnessing the new free parameter in the present proposal, namely, the degree of partial entanglement. Furthermore, we discuss how to build a controlled QKD scheme, also based on partially entangled states, where a third party can decide whether or not Alice and Bob are allowed to share a key.  相似文献   

8.
Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein- Podolsky Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators.  相似文献   

9.
We present a tripartite quantum information splitting scheme which splits a qutrit state via two GHZ states. The scheme is then generalized to splitting a qudit state among any number of receivers. We show that this scheme is also applicable to splitting any multi-qudit entangled states.  相似文献   

10.
We analyse a process of remote information concentration achieved by the W state. The result turns out to be neither as good as performed by the GHZ state nor as by the Smolin bound entangled state. Based on this particular phenomenon, the properties of the three entangled states are realized.  相似文献   

11.
Ho Ngoc Phien 《Physics letters. A》2008,372(16):2825-2829
We propose a linear optics scheme to teleport an arbitrary two-mode coherent state. The devices used are beam-splitters, phase-shifters and ideal photo-detectors capable of distinguishing between even and odd photon numbers. The scheme achieves faithful teleportation with a probability of 1/4. However, with additional use of an appropriate displacement operator, the teleported state can always be made near-faithful.  相似文献   

12.
We propose a scheme of quantum secret sharing between Alice's group and Bob's group with single photons and unitary transformations. In the protocol, one member in Alice's group prepares a sequence of single photons in one of four different states, while other members directly encode their information on the sequence of single photons via unitary operations; after that, the last member sends the sequence of single photons to Bob's group. Then Bob's, except for the last one, do work similarly. Finally the last member in Bob's group measures the qubits. If the security of the quantum channel is guaranteed by some tests, then the qubit states sent by the last member of Alice's group can be used as key bits for secret sharing. It is shown that this scheme is safe.  相似文献   

13.
We propose a protocol Dn for faithfully teleporting an arbitrary n-qudit state with the tensor product state (TPS) of n generalized Bell states (GBSs) as the quantum channel. We also put forward explicit protocols and for faithfully teleporting an arbitrary n-qudit state with two classes of 2n-qudit GESs as the quantum channel, where the GESs we constructed are a kind of genuine entangled states which cannot be reducible to the TPS of n GBSs.  相似文献   

14.
15.
We present a new method called the permutation matrix method to perform dense coding using Greenberger--Horne--Zeilinger (GHZ) states. We show that this method makes the study of dense coding systematically and regularly. It also has high potential to be realized physically.  相似文献   

16.
Polarization entangled photon pairs are easily perturbed in noisy channels. We propose a polarization entanglement purification method using temporal degree of freedom, followed by the conventional iterative purification. The entanglement fidelity can be improved to any degree, and the steps needed are less than those using conventional iteration method.  相似文献   

17.
The entanglement-assisted capacity of a generalized amplitude damping channel is investigated by using the properties of partial symmetry and concavity of mutual information. The numerical and analytical results of the entanglement-assisted capacity are obtained under certain conditions. It is shown that the entanglement-assisted capacity depends on the channel parameters representing the ambient temperature and dissipation, and the prior entanglement between sender and receiver can approximately double the classical capacity of the generalized amplitude damping channel.  相似文献   

18.
We propose a new protocol for quantum teleportation of an arbitrary two qubit state via continuous variables entangling channel. In our scheme two pairs of entangled light fields are employed. An outstanding characteristic of this scheme is that arbitrary state of two atoms is transmitted deterministically and directly to another pair of atoms without the help of the other atoms.  相似文献   

19.
We propose a protocol of remote information concentration achieved by a four-particle cluster state. To achieve the task, Bell state measurement and unitary operation are needed. The result shows a peculiar phenomenon that the remote information concentration is not always successful but with certain probability.  相似文献   

20.
We consider the model of quantum computer, which is represented as a Ising spin lattice, where qubits (spin-half systems) are separated by the isolators (two spin-half systems). In the idle mode or at the single bit operations the total spin of isolators is 0. There are no need of complicated protocols for correcting the phase and probability errors due to permanent interaction between the qubits. We present protocols for implementation of universal quantum gates with the rectangular radio-frequency pulses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号