首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
杨宇光  温巧燕  朱甫臣 《物理学报》2005,54(12):5544-5548
提出了一种基于纠缠交换的多方多级量子密钥分配协议.构造了一种两方三级系统的完备正交归一化基,利用该正交归一化基和纠缠交换可以实现两方量子密钥分配.同时,三级可以推广到多级以及两方推广到多方,即可以实现基于纠缠交换的多方多级量子密钥分配.这样,利用纠缠交换和多级密钥分配可以极大地提高检测窃听的效率、密钥生成率以及信息容量. 关键词: 量子密钥分配 纠缠交换 多方 多级  相似文献   

2.
《Physics letters. A》2020,384(15):126301
The entanglement swapping protocol is analyzed in a relativistic setting, where shortly after the entanglement swapping is performed, a Bell test is performed. For an observer in the laboratory frame, a Bell violation is observed between the qubits with the swapped entanglement. In a moving frame, the order of the measurements is reversed, and a Bell violation is observed even though the particles are not entangled, directly or indirectly, or at any point in time. Although the measurement results are identical, the wavefunctions for the two frames are starkly different — one is entangled and the other is not. Furthermore, for boosts in a perpendicular direction, in the presence of decoherence, we show that the maximum Bell violation can occur across non-simultaneous points in time. This is a signature of entanglement that is spread across both space and time, showing both non-local and non-simultaneous aspects of entanglement.  相似文献   

3.
张英俏  金星日  张寿 《中国物理》2006,15(10):2252-2255
Based on entanglement swapping, a scheme for the secret sharing of an arbitrary two-particle entangled state is proposed. If the controllers do not co-operate with the eavesdropper, the eavesdropper's successful probability decreases with the number of the controllers increasing. In addition, only the Bell-state measurements are required to realize the secret sharing scheme.  相似文献   

4.
Entanglement swapping is a key technology for multi-hop communication based on entanglement in quantum networks. However, the end-to-end delay of the traditional sequential entanglement swapping (SEQES) grows rapidly withthe increase of network scale. To solve this problem, we first propose a low-delay multi-particle simultaneous entanglementswapping (SES) scheme to establish the remote four-particle Greenberger–Horne–Zeilinger (GHZ) channel states for thebidirectional teleportation of three-particle GHZ states, in which the intermediate nodes perform Bell state measurements,send the measurement results and the Bell state type to the user node Bob (or Alice) through classical channel simultaneously. Bob (or Alice) only needs to carry out a proper unitary operation according to the information he (or she) hasreceived. Further, we put forward a hierarchical simultaneous entanglement swapping (HSES) scheme to reduce the classical information transmission cost, which is composed of level-1 SES and level-2 SES (schemes). The former is an innersegment SES, and the latter is an inter segments SES. Theoretical analysis and simulation results show the HSES can obtainthe optimal performance tradeoff between end-to-end delay and classical cost.  相似文献   

5.
A quantum dialogue network is constructed, which uses GHZ states as quantum channel. As its application, a quantum dialogue protocol using entanglement swapping is presented. If the network is safe, any two users in the network can communicate under the control of the other users.  相似文献   

6.
李伟  范明钰  王光卫 《物理学报》2011,60(8):80302-080302
提出了一种基于量子纠缠交换的仲裁签名协议. 以Bell态为基础,首先将待签消息利用幺正算符序列进行编码,通过算符序列对Bell态进行调制,再通过对量子信息加密产生签名.验证者将签名信息与仲裁者通过纠缠交换所产生的关联态相结合,通过Bell测量来对签名的真实性进行验证.算法利用量子加密保障了真实签名的不可伪造性,同时通过仲裁的参与结合量子密钥有效解决了双方的抵赖问题,方案还能够有效实现对通信双方隐私信息的保护. 关键词: 量子密码 量子签名 纠缠交换  相似文献   

7.
8.
To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a novel dynamic quantum secret sharing protocol. The new protocol can not only resist some typical attacks, but also be more efficient than the existing protocols. Furthermore, we take advantage of the protocol to establish the dynamic secret sharing of a quantum state protocol for two-particle maximum entangled states.  相似文献   

9.
The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented. In this attack two dishonest agents together can illegally recover the secret quantum state without the help of any other controller, and it will not be detected by any other users. Furthermore, by modifying the distribution process of particles and adding a detection step after each distribution process, we propose an improved protocol which can resist this kind of attack.  相似文献   

10.
刘佳丽  施荣华  石金晶  吕格莉  郭迎 《中国物理 B》2016,25(8):80306-080306
A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations(corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed.An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank.  相似文献   

11.
<正>In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed.In this scheme a message to be signed is coded with unitary operators.Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message.Combining the entangled states generated by the TTP’s Bell measurement with the signature information,the verifier can verify the authentication of a signature through a single quantum state measurement.Compared with previous schemes,our scheme is more efficient and less complex, furthermore,our scheme can ensure the anonymity of the signer.  相似文献   

12.
分析经典选择重传自动请求重传(automatic repeat-request,ARQ)协议之后,利用量子力学中纠缠态的非定域关联性,提出了数据链路层的选择重传ARQ量子同步通信协议.该协议把链路分为准备阶段和发送阶段.在线路准备阶段完成EPR (Einstein-Podolsky-Rosen)关联对的分发,建立量子信道;在发送阶段完成数据帧和量子确认帧的传送.从吞吐量和信道利用率等方面比较分析了几种常见的数据链路层通信协议的性能.研究表明,该协议可以有效地提高数据链路层的最大吞吐量和信道利用率,改善选择重传ARQ协议的性能,在受时间瓶颈限制的通信中有着重要的应用价值.  相似文献   

13.
基于纠缠的选择自动重传量子同步通信协议   总被引:2,自引:0,他引:2       下载免费PDF全文
分析经典选择重传自动请求重传(automatic repeat-request,ARQ)协议之后,利用量子力学中纠缠态的非定域关联性,提出了数据链路层的选择重传ARQ量子同步通信协议.该协议把链路分为准备阶段和发送阶段.在线路准备阶段完成EPR(Einstein-Podolsky-Rosen)关联对的分发,建立量子信道;在发送阶段完成数据帧和量子确认帧的传送.从吞吐量和信道利用率等方面比较分析了几种常见的数据链路层通信协议的性能.研究表明,该协议可以有效地提高数据链路层的最大吞吐量和信道利用率,改善选择重传ARQ协议的性能,在受时间瓶颈限制的通信中有着重要的应用价值.  相似文献   

14.
We propose a simple geometrical approach for finding robustness of entanglement for Bell decomposable states of two-qubit quantum systems. It is shown that for these states robustness is equal to the concurrence. We also present an analytical expression for two separable states that wipe out all entanglement of these states. Random robustness of these states is also obtained. We also obtain robustness of a class of states obtained from Bell decomposable states via some special local operations and classical communications (LOCC).Received: 28 October 2002, Published online: 5 August 2003PACS: 03.65.Ud Entanglement and quantum nonlocality (e.g. EPR paradox, Bell's inequalities, GHZ states, etc.)  相似文献   

15.
We show that an entanglement swapping operation performed with spontaneous parametric down-conversion can be made faithful without postselection using sum-frequency generation. This invites us to revisit the sum-frequency process and from a proof-of-principle experiment, we demonstrate that it provides a realistic solution for nonlinear optics at the single-photon level. This opens the way to attractive alternatives to six-photon protocols based on linear optics used, e.g., for the heralded creation of maximally entangled pairs or for device-independent quantum key distribution.  相似文献   

16.
In this paper, the issue of swapping quantum entanglements in two arbitrary biqubit pure states via a local bipartite entangledstate projective measure in the middle node is studied in depth, especially with regard to quantitative aspects. Attention is mainly focused on the relation between the measure and the final entanglement obtained via swapping. During the study, the entanglement of formation (EoF) is employed as a quantifier to characterize and quantify the entanglements present in all involved states. All concerned EoFs are expressed analytically; thus, the relation between the final entanglement and the measuring state is established. Through concrete analyses, the measure demands for getting a certain amount of a final entanglement are revealed. It is found that a maximally entangled final state can be obtained from any two given initial entangled states via swapping with a certain probability; however, a peculiar measure should be performed. Moreover, some distinct properties are revealed and analyzed. Such a study will be useful in quantum information processes.  相似文献   

17.
邓黎  陈爱喜  张建松 《中国物理 B》2011,20(11):110304-110304
We provide a scheme with which the transfer of the entangled state and the entanglement swapping can be realized in a system of neutral atoms via the Rydberg blockade. Our idea can be extended to teleport an unknown atomic state. According to the latest theoretical research of the Rydberg excitation and experimental reports of the Rydberg blockade effect in quantum information processing, we discuss the experimental feasibility of our scheme.  相似文献   

18.
In this paper, only Bell states are employed and needed to be identified to realize the multiparty secret sharing of quantum information, where the secret is an arbitrary unknown quantum state in a qubit. In our multiparty quantum information secret sharing (QISS) scheme, no subset of all the quantum information receivers is sufficient to reconstruct the unknown state in a qubit but the entire is. The present multiparty QISS scheme is more feasible with present-day technique.  相似文献   

19.
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden rule.In the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary transformations.The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations.To accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this paper.The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility.Moreover,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service attack.To improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号