共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
We investigate the generation and the evolution of continuous-variable (CV) entanglement from a laser-driven four-state atom inside a doubly resonant cavity under Raman excitation. Two transitions in the four-state atom independently interact with the two cavity modes, while two other transitions are driven by coupling laser fields. By including the atomic relaxation as well as cavity losses, we show that the CV entanglement with large mean number of
photons can be generated in our scheme. We also show that the intensity of the coupling laser fields can influence effectively the entanglement period of the cavity field. Different from the conventional resonant excitation scheme where zero one-photon detuning are required, it is found that the intensity and period of entanglement between the two cavity modes as well as the total mean photon number of the cavity field can be adjusted by properly
modulating the frequency detuning. 相似文献
3.
DAI Fang-Wen MA Lei 《理论物理通讯》2008,49(3):590-594
We obtain an explicit formula to calculate the entanglement entropy of bipartite entangled state of general two-mode boson exponential quadratic operator with continuous variables in Fock space. The simplicity and generality of our formula are shown by some examples. 相似文献
4.
5.
Atmospheric continuous-variable quantum key distribution (ACVQKD) has been proven to be secure theoretically with the assumption that the signal source is well protected by the sender so that it cannot be compromised. However, this assumption is quite unpractical in realistic quantum communication system. In this work, we investigate a practical situation in which the signal source is no longer protected by the legitimate parts, but is exposed to the untrusted atmospheric channel. We show that the performance of ACVQKD is reduced by removing the assumption, especially when putting the untrusted source at the middle of the channel. To improve the performance of the ACVQKD with the untrusted source, a non-Gaussian operation, called photon subtraction, is subsequently introduced. Numerical analysis shows that the performance of ACVQKD with an untrusted source can be improved by properly adopting the photon subtraction operation. Moreover, a special situation where the untrusted source is located in the middle of the atmospheric channel is also considered. Under direct reconciliation, we find that its performance can be significantly improved when the photon subtraction operation is manipulated by the sender. 相似文献
6.
In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that seriously threatens the security of practical QKD systems. In this paper, we propose a new quantum hacking attack on an integrated silicon photonic continuous-variable quantum key distribution (CVQKD) system, which is known as a power analysis attack. This attack can be implemented by analyzing the power originating from the integrated electrical control circuit in state preparation with the help of machine learning, where the state preparation is assumed to be perfect in initial security proofs. Specifically, we describe a possible power model and show a complete attack based on a support vector regression (SVR) algorithm. The simulation results show that the secret key information decreases with the increase of the accuracy of the attack, especially in a situation with less excess noise. In particular, Eve does not have to intrude into the transmitter chip (Alice), and may perform a similar attack in practical chip-based discrete-variable quantum key distribution (DVQKD) systems. To resist this attack, the electrical control circuit should be improved to randomize the corresponding power. In addition, the power can be reduced by utilizing the dynamic voltage and frequency scaling (DVFS) technology. 相似文献
7.
Zakaria Dahbi Maron F. Anka Mostafa Mansour Moisés Rojas Clebson Cruz 《Annalen der Physik》2023,535(3):2200537
Studying quantum properties in solid-state systems is a significant avenue for research. In this scenario, double quantum dots appear as a versatile platform for technological breakthroughs in quantum computation and nanotechnology. This work inspects the thermal entanglement and quantum coherence in two-coupled DODs, where the system is exposed to an external stimulus that induces an electronic transition within each subsystem. The results show that the introduction of external stimulus induces a quantum level crossing that relies upon the Coulomb potential changing the degree of quantum entanglement and coherence of the system. Thus, the quantum properties of the system can be tuned by changing the transition frequency, leading to the enhancement of its quantum properties. 相似文献
8.
Xinchao Ruan Wenhao Shi Guojun Chen Wei Zhao Hang Zhang Ying Guo 《Entropy (Basel, Switzerland)》2021,23(9)
The secret key rate is one of the main obstacles to the practical application of continuous-variable quantum key distribution (CVQKD). In this paper, we propose a multiplexing scheme to increase the secret key rate of the CVQKD system with orbital angular momentum (OAM). The propagation characteristics of a typical vortex beam, involving the Laguerre–Gaussian (LG) beam, are analyzed in an atmospheric channel for the Kolmogorov turbulence model. Discrete modulation is utilized to extend the maximal transmission distance. We show the effect of the transmittance of the beam over the turbulent channel on the secret key rate and the transmission distance. Numerical simulations indicate that the OAM multiplexing scheme can improve the performance of the CVQKD system and hence has potential use for practical high-rate quantum communications. 相似文献
9.
In this work, the thermal quantum correlations in two coupled double semiconductor charge qubits are investigated. This is carried out by deriving analytical expressions for both the thermal concurrence and the correlated coherence. The effects of the tunneling parameters, the Coulomb interaction, and the temperature on the thermal entanglement and on the correlated coherence are studied in detail. It is found that the Coulomb potential plays an important role in the thermal entanglement and in the correlated coherence of the system. The results also indicate that the Coulomb potential can be used for significant enhancement of the thermal entanglement and quantum coherence. One interesting aspect is that the correlated coherence capture all the thermal entanglement at low temperatures, that is, the local coherences are totally transferred to the thermal entanglement. Finally, the role played by thermal entanglement and the correlated coherence responsible for quantum correlations are focused on. It is shown that in all cases, the correlated coherence is more robust than the thermal entanglement so that quantum algorithms based only on correlated coherence may be more robust than those based on entanglement. 相似文献
10.
Shengjie Xu Yin Li Yijun Wang Yun Mao Xiaodong Wu Ying Guo 《Entropy (Basel, Switzerland)》2021,23(12)
We perform security analysis of a passive continuous-variable quantum key distribution (CV-QKD) protocol by considering the finite-size effect. In the passive CV-QKD scheme, Alice utilizes thermal sources to passively make preparation of quantum state without Gaussian modulations. With this technique, the quantum states can be prepared precisely to match the high transmission rate. Here, both asymptotic regime and finite-size regime are considered to make a comparison. In the finite-size scenario, we illustrate the passive CV-QKD protocol against collective attacks. Simulation results show that the performance of passive CV-QKD protocol in the finite-size case is more pessimistic than that achieved in the asymptotic case, which indicates that the finite-size effect has a great influence on the performance of the single-mode passive CV-QKD protocol. However, we can still obtain a reasonable performance in the finite-size regime by enhancing the average photon number of the thermal state. 相似文献
11.
We study the entanglement properties of the output state of a universal cloning machine. We analyse in particular bipartite and tripartite entanglement of the clones, and discuss the classical limit of infinitely many output copies. 相似文献
12.
We address minimization of information leakage from continuous-variable quantum channels. It is known, that regime of minimum leakage can be accessible for the modulated signal states with variance equivalent to a shot noise, i.e., vacuum fluctuations, in the case of collective attacks. Here we derive the same condition for the individual attacks and analytically study the properties of the mutual information quantities in and out of this regime. We show that in such regime a joint measurement on the modes of a two-mode entangling cloner, being the optimal individual eavesdropping attack in a noisy Gaussian channel, is no more effective that independent measurements on the modes. Varying variance of the signal out of this regime, we observe the nontrivial statistical effects of either redundancy or synergy between the measurements of two modes of the entangling cloner. The result reveals the non-optimality of entangling cloner individual attack for sub-shot-noise modulated signals. Considering the communication between the cloner modes, we show the advantage of knowing the residual noise after its interaction with the cloner and extend the result to a two-cloner scheme. 相似文献
13.
Many-Agent Controlled Teleportation of Multi-qubit Quantum Information via Quantum Entanglement Swapping 总被引:2,自引:0,他引:2
ZHANG Zhan-Jun LIU Yi-Min MAN Zhong-Xiao 《理论物理通讯》2005,44(5):847-850
We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information receiver can the unknown states in the sender's qubits be fully reconstructed in the receiver's qubits. In our method, agents's control parameters are obtained via quantum entanglement swapping. As the realization of the many-agent controlled teleportation is concerned, compared to the recent method [G.P. Yang, et al., Phys. Rev. A 70 (2004) 022329], our present method considerably reduces the preparation difficulty of initial states and the identification difficulty of entangled states, moreover, it does not need local Hadamard operations and it is more feasible in technology. 相似文献
14.
Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to remove all imperfections originating from detection. However, there are still some inevitable imperfections in a practical CV-MDI QKD system. For example, there is a fluctuating channel transmittance in the complex communication environments. Here we investigate the security of the system under the effects of the fluctuating channel transmittance, where the transmittance is regarded as a fixed value related to communication distance in theory. We first discuss the parameter estimation in fluctuating channel transmittance based on these establishing of channel models, which has an obvious deviation compared with the estimated parameters in the ideal case. Then, we show the evaluated results when the channel transmittance respectively obeys the two-point distribution and the uniform distribution. In particular, the two distributions can be easily realized under the manipulation of eavesdroppers. Finally, we analyze the secret key rate of the system when the channel transmittance obeys the above distributions. The simulation analysis indicates that a slight fluctuation of the channel transmittance may seriously reduce the performance of the system, especially in the extreme asymmetric case. Furthermore, the communication between Alice, Bob and Charlie may be immediately interrupted. Therefore, eavesdroppers can manipulate the channel transmittance to complete a denial-of-service attack in a practical CV-MDI QKD system. To resist this attack, the Gaussian post-selection method can be exploited to calibrate the parameter estimation to reduce the deterioration of performance of the system. 相似文献
15.
The time-dependent quantum Monte Carlo method for fermions is introduced and applied in the calculation of the entanglement of electrons in one-dimensional quantum dots with several spin-polarized and spin-compensated electron configurations. The rich statistics of wave functions provided by this method allow one to build reduced density matrices for each electron, and to quantify the spatial entanglement using measures such as quantum entropy by treating the electrons as identical or distinguishable particles. Our results indicate that the spatial entanglement in parallel-spin configurations is rather small, and is determined mostly by the spatial quantum nonlocality introduced by the ground state. By contrast, in the spin-compensated case, the outermost opposite-spin electrons interact like bosons, which prevails their entanglement, while the inner-shell electrons remain largely at their Hartree–Fock geometry. Our findings are in close correspondence with the numerically exact results, wherever such comparison is possible. 相似文献
16.
17.
ZHANG Zhan-Jun LIU Yi-Min MAN Zhong-Xiao 《理论物理通讯》2005,44(11)
We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information receiver can the unknown states in the sender‘s qubits be fully reconstructed in the receiver‘s qubits. In our method,agents‘s control parameters are obtained via quantum entanglement swapping. As the realization of the many-agent controlled teleportation is concerned, compared to the recent method [C.P. Yang, et al., Phys. Rev. A 70 (2004) 022329],our present method considerably reduces the preparation difficulty of initial states and the identification difficulty of entangled states, moreover, it does not need local Hadamard operations and it is more feasible in technology. 相似文献
18.
叙述了磷离子注入方法诱导具有不同发射波长的InGaAsP双量子阱结构的混合,并通过光致发光谱和断面透射电子显微术对量子阱混合的程度进行了研究。在特定条件下快速热退火处理后,光致发光谱显示,在离子注入剂量低于7×1011/cm2情况下,两个阱的谱峰能保持较好的分离,注入剂量从1011 /cm2增大到1012/cm2的过程中,两个阱的带隙蓝移值都似乎存在一个极大值,并且在同样的条件下,上阱(发射波长为1.52 μm)的带隙蓝移值较下阱(发射波长为1.59 μm)大些。当离子注入剂量达到1012/cm2时,上阱的谱峰近乎消失,双阱光致发光谱出现了一个谱峰。用断面透射电子显微术对原生长样品与带隙蓝移具有极大值的退火样品进行微结构比较,结果显示,对比原生长样品,退火样品的晶格原子基本得到修复,但阱与垒间的界面显得模糊,这说明离子注入导致两阱完全混合。 相似文献
19.
GUO Ying ZENG Gui-Hua Moon Ho Lee 《理论物理通讯》2008,50(8):363-367
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes. 相似文献
20.
We study the degree to which quantum entanglement survives when a three-qubit entangled state iscopied by using local and non-local processes, respectively, and investigate iterating quantum copyingfor the three-qubitsystem. There may exist inter-three-qubit entanglement and inter-two-qubit entanglement for the three-qubit system.We show that both local and non-local copying processes degrade quantum entanglement in the three-particle systemdue to a residual correlation between the copied output and the copying machine. We also show that the inter-two-qubitentanglement is preserved better than the inter-three-qubit entanglement in the local cloning process. We find thatnon-local cloning is much more efficient than the local copying for broadcasting entanglement, and output state vianon-local cloning exhibits the fidelity better than local cloning. 相似文献