首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
  总被引:1,自引:0,他引:1  
A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed.In the proposed scheme,communicators share key information by exchanging one travelling photon with two random and secret polarization angles.The security of the distributed key is guaranteed by three checking phases in three-way channel and the communicators' secret polarization angles.  相似文献   

2.
This article discusses the role of covariance correlation tensor in the establishment of the criterion of quantum entanglement. It gives a simple example to show the powerfulness in the treatment of quantum dense coding,and illustrates the fact that this method also provides theoretical basis for establishing corresponding knotted pictures.  相似文献   

3.
This article discusses the role of covariance correlation tensor in the establishment of the criterion of quantum entanglement. It gives a simple example to show the powerfulness in the treatment of quantum dense coding, and illustrates the fact that this method also provides theoretical basis for establishing corresponding knotted pictures.  相似文献   

4.
A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable.  相似文献   

5.
A symmetric two-mode Gaussian entangled state is used to investigate the effect of excess noise on entanglement sudden death and Gaussian quantum discord with continuous variables. The results show that the excess noise in the channel can lead to entanglement sudden death of a symmetric two-mode Gaussian entangled state, while Gaussian quantum discord never vanishes. As a practical application, the security of a quantum key distribution (QKD) scheme based on a symmetric two-mode Gaussian entangled state against collective Gaussian attacks is analyzed. The calculation results show that the secret key cannot be distilled when entanglement vanishes and only quantum discord exists in such a QKD scheme.  相似文献   

6.
相位-偏振编码的量子保密通信系统的研究   总被引:5,自引:0,他引:5  
提出了一种新型的量子信息编码和解码新方法,并用全量子力学方法,对这种量子信息编码 技术进行了系统的理论分析.根据态叠加原理,可以用两个正交的偏振态,通过偏振干涉方 法合成一个新的偏振态.这个合成的偏振态由两个正交偏振态的相位差决定.改变相位差,就 可以合成各种不同的偏振态.而相位差的改变可以通过相位调制器来实现,从而可以用相位调制方法,实现对光子偏振态的编码和解码.这种方法可以随机地制备各种非正交偏振态, 也可以随机地产生各种非正交偏振态测量基,对各种非正交偏振态的光子进行检测和解码. 这种编码方法既具有相位编码方法传输距离大的优点,同时又克服了该方法信息损失过半的 缺点,还可以对光子的位相和偏振态进行精确补偿,有效地降低误码率.关键词:量子密钥分配相位编码偏振编码  相似文献   

7.
         下载免费PDF全文
周瑞瑞  杨理 《中国物理 B》2012,21(8):80301-080301
An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented,based on which we construct a quantum election scheme without the help of an entanglement state.We show that this election scheme ensures the completeness,soundness,privacy,eligibility,unreusability,fairness,and verifiability of a large-scale election in which the administrator and counter are semi-honest.This election scheme can work even if there exist loss and errors in quantum channels.In addition,any irregularity in this scheme is sensible.  相似文献   

8.
提出了一种在双马赫-曾德尔干涉仪量子保密通信系统上同时实现时间编码和相位编码的混合量子密钥分发方案.提出的方案将原来相位编码方案中丢弃的脉冲进行时间编码,因此成码率是原方案的二倍.系统同时获得时间编码密钥和相位编码密钥,既可以一组用于通信,另一组用于监视窃听,又可以将两组密钥组合成新密钥.系统具有良好的应用前景.关键词:量子保密通信量子密钥分发相位编码时间编码  相似文献   

9.
安雪碧  银振强  韩正甫 《物理学报》2015,64(14):140303-140303
宏观-微观纠缠最早起源于“薛定谔的猫”思想实验, 是指在宏观体系与微观体系之间建立量子纠缠. 实现宏观-微观纠缠可以利用多种物理体系来完成, 本文重点介绍了在光学体系中制备和检验宏观-微观纠缠的发展过程. 从最初的受激辐射单光子量子克隆到光学参量放大, 再到相空间的位移操作, 实验上制备宏观-微观纠缠的方法取得了长足的进步. 利用非线性光学参量放大过程制备的宏观-微观纠缠的光子数可以达到104量级, 人眼已经可以观察到, 因此使用人眼作为探测器来检验宏观-微观纠缠的实验开始出现. 但随后人们意识到, 粗精度的光子数探测器, 例如人眼, 无法严格判定宏观-微观纠缠的存在. 为了解决这个难题, 提出了一种巧妙的方法, 即在制备宏-微观纠缠后, 利用局域操作过程将宏观态再变为微观态, 通过判定微观纠缠存在的方法来判定宏微观纠缠的存在. 之后相空间的位移操作方法将宏观态的粒子数提高到108, 并且实现了纠缠的严格检验. 利用光机械实现宏观-微观纠缠的方案也被提出. 由于量子密钥分配中纠缠是必要条件, 而宏观-微观纠缠态光子数较多这一优势可能会对量子密钥分配的传输距离有所提高. 本文介绍了利用相位纠缠的相干态来进行量子秘钥分配的方案, 探讨了利用宏观-微观纠缠实现量子密钥分配的可能性.  相似文献   

10.
提出了一种改进的基于时间和相位混合编码的量子密钥分发方案, 并进行了实验研究.在以BB84协议为基础的相位编码量子密钥分发系统上, 利用了系统中原来舍弃的脉冲进行时间编码, 使成码率提高为原方案的二倍. 系统同时获得时间编码密钥和相位编码密钥, 现在可以将两组密钥组合成新密钥, 提高了成码率和监测窃听灵敏度. 同时在系统的接收端用双FM反射式干涉仪代替传统的光纤M-Z干涉仪,提高了系统的稳定性. 实验上已实现90km光纤量子密钥分发, 实验表明本系统具有安全性高,稳定性好,成本低的优点.关键词:量子保密通信量子密钥分发相位编码时间编码  相似文献   

11.
基于六光子量子避错码的量子密钥分发方案   总被引:3,自引:0,他引:3  
刘文予  李宁  王长强  刘玉 《光学学报》2005,25(11):568-1572
量子信道中不可避免存在的噪声将扭曲被传输的信息,对通信造成危害。目前克服量子信道噪声的较好方案是量子避错码(QEAC)。将量子避错码思想用于量子密钥分发,能有效克服信道中的噪声,且无需复杂的系统。用六光子构造了量子避错码,提出了一种丛于六光子避错码的量子密钥分发(QDK)方案。以提高量子密钥分发的量子比特效率和安全性为前提,对六光子避错码的所有可能态进行组合,得到一种六光子避错码的最优组合方法,可将两比特信息编码在一个态中,根据测肇结果和分组信息进行解码,得到正确信息的平均概率为7/16。与最近的基于四光子避错码的克服量子信道噪声的量子密钥分发方案相比,该方案的量子比特效率提高了16.67%,密钥分发安全性足它的3.5倍。  相似文献   

12.
杨宇光  温巧燕  朱甫臣 《物理学报》2005,54(12):5544-5548
提出了一种基于纠缠交换的多方多级量子密钥分配协议.构造了一种两方三级系统的完备正交归一化基,利用该正交归一化基和纠缠交换可以实现两方量子密钥分配.同时,三级可以推广到多级以及两方推广到多方,即可以实现基于纠缠交换的多方多级量子密钥分配.这样,利用纠缠交换和多级密钥分配可以极大地提高检测窃听的效率、密钥生成率以及信息容量.关键词:量子密钥分配纠缠交换多方多级  相似文献   

13.
    
GAO Gan 《理论物理通讯》2009,51(5):820-822
Based on entanglement swapping, a quantum key distribution (QKD) scheme is proposed. In this scheme, the secret keys are formed by comparing initial Bell states and outcomes of entanglement swapping. Moreover, all initial Bell states prepared by Alice and Bob are completely arbitrary. As the classical information exchanged between two parties is very little, this QKD scheme has a high efficiency. In addition, in order to prevent eavesdropping, decoy particles are used.  相似文献   

14.
一种网络多用户量子认证和密钥分配理论方案   总被引:4,自引:0,他引:4  
杨宇光  温巧燕  朱甫臣 《物理学报》2005,54(9):3995-3999
提出了一种网络多用户量子认证和密钥分配理论方案.类似于现代密码学中的网络认证体系结构提出了一种基于网络中用户与所属的可信服务器之间共享Einstein-Podolsky-Rosen(EPR)纠缠对进行身份认证和密钥分配的分布式客户机/服务器体系结构.基于该体系结构实现网络中任意用户之间的身份认证和密钥分配.可信服务器只提供用户的身份认证以及 交换粒子之间的纠缠使得两个想要秘密通信的用户的粒子纠缠起来.密钥的生成由发起请求 的用户自己完成.网络中的用户只需和所属的可信服务器共享EPR纠缠对通过经典信道和量子 信道与服务器通信.用户不需要互相共享EPR纠缠对,这使得网络中的EPR对的数量由O(n2)减小到O(n).关键词:量子认证量子密钥分配客户机/服务器纠缠交换  相似文献   

15.
This paper reports that a quantum dense coding can be implemented with ions confined in a linear trap and interacting with laser beams. The scheme is insensitive to the interaction between the quantum channel and the environment. The Bell-state measurement is not involved and the probability of success in our scheme is 1.0.  相似文献   

16.
龙桂鲁  盛宇波  殷柳国 《物理》2018,47(7):413-417
量子通信利用量子信道进行信息的编码、传输和处理,具有安全性高和信道容量高等特点。量子保密通信以信息安全为主要目的,包括量子密钥分发、量子安全直接通信和量子秘密共享等模式。利用量子纠缠,量子隐形传态根据事先已经分发的纠缠粒子对实现不传输实物粒子而传输未知粒子的状态,量子密集编码通过传输一个粒子而实现两个粒子信息的传输,这些是经典通信无法实现的任务。文章简单介绍量子通信的内容和进展情况。  相似文献   

17.
    
潘长宁 《物理学报》2008,57(1):34-37
This paper reports that a quantum dense coding can be implementedwith ions confined in a linear trap and interacting with laserbeams. The scheme is insensitive to the interaction between thequantum channel and the environment. The Bell-state measurement isnot involved and the probability of success in our scheme is $1.0$.  相似文献   

18.
    
We address minimization of information leakage from continuous-variable quantum channels. It is known, that regime of minimum leakage can be accessible for the modulated signal states with variance equivalent to a shot noise, i.e., vacuum fluctuations, in the case of collective attacks. Here we derive the same condition for the individual attacks and analytically study the properties of the mutual information quantities in and out of this regime. We show that in such regime a joint measurement on the modes of a two-mode entangling cloner, being the optimal individual eavesdropping attack in a noisy Gaussian channel, is no more effective that independent measurements on the modes. Varying variance of the signal out of this regime, we observe the nontrivial statistical effects of either redundancy or synergy between the measurements of two modes of the entangling cloner. The result reveals the non-optimality of entangling cloner individual attack for sub-shot-noise modulated signals. Considering the communication between the cloner modes, we show the advantage of knowing the residual noise after its interaction with the cloner and extend the result to a two-cloner scheme.  相似文献   

19.
张文卓 《物理》2016,45(9):553-560
量子通信领域的主要两个研究方向,一个是为经典信息传输做量子加密的“量子密钥分发”,另一个是利用量子纠缠传输量子比特的“量子远程(隐形)传态”。文章以“墨子号”量子科学实验卫星的实验任务为线索,首先讲述量子密钥分发中的BB84协议的原理和应用,并系统性介绍量子比特、量子不可克隆定理、量子纠缠、贝尔不等式等概念,以及量子远程(隐形)传态的原理。文末简要介绍“墨子号”量子科学实验卫星和配套地面站的系统构成,以及空间量子通信的发展趋势。  相似文献   

20.
         下载免费PDF全文
王美玉  闫凤利 《中国物理 B》2011,20(12):120309-120309
In this paper, we investigate perfect quantum teleportation and dense coding by using an 2N-qubit W state channel. In the quantum teleportation scheme, an unknown N-qubit entangled state can be perfectly teleported. One ebit of entanglement and two bits of classical communication are consumed in the teleportation process, just like when using the Bell state channel. While N+1 bits of classical information can be transmitted by only sending N particles in the dense coding protocol.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号