首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
Recently, Yu et al. [Int. J. Theor. Phys., 2012, doi:10.1007/s10773-012-1336-y] proposed a quantum secure direct communication (QSDC) with authentication using two non-orthogonal states. This study points out a pitfall in Yu et al.’s scheme, in which an eavesdropper can deliberately modify the message without being detected. Furthermore, an enhanced scheme is proposed to avoid the modification attack.  相似文献   

2.
Recently, Shen et al. (Int. J. Theor. Phys. doi:10.1007/s10773-012-1276-6, 2012) proposed a quantum dialogue with authentication protocol based on Bell states. This study points out that Shen et al.’s protocol suffers from a man-in-the-middle attack. By manipulating the photons and classical information transmitted between two communicants, an attacker can not only pass the mutual identity authentication, but also obtain their secret messages and new authentication keys without being detected.  相似文献   

3.
In continuation of recent work done by the present authors (Int. J. Theor. Phys. 2013, doi:10.1007/s10773-013-1538-y, hereafter paper I) some new exact families of static spherically symmetric perfect fluid solution of Einstein–Maxwell gravitational field equations are presented. These solutions and the corresponding equations of state, presented in parametric form, may be astrophysically significant in constructing relativistic stellar models of electrically charged self-bound stars.  相似文献   

4.
In this paper, we discuss the kinematical concepts of a recently defined f(R) action (Payandeh and Fathi in Int. J. Theor. Phys., 2013, doi:10.1007/s10773-013-1770-5). Firstly, we retreat the action to obtain the kinematic representation of the standard cosmology components, and then, we go through our model, to find the cosmological redshift, according to the scalar field constituents of the theory.  相似文献   

5.
Recently, Hwang et al. (Eur. Phys. J. D 61:785, 2011) and Yuan et al. (Int. J. Theor. Phys. 50:2403, 2011) have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.  相似文献   

6.
Recently, Hong et al. (Chin. Phys. Lett. 29:050303, 2012) put forward two quantum secret sharing (QSS) protocols of quantum direct communication (QDC) by using χ-type entangled states. Later, some studies (Gao et al. in Chin. Phys. Lett. 29:110305, 2012; Chin. Phys. Lett. 30:079904, 2013; Liu et al. in Chin. Phys. Lett. 30:039901, 2013; Hong and Yang in Chin. Phys. Lett. 30:069901, 2013; Liu and Chen in Chin. Phys. Lett. 30:079903, 2013) made up for the drawbacks of Hong et al.’s two protocols to some extent. However, the information leakage weakness is still not thoroughly solved. In this Letter, the author analyzes the inner reason of information leakage weakness in detail at first. And then he suggests an effective encoding rule to avoid this weakness.  相似文献   

7.
The crucial issue of quantum communication protocol is its security. In this paper, the security of the Quantum Authentication Scheme Based on Entanglement Swapping proposed by Penghao et al. (Int J Theor Phys., doi:10.1007/s10773-015-2662-7) is reanalyzed. It is shown that the original does not complete the task of quantum authentication and communication securely. Furthermore a simple improvement on the protocol is proposed.  相似文献   

8.
One major obstacle in extending the classification of small index subfactors beyond ${3 +\sqrt{3}}$ is the appearance of infinite families of candidate principal graphs with 4-valent vertices (in particular, the ??weeds?? ${\mathcal{Q}}$ and ${\mathcal{Q}'}$ from Part 1 (Morrison and Snyder in Commun. Math. Phys., doi:10.1007/s00220-012-1426-y, 2012). Thus instead of using triple point obstructions to eliminate candidate graphs, we need to develop new quadruple point obstructions. In this paper we prove two quadruple point obstructions. The first uses quadratic tangles techniques and eliminates the weed ${\mathcal{Q}'}$ immediately. The second uses connections, and when combined with an additional number theoretic argument it eliminates both weeds ${\mathcal{Q}}$ and ${\mathcal{Q}'}$ . Finally, we prove the uniqueness (up to taking duals) of the 3311 Goodman-de la Harpe-Jones subfactor using a combination of planar algebra techniques and connections.  相似文献   

9.
The transition from classical to quantum mechanics rests on the recognition that the structure of information is not what we thought it was: there are operational, i.e., phenomenal, probabilistic correlations that lie outside the polytope of local correlations. Such correlations cannot be simulated with classical resources, which generate classical correlations represented by the points in a simplex, where the vertices of the simplex represent joint deterministic states that are the common causes of the correlations. The ‘no go’ hidden variable theorems tell us that we can’t shoe-horn phenomenal correlations outside the local polytope into a classical simplex by supposing that something has been left out of the story. The replacement of the classical simplex by the quantum convex set as the structure representing probabilistic correlations is the analogue for quantum mechanics of the replacement of Newton’s Euclidean space and time by Minkowski spacetime in special relativity. The nonclassical features of quantum mechanics, including the irreducible information loss on measurement, are generic features of correlations that lie outside the classical simplex. This paper is an elaboration of these ideas, which have their source in work by Pitowsky (J. Math. Phys. 27:1556, 1986; Math. Program. 50:395, 1991; Phys. Rev. A 77:062109, 2008), Garg and Mermin (Found. Phys. 14:1–39, 1984), Barrett (Phys. Rev. A 75:032304, 2007; Phys. Rev. A 7:022101, 2005) and others, e.g., Brunner et al. (arXiv:1303.2849, 2013), but the literature goes back to Boole (An Investigation of the Laws of Thought, Dover, New York, 1951). The final section looks at the measurement problem of quantum mechanics in this context. A large part of the problem is removed by seeing that the inconsistency in reconciling the entangled state at the end of a quantum measurement process with the definiteness of the macroscopic pointer reading and the definiteness of the correlated value of the measured micro-observable depends on a stipulation that is not required by the structure of the quantum possibility space. Replacing this stipulation by an alternative consistent stipulation is the first step to resolving the problem.  相似文献   

10.
11.
The decoherent histories formalism, developed by Griffiths, Gell-Mann, and Hartle (in Phys. Rev. A 76:022104, 2007; arXiv:1106.0767v3 [quant-ph], 2011; Consistent Quantum Theory, Cambridge University Press, 2003; arXiv:gr-qc/9304006v2, 1992) is a general framework in which to formulate a timeless, ‘generalised’ quantum theory and extract predictions from it. Recent advances in spin foam models allow for loop gravity to be cast in this framework. In this paper, I propose a decoherence functional for loop gravity and interpret existing results (Bianchi et al. in Phys. Rev. D 83:104015, 2011; Phys. Rev. D 82:084035, 2010) as showing that coarse grained histories follow quasiclassical trajectories in the appropriate limit.  相似文献   

12.
A convergence theorem is obtained for quantum random walks with particles in an arbitrary normal state. This unifies and extends previous work on repeated-interactions models, including that of Attal and Pautrat (Ann Henri Poincaré 7:59–104 2006) and Belton (J Lond Math Soc 81:412–434, 2010; Commun Math Phys 300:317–329, 2010). When the random-walk generator acts by ampliation and either multiplication or conjugation by a unitary operator, it is shown that the quantum stochastic cocycle which arises in the limit is driven by a unitary process.  相似文献   

13.
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73:042305, 2006] were recently proposed by Lee, Lim and Yang, based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states. However, Zhang et al. showed that in the two protocols the authenticator Trent can eavesdrop the secret message by subtle strategies [Phys. Rev. A 75:026301, 2007]. In this paper, we propose two authenticated quantum direct communication (AQDC) protocols using Bell states. Users can identify each other by checking the correlation of Bell states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining Bell states after authentication. The two proposed AQDC protocols are implemented under the condition that there is a quantum link between Alice and Bob and that there is no quantum link between Alice and Bob respectively, similar to the ones proposed by Lee, Lim and Yang [Phys. Rev. A 73:042305, 2006]. The proposed AQDC protocols not only fix the leaks in the AQDC protocols proposed by Lee, Lim and Yang, but also economize the quantum resource.  相似文献   

14.
Recently Zhu (Int. J. Theor. Phys. 53, 4095, 2014) had shown that using GHZ-like states as quantum channel, it is possible to teleport an arbitrary unknown two-qubit state. We investigate this channel for the teleportation of an arbitrary N-qubit state. The strict proof through mathematical induction is presented and the rule for the receiver to reconstruct the desired state is explicitly derived in the most general case. We also discuss that if a system of quantum secret sharing of classical message is established, our protocol can be transformed to a N-qubit perfect controlled teleportation scheme from the controller’s point of view.  相似文献   

15.
The parafermionic observable has recently been used by number of authors to study discrete models, believed to be conformally invariant and to prove convergence results for these processes to SLE (Beffara and Duminil-Copin in arXiv:1010.0526v2, 2011; Duminil-Copin and Smirnov in arXiv:1007.0575v2, 2011; Hongler and Smirnov in arXiv:1008.2645v3, 2011; Ikhlef and Cardy in J. Phys. A 42:102001, 2009; Lawler in preprint, 2011; Rajabpour and Cardy in J. Phys. A 40:14703, 2007; Riva and Cardy in J. Stat. Mech. Theory Exp., 2006; Smirnov in International Congress of Mathematicians, vol. II, pp. 1421?C1451, 2006; Smirnov in Ann. Math. 172(2):1435?C1467, 2010; Smirnov in Proceedings of the International Congress of Mathematicians, Hyderabad 2010, vol.?I, pp. 595?C621, 2010). We provide a definition for a one parameter family of continuum versions of the parafermionic observable for SLE, which takes the form of a normalized limit of expressions identical to the discrete definition. We then show the limit defining the observable exists, compute the value of the observable up to a finite multiplicative constant, and prove this constant is non-zero for a wide range of ??. Finally, we show our observable for SLE becomes a holomorphic function for a particular choice of the parameter, which provides a new point of view on a fundamental property of the discrete observable.  相似文献   

16.
A useful generalization of distributivity in lattices n-distributivity, \(n \in \mathbb{N}\) , was introduced in Huhn (Acta Sci. Math. 33:297–305, 1972). In Mayet and Roddy (Contrib. Gen. Algebra 5:285–294, 1987), ‘orthogonalized’ versions, n-orthodistributivity, \(n \in \mathbb{N}\) , of these equations were introduced and discussed. The discussion and results of Mayet and Roddy (Contrib. Gen. Algebra 5:285–294, 1987) centered on the class of modular ortholattices. In this paper we discuss and present some preliminary results for these conditions in orthomodular lattices. In particular, we completely classify the n-(ortho)distributive orthomodular lattices arising from Greechie’s classical 1971 construction, and we prove that a certain simple atomless orthomodular lattice, presented in Roddy (Algebra Univers. 29:564–597, 1992), is 4-orthodistributive. It is not 3-orthodistributive.  相似文献   

17.
High harmonic generation (HHG) of intense infrared laser radiation (Ferray et al., J. Phys. B: At. Mol. Opt. Phys. 21:L31, 1988; McPherson et al., J. Opt. Soc. Am. B 4:595, 1987) enables coherent vacuum-UV (VUV) to soft-X-ray sources. In the usual setup, energetic femtosecond laser pulses are strongly focused into a gas jet, restricting the interaction length to the Rayleigh range of the focus. The average photon flux is limited by the low conversion efficiency and the low average power of the complex laser amplifier systems (Keller, Nature 424:831, 2003; Südmeyer et al., Nat. Photonics 2:599, 2008; Röser et al., Opt. Lett. 30:2754, 2005; Eidam et al., IEEE J. Sel. Top. Quantum Electron. 15:187, 2009) which typically operate at kilohertz repetition rates. This represents a severe limitation for many experiments using the harmonic radiation in fields such as metrology or high-resolution imaging. Driving HHG with novel high-power diode-pumped multi-megahertz laser systems has the potential to significantly increase the average photon flux. However, the higher average power comes at the expense of lower pulse energies because the repetition rate is increased by more than a thousand times, and efficient HHG is not possible in the usual geometry. So far, two promising techniques for HHG at lower pulse energies were developed: external build-up cavities (Gohle et al., Nature 436:234, 2005; Jones et al., Phys. Rev. Lett. 94:193, 2005) and resonant field enhancement in nanostructured targets (Kim et al., Nature 453:757, 2008). Here we present a third technique, which has advantages in terms of ease of HHG light extraction, transverse beam quality, and the possibility to substantially increase conversion efficiency by phase-matching (Paul et al., Nature 421:51, 2003; Ren et al., Opt. Express 16:17052, 2008; Serebryannikov et al., Phys. Rev. E (Stat. Nonlinear Soft Matter Phys.) 70:66611, 2004; Serebryannikov et al., Opt. Lett. 33:977, 2008; Zhang et al., Nat. Phys. 3:270, 2007). The interaction between the laser pulses and the gas occurs in a Kagome-type Hollow-Core Photonic Crystal Fiber (HC-PCF) (Benabid et al., Science 298:399, 2002), which reduces the detection threshold for HHG to only 200 nJ. This novel type of fiber guides nearly all of the light in the hollow core (Couny et al., Science 318:1118, 2007), preventing damage even at intensities required for HHG. Our fiber guided 30-fs pulses with a pulse energy of more than 10 μJ, which is more than five times higher than for any other photonic crystal fiber (Hensley et al., Conference on Lasers and Electro-Optics (CLEO), IEEE Press, New York, 2008).  相似文献   

18.
The macroscopic study of hydrodynamic turbulence is equivalent, at an abstract level, to the microscopic study of a heat flow for a suitable mechanical system (Ruelle, PNAS 109:20344–20346, 2012). Turbulent fluctuations (intermittency) then correspond to thermal fluctuations, and this allows to estimate the exponents \(\tau _p\) and \(\zeta _p\) associated with moments of dissipation fluctuations and velocity fluctuations. This approach, initiated in an earlier note (Ruelle, 2012), is pursued here more carefully. In particular we derive probability distributions at finite Reynolds number for the dissipation and velocity fluctuations, and the latter permit an interpretation of numerical experiments (Schumacher, Preprint, 2014). Specifically, if \(p(z)dz\) is the probability distribution of the radial velocity gradient we can explain why, when the Reynolds number \(\mathcal{R}\) increases, \(\ln p(z)\) passes from a concave to a linear then to a convex profile for large \(z\) as observed in (Schumacher, 2014). We show that the central limit theorem applies to the dissipation and velocity distribution functions, so that a logical relation with the lognormal theory of Kolmogorov (J. Fluid Mech. 13:82–85, 1962) and Obukhov is established. We find however that the lognormal behavior of the distribution functions fails at large value of the argument, so that a lognormal theory cannot correctly predict the exponents \(\tau _p\) and \(\zeta _p\) .  相似文献   

19.
Recently Yang et al. (Int. J. Theor. Phys. 48:516, 2009) had shown that using a particular type of GHZ- Like state as quantum channel, it is possible to teleport an arbitrary unknown qubit. We investigate this channel for the teleportation of a particular type of two qubit state.  相似文献   

20.
We present a proof of the mirror conjecture of Aganagic and Vafa (Mirror Symmetry, D-Branes and Counting Holomorphic Discs. http://arxiv.org/abs/hep-th/0012041v1, 2000) and Aganagic et al. (Z Naturforsch A 57(1–2):128, 2002) on disk enumeration in toric Calabi-Yau 3-folds for all smooth semi-projective toric Calabi-Yau 3-folds. We consider both inner and outer branes, at arbitrary framing. In particular, we recover previous results on the conjecture for (i) an inner brane at zero framing in ${K_{\mathbb{P}^2}}$ K P 2 (Graber-Zaslow, Contemp Math 310:107–121, 2002), (ii) an outer brane at arbitrary framing in the resolved conifold ${\mathcal{O}_{\mathbb{P}^1}(-1)\oplus \mathcal{O}_{\mathbb{P}^1}(-1)}$ O P 1 ( - 1 ) ⊕ O P 1 ( - 1 ) (Zhou, Open string invariants and mirror curve of the resolved conifold. http://arxiv.org/abs/1001.0447v1 [math.AG], 2010), and (iii) an outer brane at zero framing in ${K_{\mathbb{P}^2}}$ K P 2 (Brini, Open topological strings and integrable hierarchies: Remodeling the A-model. http://arxiv.org/abs/1102.0281 [hep-th], 2011).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号