首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
The creation of a quantum network is an important goal of quantum intormation processing. Long distance quantum communication with high fidelity is the main obstacle in achieving this goal. A scheme to transmit qubits without fidelity decrease over the noisy channel is presented. Using the idea of " time-bin entanglement" , the scheme works without any auxiliary particles and there is no resources increase with the length of the channel. The scheme is feasible with the current experimental technology.  相似文献   

3.
Since the original Cai-Li protocol [Chin. Phys. Lett. 21 (2004)601] can be used only in an ideal quantum communication, we present the modified Cai-Li protocol that can be used in the a noisy quantum channel by using Calderbank-Shor-Steane (CSS) codes to correct errors. We also give a tight bound on the connection between information Eve eavesdropped with a measurement attack in line B → A and detection probability,which shows that the Cai-Li protocol can be used as a quasisecure direct quantum communication.  相似文献   

4.
International Journal of Theoretical Physics - Quantum state sharing (QSS) plays significant role in transmitting quantum secret information. However, in practical quantum communication situation,...  相似文献   

5.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

6.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

7.
International Journal of Theoretical Physics - In this paper, we investigate Einstein-Podolsky-Rosen steering, Bell non-locality, first-order coherence and concurrence in the spin- $\frac {1}{2}$...  相似文献   

8.
In this paper, an online banking system has been built. Based on quantum cryptography communication, this system is proved unconditional secure. Two sets of GHZ states are applied, which can ensure the safety of purchase and payment, respectively. In another word, three trading participants in each triplet state group form an interdependent and interactive relationship. In the meantime, trading authorization and blind signature is introduced by means of controllable quantum teleportation. Thus, an effective monitor is practiced on the premise that the privacy of trading partners is guaranteed. If there is a dispute or deceptive behavior, the system will find out the deceiver immediately according to the relationship mentioned above.  相似文献   

9.
Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used to analyze the security of the protocol. The maximum amount of information that Eve can eavesdrop is 50%, and the eavesdropping can always be detected if the noise level ε ≤ 0.68. Therefore, MDI-QKD protocol is secure as quantum key distribution protocol. The maximum probability that the relay outputs successful results is 16% when existing eavesdropping. Moreover, the probability that the relay outputs successful results when existing eavesdropping is higher than the situation without eavesdropping. The paper validates that MDI-QKD protocol has better robustness.  相似文献   

10.
An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bit error rate induced by eavesdropper is 4.17% in C-protocol and 6.25% in Y-protocoL In this paper, another improvement on C-protocol is given. The quantum bit error rate of the eavesdropping will increase to 8.75%, which is 1.1 times larger than that in C-protocol and 0.4 times larger than that in Y-protocol.  相似文献   

11.
Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channel noise. The eavesdropping scheme is presented, which reveals that the C-S QSDC protocol is not secure if the quantum bit error rate (QBER) caused by quantum channel noise is higher than 4.17%. Our eavesdropping scheme induces about 4.17% QBER for those check qubits. However, such QBER can be hidden in the counterpart induced by the noisy quantum channel if the eavesdropper Eve replaces the original noisy channel by an ideal one. Furthermore, if the QBER induced by quantum channel noise is lower than 4.17%, then in the eavesdropping scheme Eve still can eavesdrop part of the secret messages by safely attacking a fraction of the transmitted qubits. Finally, an improvement on the C-S QSDC protocol is put forward.  相似文献   

12.
应用伪随机序列的量子密码术   总被引:2,自引:0,他引:2  
本文应用伪随机序列,提出了一个基于测不准原则的量子密码术新方案,使得量子密钥传递过程的理想传输效率达到100%。在保持满意的安全性的同时提高了传输速率。采用该方案可以实现远距离量子保密通信。  相似文献   

13.
邓洪亮  方细明 《中国物理快报》2007,24(11):3051-3054
In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By" conditional Faraday- rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary" distances is obtained in a spin chain by" a proper choice of coupling strengths and using spin memory- technique improved. We also analyse the security" of the scheme against the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity- achieved by" an eavesdropper for entanglement-based cryptography.  相似文献   

14.
An efficient quantum cryptography network protocol is proposed with d-dimensional polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0〉. The users code the information on the single photons with some unitary operations. To prevent the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum states and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.  相似文献   

15.
在量子密钥分配中,量子比特率是一个重要的系统参数。通过引入测量因子和筛选因子,建立了基于理想单光子源和泊松分布单光子源的量子比特率理论模型,给出了量子比特率的表达式,并对两种单光子源进行了比较分析。结果表明,当平均光子数大于1时,泊松分布单光子源能被优化。在发射机脉冲重复率一定的条件下,采用泊松分布单光子源无法达到理想单光子源的量子比特率,这是为保密通信所必须付出的代价。  相似文献   

16.
Discrimination between two states of a qubit is investigated, which is performed under the influence of noisy quantum channels. When prior knowledge about on the quantum states is available, the detection probability of quantum measurement is compared with that of pure guessing during the irreversible time evolution. In the case of a Markovian channel, the superiority of quantum measurement to pure guessing is lost at finite time which is determined by the prior probability and the fidelity of the quantum states. For a non-Markovian channel, however, it is possible to recover the superiority of quantum measurement even if it is lost. The effect of a system-environment initial correlation on the quantum state discrimination is also investigated.  相似文献   

17.
The quantum bit rate is an important operating parameter in free-space quantum key distribution. We introduce the measuring factor and the sifting factor, and present the expressions of the quantum bit rate based on the ideal single-photon sources and the single-photon sources with Poisson distribution. The quantum bit rate is studied in the numerical simulation for the laser links between a ground station and a satellite in a low earth orbit. The results show that it is feasible to implement quantum key distribution between a ground station and a satellite in a low earth orbit.  相似文献   

18.
Journal of Experimental and Theoretical Physics - In spite of the fact that quantum cryptography is currently the only field of quantum informatics that has been developed from the fundamental...  相似文献   

19.
A unified perspective is given on a number of different problems involving the coupling of a localized quantum spin degree of freedom to the low energy excitations of an antiferromagnet, a spin glass, or a Kondo insulator. The problems are related to those in the class often referred to as “Bose Kondo.”  相似文献   

20.
Quantum Collapse, Consciousness and Superluminal Communication   总被引:1,自引:0,他引:1  
The relation between quantum collapse, consciousness and superluminal communication is analyzed. As we know, quantum collapse, if exists, can result in the appearance of quantum nonlocality, and requires the existence of a preferred Lorentz frame. This may permit the realization of quantum superluminal communication (QSC), which will no longer result in the usual causal loop in case of the existence of a preferred Lorentz frame. The possibility of the existence of QSC is further analyzed under the assumption that quantum collapse is a real process. We demonstrate that the combination of quantum collapse and the consciousness of the observer will permit the observer to distinguish nonorthogonal states in principle. This provides a possible way to realize QSC. Some implications of the existence of QSC are briefly discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号