首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 390 毫秒
1.
We give a proof that entanglement purification, even with noisy apparatus, is sufficient to disentangle an eavesdropper (Eve) from the communication channel. Our proof applies to all possible attacks (individual and coherent). Due to the quantum nature of the entanglement purification protocol, it is also possible to use the obtained quantum channel for secure transmission of quantum information. Received 10 August 2001 and Received in final form 26 October 2001  相似文献   

2.
Quantum key exchanges using weak coherent (Poissonian) single-photon sources are open to attack by a variety of eavesdropping techniques. Quantum-correlated photon sources provide a means of flagging potentially insecure multiple-photon emissions and thus extending the secure quantum key channel capacity and the secure key distribution range. We present indicative photon-counting statistics for a fully correlated Poissonian multibeam photon source in which the transmitted beam is conditioned by photon number measurements on the remaining beams with non-ideal multiphoton counters. We show that significant rejection of insecure photon pulses from a twin-beam source cannot be obtained with a detector having a realistic quantum efficiency. However quantum-correlated (quadruplet or octuplet) multiplet photon sources conditioned by high efficiency multiphoton counters could provide large improvements in the secure channel capacity and the secure distribution range of high loss systems such as those using the low earth orbit satellite links proposed for global quantum key distribution. Received 14 July and Received in final form 20 November 2001  相似文献   

3.
We propose a quantum transmission based on bi-photons, which are doubly-entangled both in polarisation and phase. This scheme finds a natural application in quantum cryptography, where we show that an eventual eavesdropper is bound to introduce a larger error on the quantum communication than for a single entangled bi-photon communication, when he steels the same information. Received 23 July 2001 / Received in final form 30 November 2001 Published online 24 September 2002  相似文献   

4.
A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large.  相似文献   

5.
A quantum gravity-gradiometer consists of two spatially separated ensembles of atoms interrogated by pulses of a common laser beam. The laser pulses cause the probability amplitudes of atomic ground-state hyperfine levels to interfere, producing two, motion-sensitive, phase shifts, which allow the measurement of the average acceleration of each ensemble, and, via simple differencing, of the acceleration gradient. Here we propose entangling the quantum states of atoms from the two ensembles prior to the pulse sequence, and show that entanglement encodes their relative acceleration in a single interference phase which can be measured directly, with no need for differencing. Received 6 June 2002 / Received in final form 25 October 2002 Published online 28 January 2003  相似文献   

6.
We report a new quantum cryptographic system involving single sideband detection and allowing an implementation of the BB84 protocol. The transmitted bits are reliably coded by the phase of a high frequency modulating signal. The principle of operation is described in terms of both classical and quantum optics. The method has been demonstrated experimentally at 1 550 nm using compact and conventional device technology. Single photon interference has been obtained with a fringe visibility greater than 98%, indicating that the system can be used in view of quantum key distribution potentially beyond 50-km-long standard single-mode fiber. Received 13 July 2001 and Received in final form 30 November 2001  相似文献   

7.
We examine the problem of efficiently collecting the photons produced by solid-state single photon sources. The extent of the problem is first established with the aid of simple physical concepts. Several approaches to improving the collection efficiency are then examined and are broadly categorized into two types. First are those based on cavity quantum dynamics, in which the pathways by which the source may emit a photon are restricted, thus channeling emission into one desired mode. Second are those where we try to reshape the free space modes into a target mode in an optimal way, by means of refraction, without fundamentally altering the way in which the source emits. Respectively, we examine a variety of microcavities and solid immersion lenses. Whilst we find that the micropillar microcavities offer the highest collection efficiency (∼70%), choosing this approach may not always be appropriate due to other constraints. Details of the different approaches, their merits and drawbacks are discussed in detail. Received 19 July 2001 and Received in final form 5 October 2001  相似文献   

8.
We propose a quantum key distribution (QKD) scheme based on entanglement swapping. In this scheme, the methods to form secret keys are so interesting. By comparing initial Bell state and outcome of entanglement swapping, the secret keys between Alice and Bob are generated involuntarily.  相似文献   

9.
We study the stability under quantum noise effects of the quantum privacy amplification protocol for the purification of entanglement in quantum cryptography. We assume that the E91 protocol is used by two communicating parties (Alice and Bob) and that the eavesdropper Eve uses the isotropic Bužek-Hillery quantum copying machine to extract information. Entanglement purification is then operated by Alice and Bob by means of the quantum privacy amplification protocol and we present a systematic numerical study of the impact of all possible single-qubit noise channels on this protocol. We find that both the qualitative behavior of the fidelity of the purified state as a function of the number of purification steps and the maximum level of noise that can be tolerated by the protocol strongly depend on the specific noise channel. These results provide valuable information for experimental implementations of the quantum privacy amplification protocol.  相似文献   

10.
We model an isolated quantum computer as a two-dimensional lattice of qubits (spin halves) with fluctuations in individual qubit energies and residual short-range inter-qubit couplings. In the limit when fluctuations and couplings are small compared to the one-qubit energy spacing, the spectrum has a band structure and we study the quantum computer core (central band) with the highest density of states. Above a critical inter-qubit coupling strength, quantum chaos sets in, leading to quantum ergodicity of eigenstates in an isolated quantum computer. The onset of chaos results in the interaction induced dynamical thermalization and the occupation numbers well described by the Fermi-Dirac distribution. This thermalization destroys the noninteracting qubit structure and sets serious requirements for the quantum computer operability. Received 3 July 2001 and Received in final form 9 September 2001  相似文献   

11.
A deterministic secure quantum communication against collective-dephasing noise is proposed. Alice constructs two sets of three-photon bases with EPR (Einstein-Podolsky-Rosen) pairs in the state |Ψ+〉 or |Ψ-〉 and auxiliary single photons in the state |H〉. And then she sends them to Bob. Bob can get the secret message by his single-photon measurement outcomes and two public message strings from Alice if the quantum channel is secure. The scheme does not need photon storing technique and only single-photon measurement is necessary.  相似文献   

12.
We study the effects of dissipation or leakage on the time evolution of Grover's algorithm for a quantum computer. We introduce an effective two-level model with dissipation and randomness (imperfections), which is based upon the idea that ideal Grover's algorithm operates in a 2-dimensional Hilbert space. The simulation results of this model and Grover's algorithm with imperfections are compared, and it is found that they are in good agreement for appropriately tuned parameters. It turns out that the main features of Grover's algorithm with imperfections can be understood in terms of two basic mechanisms, namely, a diffusion of probability density into the full Hilbert space and a stochastic rotation within the original 2-dimensional Hilbert space. Received 12 August 2002 / Received in final form 14 October 2002 Published online 4 February 2003  相似文献   

13.
Quantum spin dynamics as a model for quantum computer operation   总被引:1,自引:0,他引:1  
We study effects of the physical realization of quantum computers on their logical operation. Through simulation of physical models of quantum computer hardware, we analyze the difficulties that are encountered in programming physical realizations of quantum computers. Examples of logically identical implementations of the controlled-NOT operation and Grover's database search algorithm are used to demonstrate that the results of a quantum computation are unstable with respect to the physical realization of the quantum computer. We discuss the origin of these instabilities and discuss possibilities to overcome this, for practical purposes, fundamental limitation of quantum computers. Received 5 November 2001 and Received in final form 8 February 2002  相似文献   

14.
We examine a generic three level mechanism of quantum computation in which all fundamental single and double qubit quantum logic gates are operating under the effect of adiabatically controllable static (radiation free) bias couplings between the states. Under the time evolution imposed by these bias couplings the quantum state cycles between the two degenerate levels in the ground state and the quantum gates are realized by changing Hamiltonian at certain time intervals when the system collapses to a two state subspace. We propose a physical implementation of the mechanism using Aharonov-Bohm persistent-current loops in crossed electric and magnetic fields, with the output of the loop read out by using a quantum Hall effect aided mechanism. Received 26 March 2002 / Received in final form 8 July 2002 Published online 19 November 2002  相似文献   

15.
Magic-angle spinning (MAS) solid state nuclear magnetic resonance (NMR) spectroscopy is shown to be a promising technique for implementing quantum computing. The theory underlying the principles of quantum computing with nuclear spin systems undergoing MAS is formulated in the framework of formalized quantum Floquet theory. The procedures for realizing state labeling, state transformation and coherence selection in Floquet space are given. It suggests that by this method, the largest number of qubits can easily surpass that achievable with other techniques. Unlike other modalities proposed for quantum computing, this method enables one to adjust the dimension of the working state space, meaning the number of qubits can be readily varied. The universality of quantum computing in Floquet space with solid state NMR is discussed and a demonstrative experimental implementation of Grover's search is given. Received 19 April 2001  相似文献   

16.
We report that entangled pairs of quantum clocks (non-degenerate quantum bits) can be used as a specialized detector for precisely measuring difference of proper-times that each constituent quantum clock experiences. We describe why the proposed scheme would be more precise in the measurement of proper-time difference than a scheme of two-separate-quantum-clocks. We consider possibilities that the proposed scheme can be used in precision test of the relativity theory. Received 7 November 2001  相似文献   

17.
Thermal noise of a mirror can be reduced by cold damping. The displacement is measured with a high-finesse cavity and controlled with the radiation pressure of a modulated light beam. We establish the general quantum limits of noise in cold damping mechanisms and we show that the optomechanical system allows to reach these limits. Displacement noise can be arbitrarily reduced in a narrow frequency band. In a wide-band analysis we show that thermal fluctuations are reduced as with classical damping whereas quantum zero-point fluctuations are left unchanged. The only limit of cold damping is then due to zero-point energy of the mirror. Received 1st August 2001 and Received in final form 12 October 2001  相似文献   

18.
The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, while the lack of the effective key distillation method makes it unpractical under the high loss condition. Here we present a single-bit-reverse-reconciliation protocol against Oaussian classical Eve, which can distill the secret key through practical imperfect error correction with high efficiency. The simulation results show that this protocol can distill secret keys even when the transmission fibre is longer than 150 km, which may make the continuous variable scheme to outvie the single photon one.  相似文献   

19.
We report on energy-time and time-bin entangled photon-pair sources based on a periodically poled lithium niobate (PPLN) waveguide. Degenerate twin photons at 1 314 nm wavelength are created by spontaneous parametric down-conversion and coupled into standard telecom fibers. Our PPLN waveguide features a very high conversion efficiency of about 10-6, roughly 4 orders of magnitude more than that obtained employing bulk crystals [#!Tanzilli01a!#]. Even if using low power laser diodes, this engenders a significant probability for creating two pairs at a time - an important advantage for some quantum communication protocols. We point out a simple means to characterize the pair creation probability in case of a pulsed pump. To investigate the quality of the entangled states, we perform photon-pair interference experiments, leading to visibilities of 97% for the case of energy-time entanglement and of 84% for the case of time-bin entanglement. Although the last figure must still be improved, these tests demonstrate the high potential of PPLN waveguide based sources to become a key element for future quantum communication schemes. Received 13 July 2001  相似文献   

20.
葛华  刘文予 《中国物理快报》2007,24(10):2727-2729
A new quantum secure direct communication (QSDC) protocol is proposed by using decoherence free subspace (DFS) to avoid insecurity of the present QSDC protocols in a quantum noise channel. This protocol makes it easily for Bob and Alice to find eavesdropping in channel because the collective dephasing noise disappears in DFS. The probability of successful attack by Eve in this protocol is smaller than in BB84 protocol. Thus this protocol realizes secure QSDC and is feasible with present-day technology.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号