首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We investigate the reduced dynamics of a central spin coupled to a spin environment with non-uniform coupling. Through using the method of time-dependent density-matrix renormalization group (t-DMRG), we nonperturbatively show the dissipative dynamics of the central spin beyond the case of uniform coupling between the central spin and the environment spins. It is shown that only when the system-environment coupling is weak enough, the central spin system shows Markovian effect and will finally reach the steady state; otherwise, the reduced dynamics is non-Markovian and exhibits a quasi-periodic oscillation. The frequency spectrum and the correlation between the central spin system and the environment are also studied to elucidate the dissipative dynamics of the central spin system for different coupling strengths.  相似文献   

2.
A relativistic quantum exchange protocol making it possible to implement a bit commitment scheme is realized. The protocol is based on the idea that in the relativistic case the propagation of a field into a region of space accessible for measurement requires, in contrast to the nonrelativistic case, a finite time that depends on the structure of the states. The protocol requires one classical and several quantum communication channels. It turns out that it is possible in principle to preserve the secret bit for as long a period of time desired and with probability as close to 1 as desired.  相似文献   

3.
Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment–bindingness tradeoff (Lo and Chau, 1997 [1], Mayers, 1997 [2]). A strengthened and explicit impossibility proof has been given in D?Ariano et al. (2007) [3] in the Heisenberg picture and in a C?C?-algebraic framework, considering all conceivable protocols in which both classical and quantum information is exchanged. In the present Letter we provide a new impossibility proof in the Schrödinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs (Chiribella et al., 2008 [4]), with each single-party strategy represented by a conditioned comb. We prove that assuming a stronger notion of concealment—for each classical communication history, not in average—allows Alice?s cheat to pass also the worst-case Bob?s test. The present approach allows us to restate the concealment–bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with the metric given by the comb discriminability-distance.  相似文献   

4.
In the distrustful quantum cryptography model the parties have conflicting interests and do not trust one another. Nevertheless, they trust the quantum devices in their labs. The aim of the device-independent approach to cryptography is to do away with the latter assumption, and, consequently, significantly increase security. It is an open question whether the scope of this approach also extends to protocols in the distrustful cryptography model, thereby rendering them "fully" distrustful. In this Letter, we show that for bit commitment-one of the most basic primitives within the model-the answer is positive. We present a device-independent (imperfect) bit-commitment protocol, where Alice's and Bob's cheating probabilities are ?0.854 and 3/4, which we then use to construct a device-independent coin flipping protocol with bias ?0.336.  相似文献   

5.
We produce and holographically measure entangled qudits encoded in transverse spatial modes of single photons. With the novel use of a quantum state tomography method that only requires two-state superpositions, we achieve the most complete characterization of entangled qutrits to date. Ideally, entangled qutrits provide better security than qubits in quantum bit commitment: we model the sensitivity of this to mixture and show experimentally and theoretically that qutrits with even a small amount of decoherence cannot offer increased security over qubits.  相似文献   

6.
Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classical and the quantum world. However, when committing to a string of n bits at once, how far can we stretch the quantum limits? In this Letter, we introduce a framework of quantum schemes where Alice commits a string of n bits to Bob, in such a way that she can only cheat on a bits and Bob can learn at most b bits of information before the reveal phase. Our results are twofold: we show by an explicit construction that in the traditional approach, where the reveal and guess probabilities form the security criteria, no good schemes can exist: a + b is at least n. If, however, we use a more liberal criterion of security, the accessible information, we construct schemes where a = 4log2(n) + O(1) and b = 4, which is impossible classically. Our findings significantly extend known no-go results for quantum bit commitment.  相似文献   

7.
A bit string commitment protocol securely commits N classical bits so that the recipient can extract only M相似文献   

8.
量子环中量子比特的性质   总被引:1,自引:0,他引:1       下载免费PDF全文
高宽云  赵翠兰 《物理学报》2008,57(7):4446-4449
通过精确求解能量本征方程获得量子环的电子能态,并利用电子的基态和第一激发态构造一个量子比特.对InAs/GaAs量子环的数值计算表明:当环尺寸给定时,量子比特内电子的概率密度分布与坐标位置及时间有关,在环内中心位置处电子出现的概率最大,电子的概率密度随柱坐标内的转角作周期性变化,并且各个空间点处的概率密度均随时间做周期性振荡. 关键词: 量子环 能量本征方程 电子能态 量子比特  相似文献   

9.
Under rather general assumptions about the properties of a quantum channel with noise, a quantum protocol providing implementation of secret bit commitment with the probability as close to unity as is wished is proposed.  相似文献   

10.
Quantum key distribution (QKD) is often, more correctly, called key growing. Given a short key as a seed, QKD enables two parties, connected by an insecure quantum channel, to generate a secret key of arbitrary length. Conversely, no key agreement is possible without access to an initial key. Here, we consider another fundamental cryptographic task, commitments. While, similar to key agreement, commitments cannot be realized from scratch, we ask whether they may be grown. That is, given the ability to commit to a fixed number of bits, is there a way to augment this to commitments to strings of arbitrary length? Using recently developed information-theoretic techniques, we answer this question in the negative.  相似文献   

11.
In this work, we propose a quantum bit string commitment protocol using polarization of mesoscopic coherent states. The protocol is described and its security against brute force and quantum cloning machine attack is analyzed.  相似文献   

12.
Coherent superpositions of quantum states have already been demonstrated in different superconducting circuits based on Josephson junctions. These circuits are now considered for implementing quantum bits. We report on experiments in which the state of a qubit circuit, the quantronium, is efficiently manipulated using methods inspired from nuclear magnetic resonance (NMR): multipulse sequences are used to perform arbitrary operations, to improve their accuracy, and to fight decoherence.  相似文献   

13.
We theoretically propose a scheme for a spin quantum bit based on a double quantum dot contacted to ferromagnetic elements. Interface exchange effects enable an all electric manipulation of the spin and a switchable strong coupling to a superconducting coplanar waveguide cavity. Our setup does not rely on any specific band structure and can in principle be realized with many different types of nanoconductors. This allows us to envision on-chip single spin manipulation and readout using cavity QED techniques.  相似文献   

14.
15.
A general strategy to maintain the coherence of a quantum bit is proposed. The analytical result is derived rigorously including all memory and backaction effects. It is based on an optimized pi-pulse sequence for dynamic decoupling extending the Carr-Purcell-Meiboom-Gill cycle. The optimized sequence is very efficient, in particular, for strong couplings to the environment.  相似文献   

16.
New relativistic quantum protocols realizing the bit commitment and coin tossing schemes are proposed. The protocols are based on the idea that spatially extended nonstationary orthogonal quantum states inaccessible for measurement cannot be unambiguously distinguished. As the states are transmitted from the region controlled by one party to the region accessible for measurement by the other party, the states become reliably distinguishable when accessed as a whole. Essential points of the protocol are both the quantum character of states and the existence of an ultimate signal propagation speed dictated by special relativity.  相似文献   

17.
杜亚男  解文钟  金璇  王金东  魏正军  秦晓娟  赵峰  张智明 《物理学报》2015,64(11):110301-110301
测量设备无关量子密钥分发系统可以免疫任何针对探测器边信道的攻击, 并进一步结合诱惑态方法规避了准单光子源引入的实际安全性问题. 目前实验中一般采用弱相干光源, 但是该光源含有一定比例的空脉冲和多光子脉冲. 本文针对弱相干光源的具体特性, 采用量子力学的描述, 将各个器件进行量子化处理, 并同时考虑探测器的具体性能参数的影响, 分别给出了通信双方各自发送的脉冲含有特定光子数时产生的成功贝尔态和错误贝尔态的概率公式, 从理论上对相位编码和偏振编码测量设备无关量子密钥分发系统的误码率进行了定量分析, 分别推导并模拟了通信双方采用的平均光子数对称和不对称时误码率随传输距离的变化情况, 结果表明在偏振编码Z基中, 多光子脉冲不会引起误码; 在偏振编码X基和相位编码中, 受多光子影响, 产生的误码率较大. 对于不同的编码方式, 误码率均随传输距离的增加有不同程度的升高, 长距离传输时, 平均光子数越小, 产生的误码率越大; 在偏振编码X基和相位编码的短距离传输中, 相对于对称, 通信双方采用的平均光子数不对称时产生的误码率较大.  相似文献   

18.
《Physics letters. A》1999,263(3):199-202
Based on the theoretical prediction that chemical bonds can act as tunnel junctions in the Coulomb blockade regime, and on the technical ability to coat a DNA strand with metal, we suggest that DNA can be used to built nano-logical devices. We discuss two explicit examples: a single-electron tunneling transistor (SET) and a quantum bit element. These devices would be literally in the nano-meter scale and would be able to operate at room temperature. In addition they would be highly stable and have a self ably property.  相似文献   

19.
The quadrupole S(1/2)-D(5/2) optical transition of a single trapped Ca+ ion, well suited for encoding a quantum bit of information, is coherently coupled to the standing wave field of a high finesse cavity. The coupling is verified by observing the ion's response to both spatial and temporal variations of the intracavity field. We also achieve deterministic coupling of the cavity mode to the ion's vibrational state by selectively exciting vibrational state-changing transitions and by controlling the position of the ion in the standing wave field with nanometer precision.  相似文献   

20.
We show that the scaling exponent for tunneling into a quantum wire in the "Coulomb Tonks gas" regime of impenetrable, but otherwise free, electrons is affected by impurity scattering in the wire. The exponent for tunneling into such a wire thus depends on the conductance through the wire. This striking effect originates from a many-body scattering resonance reminiscent of the Kondo effect. The predicted anomalous scaling is stable against weak perturbations of the ideal Tonks gas limit at sufficiently high energies, similar to the phenomenology of a quantum critical point.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号