首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 140 毫秒
1.
量子信息讲座续讲 第二讲   量子信息安全系统   总被引:2,自引:0,他引:2  
曾贵华 《物理》2000,29(10):623-626
详细介绍了量子密码的相关内容,包括量子密码理论基础、量子保密系统、量子认证系统、量子密码与其他学科的关系以及量子密码的应用与展望,并追踪了量子信息安全系统的最新研究进展.  相似文献   

2.
量子信息引论   总被引:23,自引:0,他引:23  
郭光灿 《物理》2001,30(5):286-293
文章在阐述量子信息的发展背景之后,介绍了量子纠缠、量子计算、量子密码、量子因特网、量子克隆、量子对策论等方面的内容,既阐述了相关的基本概念,也论及最新的研究进展。  相似文献   

3.
量子信息与计算   总被引:1,自引:0,他引:1  
肖奕 《工科物理》2000,10(2):30-35,60
量子信息与计算是物理学目前研究的热门领域,本文简要地介绍量子计算的一些基本概念:量子纠缠、量子位、量子寄存器、量子并行计算和量子纠错,并介绍两种典型的量子信息技术:量子密码和量子传物。  相似文献   

4.
量子信息与计算是物理学目前研究的热门领域 .本文简要地介绍量子计算的一些基本概念 :量子纠缠、量子位、量子寄存器、量子并行计算和量子纠错 .并介绍两种典型的量子信息技术 :量子密码和量子传物 .  相似文献   

5.
量子信息掩蔽是量子信息处理中的一个新兴概念,它将量子信息完全转移至各个量子实体的关联之中,从而使单个量子系统不再包含掩蔽前的任何信息。量子信息掩蔽在量子比特承诺、秘密共享等方面都具有重要的应用;然而与量子态的克隆、广播、隐藏等操作类似,人们无法使用一个普适的两体幺正演化来实现量子信息的掩蔽。本文系统地介绍近期量子信息掩蔽方向的一系列研究进展:首先描述了可实现量子信息掩蔽态集合的几何特征,给出掩蔽操作的实现方法,讨论了其在信息论中的含义以及与量子纠错码等概念的联系;然后介绍量子信息掩蔽的实验实现,展现量子信息掩蔽在高维体系等复杂系统中的可行性,并展示其在量子秘密共享和噪声免疫的量子通信等方面的应用。  相似文献   

6.
龙桂鲁 《物理》2006,35(5):388-389
在清华大学物理系成立60周年之际,我们对近年来清华大学物理系量子信息研究的主要进展情况作一介绍,包括量子搜索算法研究,核磁共振量子计算的实验研究,量子通讯的理论与实验研究.在量子搜索算法研究方面,我们提出了量子搜索算法的相位匹配,纠正了当时的一种错误观点,并且提出了一种成功率为100%的量子搜索算法,改进了Grover算法;在核磁共振量子计算实验方面,我们实现了2到7个量子比特的多种量子算法的实验演示;在量子通讯方面,我们提出了分布式传输的量子通讯的思想,应用于量子密钥分配、量子秘密共享、量子直接安全通讯等方面,构造了多个量子通讯的理论方案.在实验室,我们实现了2米距离的空间量子密码通讯的演示实验.  相似文献   

7.
量子信息讲座 第四讲 量子密码通信   总被引:6,自引:0,他引:6  
吴令安 《物理》1998,27(9):544-551
根据海森伯不确定性原理,任何窃听者无法窃听量子密码通信中的信息而不被发现.文章讲述了量子密钥生成与分发的基本原理,并介绍了当前实验研究的进展.  相似文献   

8.
量子密码技术开辟通信安全新时代   总被引:1,自引:0,他引:1  
 2004年6月3日,世界上第一个量子密码通信网络在美国马萨诸塞州剑桥城正式投入运行。主持这套网络建设的是美国BBN技术公司。新的量子密码通信网络已成功地实现了该公司与哈佛大学之间的连接,不久将延伸至波士顿大学。新的量子密码通信网络与现有因特网技术完全兼容,网络传输距离约为10千米。这个由美国BBN技术公司研发的量子密码通信网络和现有的宽带网并没有太大的不同---采用普通光纤传输数据,并且与普通网络完全兼容。与普通网络不同的是,该网络中传输的数据采用了量子密码技术进行加密。  相似文献   

9.
量子密码--新一代密码技术   总被引:6,自引:0,他引:6  
本文阐述了量子密码的基本原理,着重介绍了光纤量子密码研究的最新进展。  相似文献   

10.
量子信息研究进展   总被引:24,自引:0,他引:24  
量子信息论是经典信息论与量子力学相结合的新兴交叉学科,本综述了最子信息领域的研究进展。即包括了为人们所熟知的量子通信与量子计算领域,也包括了刚刚兴起的但却有巨大潜力的量子对策论等领域。本以介绍量子信息论的基本理论框架为主,同时也介绍了量子信息领域的实验研究进展。  相似文献   

11.
张盛  王剑  唐朝京 《中国物理 B》2012,21(6):60303-060303
Counterfactual quantum cryptography,recently proposed by Noh,is featured with no transmission of signal particles.This exhibits evident security advantages,such as its immunity to the well-known photon-number-splitting attack.In this paper,the theoretical security of counterfactual quantum cryptography protocol against the general interceptresend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin’s proposal [Phys.Rev.A 82 042335(2010)].It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses,by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.  相似文献   

12.
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era. Then, we will describe the positioning of mathematical cryptography and quantum cryptography, that are currently being researched and developed. Quantum cryptography includes QKD and quantum stream cipher, but we point out that the latter is expected as the core technology of next-generation communication systems. Various ideas have been proposed for QKD quantum cryptography, but most of them use a single-photon or similar signal. Then, although such technologies are applicable to special situations, these methods still have several difficulties to provide functions that surpass conventional technologies for social systems in the real environment. Thus, the quantum stream cipher has come to be expected as one promising countermeasure, which artificially creates quantum properties using special modulation techniques based on the macroscopic coherent state. In addition, it has the possibility to provide superior security performance than one-time pad cipher. Finally, we introduce detailed research activity aimed at putting the quantum stream cipher into practical use in social network technology.  相似文献   

13.
Motivated by a parallel between quantum cryptography and chaos synchronization cryptography, we construct a Bell's inequality for a pair of synchronously coupled variable-order Generalized Rossler Systems, with arbitrarily binarized final states. In the infinite-order limit, although dynamical parameters cannot be extracted from the coupling signal in finite time, the inequality is violated, as with entangled quantum states. The violations are weaker than in quantum theory, vanishing as the differences between corresponding parameters of the coupled systems become small. The fact that Bell's inequality can be violated for a pair of classical systems that are not discernibly connected supports the possibility of a realist interpretation of quantum mechanics.  相似文献   

14.
量子密码术是一门崛起的新兴技术,其传输的安全性基于量子力学的Heisenberg不确定原理。而其中空间量子密码通信以其近期迅猛的发展和广阔的前景备受瞩目。本文从量子密码术的基本原理出发,综合叙述了空间量子密码通信的发展和最新成果。  相似文献   

15.
We present an efficient scheme for sharing an arbitrary m-qubit state with n agents. In our scheme, the sender Alice first shares m Bell states with the agent Bob, who is designated to recover the original m-qubit state. Furthermore, Alice introduces n- 1 auxiliary particles in the initial state |0), applies Hadamard (H) gate and Controlled-Not (CNOT) gate operations on the particles, which make them entangled with one of m particle pairs in Bell states, and then sends them to the controllers (i.e., other n - 1 agents), where each controller only holds one particle in hand. After Alice performing m Bell-basis measurements and each controller a single-particle measurement, the recover Bob can obtain the original unknown quantum state by applying the corresponding local unitary operations on his particles. Its intrinsic efficiency for qubits approaches 100%, and the total efficiency really approaches the maximal value.  相似文献   

16.
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.  相似文献   

17.
量子通信   总被引:7,自引:0,他引:7  
薛鹏  郭光灿 《物理》2002,31(6):385-391
量子通信是经典通信和量子力学相结合的一门新兴交叉学科。文章综述了量子通信领域的研究进展,既包括人们所熟知的量子隐形传态、密集编码和量子密码学,也包括刚刚兴起但却有巨大潜力的量子通信复杂度和远程量子通信等领域。文章介绍了量子通信的基本理论框架,同时也涉及了这个领域最新的实验研究的进展。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号