首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
杨宇光  温巧燕 《中国物理》2007,16(8):2215-2218
An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3 \otimes 3 Hilbert space is presented. The sender, Alice, disorders the orthogonal product state sequence and sends it to Bob. After Alice has published the matching information of the particle sequence, Bob recovers the correct correspondences and makes an orthogonal measurement on the orthogonal product states to obtain the information sent by Alice. Finally, security analysis is also made.  相似文献   

2.
An efficient quantum secret sharing protocol with orthogonal product states   总被引:1,自引:1,他引:1  
An efficient quantum secret sharing protocol with orthogonal product states in the 33 Hilbert space is presented. The particles in the orthogonal product states form two particle sequences. One sequence is sent to Bob and the other is sent to Charlie after rearranging the particle orders. With the help of Alice, Bob and Charlie make the corresponding local measurement to obtain the information of the or- thogonal product states prepared. This protocol has many distinct features such as great capacity and high efficiency.  相似文献   

3.
郑晓毅  龙银香 《物理学报》2017,66(18):180303-180303
提出了一种基于五粒子cluster态的信道容量可控的可控量子安全直接通信方案.通信三方利用五粒子cluster态自身的粒子分布情况,结合诱骗光子,对粒子分别做Z基单粒子测量和Bell基测量,便可完成信道的第一次安全性检测.通信控制方Cindy通过对手中的粒子序列随机选用测量基(Z基或者X基)测量来决定信道容量,并通过经典信道公布结果.发送方Alice将要发送的信息以及校检信息用于对手中的粒子序列进行幺正操作编码,并插入诱骗光子后将编码后的粒子序列发给接收方Bob并通过经典信道告知其诱骗光子的位置信息.Bob接收到粒子序列后,按照经典信道Alice发送的信息,结合Cindy公布的信息,剔除诱骗光子后按照一定的规则对手中的两组粒子序列进行Bell基测量,便可解码完成第二次安全性检测以及得到Alice发送的信息.通过对五粒子cluster态的纠缠结构性质进行分析,阐明了五粒子cluster态在该方案中所表现出的特点的物理缘由.结果表明,只需变化测量基的规则和用于编码的粒子,可以将该方案推广成可控双向量子安全直接通信.  相似文献   

4.
We present an efficient scheme for sharing an arbitrary m-qubitstate with n agents. In our scheme, the sender Alice first shares mBell states with the agent Bob, who is designated to recover the originalm-qubit state. Furthermore, Alice introduces n-1 auxiliary particlesin the initial state |0>, applies Hadamard (H) gate and Controlled-Not (CNOT) gate operations on the particles, which make them entangled with one of m particle pairs in Bell states, and then sends them to the controllers (i.e., other n-1 agents), where each controller only holds one particle in hand. After Alice performing m Bell-basis measurements and each controller a single-particle measurement, the recover Bob can obtain the original unknown quantum state by applying the corresponding local unitary operations on his particles.Its intrinsic efficiency for qubits approaches 100%, and the total efficiency really approaches the maximal value.  相似文献   

5.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

6.
We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed.  相似文献   

7.
In this paper, a quantum authencryption protocol is proposed by using the two-photon entangled states as the quantum resource. Two communicants Alice and Bob share two private keys in advance, which determine the generation of two-photon entangled states. The sender Alice sends the two-photon entangled state sequence encoded with her classical bits to the receiver Bob in the manner of one-step quantum transmission. Upon receiving the encoded quantum state sequence, Bob decodes out Alice’s classical bits with the two-photon joint measurements and authenticates the integrity of Alice’s secret with the help of one-way hash function. The proposed protocol only uses the one-step quantum transmission and needs neither a public discussion nor a trusted third party. As a result, the proposed protocol can be adapted to the case where the receiver is off-line, such as the quantum E-mail systems. Moreover, the proposed protocol provides the message authentication to one bit level with the help of one-way hash function and has an information-theoretical efficiency equal to 100 %.  相似文献   

8.
A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large.  相似文献   

9.
宋杰  朱爱东  张寿 《中国物理》2007,16(3):621-623
This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication.  相似文献   

10.
董莉  修晓明  高亚军 《中国物理》2006,15(12):2835-2839
A new representation of an arbitrary and unknown N-particle state is presented at first. As an application, a scheme for teleporting an arbitrary and unknown N-particle state is proposed when N pairs of two-particle non- maximally entangled states are utilized as quantum channels. After Alice (sender) makes Bell-state measurement on her particles, Bob (recipient) introduces an auxiliary particle and carries out appropriate unitary transformation on his particle and the auxiliary particle depending on classical information from Alice. Then, von Neumann measurement that confirms whether the teleportation succeeds or not is performed by Bob on the auxiliary particle. In order to complete the teleportation, another N-1 times operations need to be performed which are similar to the above ones. It can be successfully realized with a certain probability which is determined by the product of the smaller coefficients of non-maximally entangled pairs. All possible unitary transformations are given in detail.  相似文献   

11.
基于光子轨道角动量的密码通信方案研究   总被引:2,自引:0,他引:2       下载免费PDF全文
设计了一个基于两个正交的光子轨道角动量态的量子密码通信方案.在该方案中,Alice使用具有独特设计的激光器,随机发送有确定轨道角动量的光子;Bob采用由两个达夫棱镜组成的光束旋转器,对光子的轨道角动量态进行测量.对系统安全性的讨论表明,Eve采用截获重发、攻击单臂等攻击手段,其窃听行为都会被发现.理论证明,该方案不需要通信双方实时监测和调整参考系,同时避免了BB84,B92协议因发送基和测量基不一致而丢弃一半信息的问题,从而提高了密钥生成效率. 关键词: 量子保密通信 轨道角动量  相似文献   

12.
By swapping the entanglement of χ-type state, we propose a quantum key distribution protocol, in which only Alice needs to prepare χ-type states and transmit a particle sequence. Both Alice and Bob need to perform χ-type state measurements.  相似文献   

13.
提出了一种基于N个有序纠缠光子对量子机密共享方案.用纠缠光子作为信息的载体,密钥管理者Alice将纠缠光子对分成两个序列,其中一个序列直接发送给合作者之一Bob,在确保第一个序列发送安全后,再对第二个序列进行编码,发送给另一个合作者Charlie.Bob和Charlie分别对他们所接收到的光子序列进行Bell基联合测量...  相似文献   

14.
In this paper, we propose a protocol where one can realize reestablishment of an unknown state and its orthogonal complement state with a certain probability. In the first stage of the protocol, teleportation is performed between Alice (a sender) and Bob (a receiver) through a nonmaximally entangled quantum channel. In the process of teleportation, Alice performs nonmaximally entangled state measurement. In the second stage of the protocol, Victor(a state preparer) disentangles leftover nonmaximally entangled states by a single-particle measurement. With the assistance of Victor Alice can reestablish the original state or produce its orthogonal state.  相似文献   

15.
提出使用纠缠交换的方法,采用N对二粒子非最大纠缠态作为量子通道来传输N粒子W纠缠态的方案。传输过程中,发送者对自己所拥有的粒子进行Bell基测量,并将测量结果通过经典通道通知接收者,接收者根据所获取的信息对她的粒子实行相应的幺正变换以恢复最初待传输的粒子态,从而,成功实现该隐形传输。文章还以三粒子的传输为例作了详细介绍。  相似文献   

16.
In this paper, we propose a protocol where one can realize reestablishment of an unknown state and its orthogonal complement state with a certain probability. In the first stage of the protocol, teleportation is performed between Alice (a sender) and Bob (a receiver) through a nonmaximally entangled quantum channel. In the process of teleportation, Alice performs nonmaximally entangled state measurement. In the second stage of the protocol, Victor (a state preparer) disentangles leftover nonmaximally entangled states by a single-particle measurement. With the assistance of Victor Alice can reestablish the original state or produce its orthogonal state.  相似文献   

17.
We propose a feasible scheme for implementing bidirectional quantum direct communication protocol using four-qubit cluster states. In this scheme, the quantum channel between the sender Alice and the receiver Bob consists of an ordered sequence of cluster states which are prepared by Alice. After ensuring the security of quantum channel, according to the secret messages, the sender will perform the unitary operation and the receiver can obtain different secret messages in a deterministic way.  相似文献   

18.
We propose two schemes for realizing quantum secure direct communication (QSDC) by using a set of ordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs) as quantum information channels. In the first scheme, the photons from Bob to Alice are transmitted only once. After insuring the security of the quantum channels, Bob encodes the secret message on his photons. Then Alice performs single-photon two-DOF Bell bases measurements on her photons. This scheme has better security than former QSDC protocols. In the second scheme, Bob transmits photons to Alice twice. After insuring the security of the quantum channels, Bob encodes the secret message on his photons. Then Alice performs two-photon Bell bases measurements on each DOF. The scheme has more information capacity than former QSDC protocols.  相似文献   

19.
In order to improve the efficiency of quantum secure direct communication, a controlled quantum secure direct communication protocol based on Huffman compression coding is proposed in this paper. The protocol combines classical Huffman coding with quantum communication, Alice performs Huffman compression code and unitary operation on the secret messages and sends them to Bob, and then Bob obtains the corresponding secret messages through decoding operation. In this protocol, communication efficiency can be effectively improved by using Huffman compression coding and sequence generator. As a result, the longer the secret messages, the higher the communication efficiency.  相似文献   

20.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitarytransformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号