排序方式: 共有22条查询结果,搜索用时 15 毫秒
11.
Preparation of Arbitrary Four-Qubit W State with Atomic Ensembles via Rydberg Blockade 总被引:1,自引:0,他引:1
下载免费PDF全文
![点击此处可从《中国物理快报》网站下载免费的PDF全文](/ch/ext_images/free.gif)
The generation of various entangled states is an essential task in quantum information processing. Recently, a scheme (PRA 79, 022304) has been suggested for generating Greenberger-Horne-Zeilinger state and cluster state with atomic ensembles based on the Rydberg blockade. Using similar resources as the earlier scheme, here we propose an experimentally feasible scheme of preparing arbitrary four-qubit W class of maximally and non- maximally entangled states with atomic ensembles in a single step. Moreover, we carefully analyze the realistic noises and predict that four-qubit W states can be produced with high fidelity (F - 0.994) via our scheme. 相似文献
12.
A simple scheme is proposed to generate the W state of N Λ-type neutral atoms trapped in an optical cavity via Raman transition. Conditional on no photon leakage from the cavity, the N-qubit W state can be prepared perfectly by turning on a classical coupling field for an appropriate time. Compared with the previous ones, our scheme requires neither individual laser addressing of the atoms, nor demand for controlling N atoms to go through an optical cavity simultaneously with a constant velocity. We investigate the influence of cavity decay using the quantum jump approach and show that the preparation time decreases and the success probability increases with atom number because of a collective enhancement of the coupling. 相似文献
13.
We present an “all versus nothing” to show Bell‘s theorem without inequalities involving 2n observers. As a by-product, we also shows that quantum mechanics can violate Bell‘s inequality by a constant instead of by an amount that grows exponentially with 2n. 相似文献
14.
15.
The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical key generation rate in the presence of fluctuation of the dark count rate, and compare the result with the result of the decoy-state without fluctuation. It is found that the key generation rate and maximal secure distance will be decreased under the influence of the fluctuation of the dark count rate. 相似文献
16.
Employing a polarization compensator, an optical fibre quantum key distribution (QKD) system based on polarization coding has been developed. To obtain the compensator setting parameters, the measurement of the laser pulse polarization is performed with one single photon detector. We obtain a sifted key bit rate of about 2kbits/s and a qubit error rate lower than 10% within 3.5h. It is shown that polarization coding can be used for QKD over optical fibres as well. At the same time, the system is simple, easy to operate, practical and user-friendly. It gains more advantages than other systems over optical fibres when used in local area quantum communications and where the functional agility is important. 相似文献
17.
18.
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noneloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503]. 相似文献
19.
20.
Secure deterministic communication in a quantum loss channel using quantum error correction code
下载免费PDF全文
![点击此处可从《中国物理》网站下载免费的PDF全文](/ch/ext_images/free.gif)
The loss of a quantum channel leads to an irretrievable particle loss
as well as information. In this paper, the loss of quantum channel is
analysed and a method is put forward to recover the particle and
information loss effectively using universal quantum error
correction. Then a secure direct communication scheme is proposed,
such that in a loss channel the information that an eavesdropper can
obtain would be limited to arbitrarily small when the code is
properly chosen and the correction operation is properly arranged. 相似文献