排序方式: 共有83条查询结果,搜索用时 446 毫秒
11.
We propose a new framework combining weak measurement and second-order correlated technique.The theoretical analysis shows that weak value amplification(WVA) experiment can also be implemented by a second-order correlated system.We then build two-dimensional second-order correlated function patterns for achieving higher amplification factor and discuss the signal-to-noise ratio influence.Several advantages can be obtained by our proposal.For instance,detectors with high resolution are not necessary.Moreover,detectors with low saturation intensity are available in WVA setup.Finally,type-one technical noise can be effectively suppressed. 相似文献
12.
13.
14.
15.
In this paper, by using properties of quantum controlled-not
manipulation and entanglement states, we have designed a novel (2,
3) quantum threshold scheme based on the Greenberger- Horne
-Zeilinger (GHZ) state. The proposed scheme involves two phases,
i.e. a secret sharing phase and a secret phase. Detailed proofs
show that the proposed scheme is of unconditional security. Since
the secret is shared among three participants, the proposed scheme
may be applied to quantum key distribution and secret sharing. 相似文献
16.
17.
研究了光学双稳系统在处理带噪声周期信号时的一种新的功能,并对输入任意周期小信号时的输出特性进行了研究。 相似文献
18.
19.
Ad Hoc网络中,区播协议旨在把数据包传递到某一特定区域内的一组节点。本文首先讨论了现有区播协议存在的一些缺点,然后提出了一种改进的基于最稳路径的区播路由协议,该协议在源节点有大量数据需要发送时特别有效。 相似文献
20.
Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack 下载免费PDF全文
For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack. 相似文献