排序方式: 共有83条查询结果,搜索用时 338 毫秒
61.
In this paper security of the quantum key distribution scheme using
correlations of continuous variable Einstein--Podolsky--Rosen (EPR)
pairs is investigated. A new approach for calculating the secret
information rate Δ I is proposed by using the Shannon
information theory. Employing an available parameter F which is
associated with the entanglement of the EPR pairs, one can detect
easily the eavesdropping. Results show that the proposed scheme is
secure against individual beam splitter attack strategy with a
proper squeeze parameter. 相似文献
62.
This paper proposes a deterministic quantum key distribution scheme based
on Gaussian-modulated continuous variable EPR correlations. This
scheme can implement fast and efficient key distribution. The
security is guaranteed by continuous variable EPR entanglement correlations
produced by nondegenerate optical parametric amplifier. For
general beam splitter eavesdropping strategy, the secret
information rate $\Delta I=I(\alpha,\beta)-I(\alpha,\epsilon)$ is
calculated in view of Shannon information theory. Finally the
security analysis is presented. 相似文献
63.
64.
Gaussian-modulated coherent state quantum key distribution is gradually moving towards practical application. Generally, the involved scheme is based on the binary random basis choice. To improve the performance and security, we present a scheme based on a continuous random basis choice. The results show that our scheme obviously improves the performance, such as the secure communication distance. Our scheme avoids comparing the measurement basis and discarding the key bits, and it can be easily implemented with current technology. Moreover, the imperfection of the basis choice can be well removed by the known phase compensation algorithm. 相似文献
65.
通用量子密钥分发的同步控制电路 总被引:1,自引:0,他引:1
通过仔细分析连续变量和离散变量量子密钥分发系统的光路原理和各个光学部件性能和要求,提出了一种能用于各种量子密钥分发实验中的电路控制模块。该方案能够产生精度可达纳秒量级的时钟信号,采用Xilinx公司的Virtex-4型FPGA开发板,实现整个系统高度集成,最后利用嵌入式开发工具ISE9.1i和EDK9.1i完成了方案的实现,并生成bit文件下载进FPGA,经验证完全满足实验要求。 相似文献
66.
67.
68.
Based on quantum mechanics, a traveling ballot scheme with anonymity and secrecy is introduced to realize voting. By searching the objects in large amount of data bases, every voter may cast votes to his desired candidates. Therefore, the proposed scheme may be applied to voting with a great deal of candidates, such as network voting and so on. The security analysis of the present scheme is also performed. 相似文献
69.
A quantum identification system based on the
transformation of polarization of a mesoscopic coherent state is proposed.
Physically, an initial polarization state which carries the identity
information is transformed into an arbitrary elliptical polarization state.
To verify the identity of a communicator, a reverse procedure is
performed by the receiver. For simply describing the transformation
procedure, the analytical methods of Poincar\'{e} sphere and quaternion are
adopted. Since quantum noise provides such a measurement uncertainty for the
eavesdropping that the identity information cannot be retrieved from the
elliptical polarization state, the proposed scheme is secure. 相似文献
70.