首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   77篇
  免费   37篇
  国内免费   4篇
化学   8篇
数学   5篇
物理学   105篇
  2022年   1篇
  2021年   4篇
  2020年   3篇
  2019年   1篇
  2018年   3篇
  2017年   2篇
  2016年   7篇
  2015年   5篇
  2014年   8篇
  2013年   4篇
  2012年   5篇
  2011年   6篇
  2010年   10篇
  2009年   13篇
  2008年   13篇
  2007年   7篇
  2006年   9篇
  2005年   7篇
  2004年   2篇
  2003年   1篇
  2002年   5篇
  2001年   1篇
  1999年   1篇
排序方式: 共有118条查询结果,搜索用时 234 毫秒
11.
潘长宁 《物理学报》2008,57(1):34-37
This paper reports that a quantum dense coding can be implemented with ions confined in a linear trap and interacting with laser beams. The scheme is insensitive to the interaction between the quantum channel and the environment. The Bell-state measurement is not involved and the probability of success in our scheme is $1.0$.  相似文献   
12.
We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information receiver can the unknown states in the sender‘s qubits be fully reconstructed in the receiver‘s qubits. In our method,agents‘s control parameters are obtained via quantum entanglement swapping. As the realization of the many-agent controlled teleportation is concerned, compared to the recent method [C.P. Yang, et al., Phys. Rev. A 70 (2004) 022329],our present method considerably reduces the preparation difficulty of initial states and the identification difficulty of entangled states, moreover, it does not need local Hadamard operations and it is more feasible in technology.  相似文献   
13.
基于腔QED的多用户间的多原子量子信道的建立   总被引:3,自引:0,他引:3       下载免费PDF全文
赵晗  周小清  杨小琳 《物理学报》2009,58(9):5970-5977
提出基于腔QED技术的多用户间的多原子W态和GHZ态量子信道的建立方案.在量子网络的空闲时段,各个用户和量子交换机共享EPR对.量子交换机通过原子和腔场的相互作用将两个EPR对制备成W态,再与另一个EPR对进行纠缠交换,经过直接测量后为用户建立三原子W态量子信道;同时讨论了四用户间的W态量子信道的建立方案.量子交换机对三个EPR对进行纠缠交换,将三个原子同时与腔场作用,经过直接测量后为用户建立三原子GHZ态量子信道;并将此方法推广到N个用户间的GHZ态量子信道的建立. 关键词: 腔QED 量子信道 量子交换机 纠缠交换  相似文献   
14.
The security of a deterministic secure quantum communication using four-particle genuine entangled state and entanglement swapping [X.M. Xiu, H.K. Dong, L. Dong, Y.J. Cao, F. Chi, Opt. Commun. 282 (2009) 2457] is analyzed. It is shown that an eavesdropper can entangle an ancilla without introducing any error in the security test utilizing a speciality of the four-particle genuine entangled state. Moreover, the eavesdropper can distill a quarter of the secret information from her entangled ancilla. Finally, a simple improvement to resist this attack is proposed.  相似文献   
15.
廖庆洪  张旗  刘晔 《光学技术》2017,43(2):97-102
基于Jaynes-Cummings模型和原子-腔光力学系统,研究了该系统中原子与机械模之间的纠缠交换机制,讨论了两个原子的相干角和腔场与机械模之间的耦合系数对原子与机械模之间纠缠的影响。一个原子与机械模之间的最大纠缠随着该原子相干角的增大而减小,另一个原子与机械模之间的纠缠存在突然产生和突然死亡现象,并且最大纠缠随该原子相干角的增大而增大。根据这一结果可以制备原子与机械模之间的最大纠缠态,这为纠缠调控提供了一种新的方式。  相似文献   
16.
R Pakniat  M K Tavassoly  M H Zandi 《中国物理 B》2016,25(10):100303-100303
We outline a scheme for entanglement swapping based on cavity QED as well as quasi-Bell state measurement(quasiBSM) methods. The atom–field interaction in the cavity QED method is performed in small and large detuning regimes.We assume two atoms are initially entangled together and, distinctly two cavities are prepared in an entangled coherent–coherent state. In this scheme, we want to transform entanglement to the atom-field system. It is observed that, the fidelities of the swapped entangled state in the quasi-BSM method can be compatible with those obtained in the small and large detuning regimes in the cavity QED method(the condition of this compatibility will be discussed). In addition, in the large detuning regime, the swapped entangled state is obtained by detecting and quasi-BSM approaches. In the continuation,by making use of the atom–field entangled state obtained in both approaches in a large detuning regime, we show that the atomic as well as field states teleportation with complete fidelity can be achieved.  相似文献   
17.
Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently, Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution.  相似文献   
18.
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps.  相似文献   
19.
We propose a scheme for controlled entanglement swapping of continuous variable, where an EPR pair shared by two parties (Alice and Debbie) and a GHZ entangled state shared by three parties (Alice, Bob and Claire) are required. One optical beams of the EPR state will be entangled with the output mode displaced by Bob with the help of Claire. It is shown that the entanglement swapping can occur controlled by the third party (Claire)  相似文献   
20.
GAO Gan 《理论物理通讯》2009,51(5):820-822
Based on entanglement swapping, a quantum key distribution (QKD) scheme is proposed. In this scheme, the secret keys are formed by comparing initial Bell states and outcomes of entanglement swapping. Moreover, all initial Bell states prepared by Alice and Bob are completely arbitrary. As the classical information exchanged between two parties is very little, this QKD scheme has a high efficiency. In addition, in order to prevent eavesdropping, decoy particles are used.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号