排序方式: 共有118条查询结果,搜索用时 109 毫秒
61.
Gan Gao 《Optics Communications》2010,283(14):2997-3000
In the paper [S. Lin, Q.Y. Wen, S.J. Qin, F.C. Zhu, Opt. Commun. 282 (2009) 4455], Lin et al. put forward a quantum secret sharing protocol in which the collective eavesdropping-check is employed. We study the security of this protocol and find that it is insecure. Two dishonest agents may collaborate to eavesdrop (half of) Alice's secret messages without introducing any error. 相似文献
62.
63.
Many-Agent Controlled Teleportation of Multi-qubit Quantum Information via Quantum Entanglement Swapping 总被引:2,自引:0,他引:2
ZHANG Zhan-Jun LIU Yi-Min MAN Zhong-Xiao 《理论物理通讯》2005,44(5):847-850
We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information receiver can the unknown states in the sender's qubits be fully reconstructed in the receiver's qubits. In our method, agents's control parameters are obtained via quantum entanglement swapping. As the realization of the many-agent controlled teleportation is concerned, compared to the recent method [G.P. Yang, et al., Phys. Rev. A 70 (2004) 022329], our present method considerably reduces the preparation difficulty of initial states and the identification difficulty of entangled states, moreover, it does not need local Hadamard operations and it is more feasible in technology. 相似文献
64.
A scheme for remotely preparing a two-atom entangled state via entanglement swapping in cavity quantum electronic dynamics (QED) with the help of separate measurements is proposed. And the effect of cavity decay is eliminated in our scheme. 相似文献
65.
The dynamic modification of the computational grid due to element displacement, deformation and edge swapping is described here in terms of suitably-defined continuous (in time) alterations of the geometry of the elements of the dual mesh. This new interpretation allows one to describe all mesh modifications within the arbitrary Lagrangian Eulerian framework, thus removing the need to interpolate the solution across computational meshes with different connectivity. The resulting scheme is by construction conservative and it is applied here to the solution of the Euler equations for compressible flows in two spatial dimensions. Preliminary two dimensional numerical simulations are presented to demonstrate the soundness of the approach. Numerical experiments show that this method allows for large time steps without causing element invalidation or tangling and at the same time guarantees high quality of the mesh elements without resorting to global re-meshing techniques, resulting in a very efficient solver for the analysis of e.g. fluid-structure interaction problems, even for those cases that require large mesh deformations or changes in the domain topology. 相似文献
66.
Quantum steganography with a large payload based on dense coding and entanglement swapping of Greenberger-Horne-Zeilinger states
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable. 相似文献
67.
Characterizing entanglement in all but the simplest case of a two qubit pure state is a hard problem, even understanding the relevant experimental quantities that are related to entanglement is difficult. It may not be necessary, however, to quantify the entanglement of a state in order to quantify the quantum information processing significance of a state. It is known that the fully entangled fraction has a direct relationship to the fidelity of teleportation maximized under the actions of local unitary operations. In the case of two qubits we point out that the fully entangled fraction can also be related to the fidelities, maximized under the actions of local unitary operations, of other important quantum information tasks such as dense coding, entanglement swapping and quantum cryptography in such a way as to provide an inclusive measure of these entanglement applications. For two qubit systems the fully entangled fraction has a simple known closed-form expression and we establish lower and upper bounds of this quantity with the concurrence. This approach is readily extendable to more complicated systems. 相似文献
68.
A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations(corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed.An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. 相似文献
69.
A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence coding, local collective unitary operations, and entanglement swapping. In this protocol, during the process of trans- mission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using symmetric two-dimensional states. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping. 相似文献
70.
提出了一种基于Greenberger-Horne-Zeilinger(GHZ)纠缠态进行纯EPR对双向隐形传态的方案.通过使用纠缠交换技术,通信双方Alice和Bob共享两对三粒子GHZ纠缠态来构建量子信道.方案中通过使用受控非门操作,单量子位测量以及适当的幺正操作,通信双方可以同时发送一个纯EPR对给对方.故相比仅可以传送单一量子态的方案更经济. 相似文献