首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   69篇
  免费   45篇
化学   17篇
物理学   97篇
  2023年   2篇
  2022年   1篇
  2020年   2篇
  2019年   5篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2013年   4篇
  2012年   8篇
  2011年   13篇
  2010年   19篇
  2009年   23篇
  2008年   17篇
  2007年   9篇
  2006年   6篇
  2005年   2篇
排序方式: 共有114条查询结果,搜索用时 46 毫秒
1.
A conclusive teleportation protocol of a d-dimensional two-particle unknown quantum state using three d- dimensional particles in an arbitrary pure state is proposed. A sender teleports the unknown state conclusively to a receiver by using the positive operator valued measure(POVM) and introducing an ancillary qudit to perform the generalized Bell basis measurement, We calculate the optimal teleportation fidelity. We also discuss and analyse the reason why the information on the teleported state is lost in the course of the protocol,  相似文献   
2.
3.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology.  相似文献   
4.
We present a quantum protocol for the solution of a two-party comparison task with the help of a semi-honest third party, which can be used to solve the millionaire problem. The secrets are coded into the phases of d-level entangled states by local operations and read by the third party's collective measurements. The two parties can deduce the results of comparisons based on the secret bits shared between them beforehand and the announcement of the third party. Moreover, others will learn no information of the comparison results, even the third party. Our scheme is private and fair, and the security has also been discussed.  相似文献   
5.
A novel quantum key distribution scheme based on the path-spin hybrid entanglement is proposed and analyzed. In this proposed scheme, the entanglement between the path and the spin degrees of freedom is confined locally with the single particle and transmitted in one-way direction. Two split pulses of a single spin-1/2 particle are not simultaneously transmitted through the public quantum channels for the security goal. The scheme is robust against any individual attack even in noisy environments. Moreover, it also has high-efficiency since one single particle can be used to generate one bit key on average.  相似文献   
6.
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed.  相似文献   
7.
In this paper, a new and efficient quantum protocol which allows a group of mutually distrustful players to perform the summation computation is proposed. Different from previous protocols, we utilize the multi-particle entangled states as the information carriers. A third party, i.e. TP, is assumed semi-honest in the two-party quantum summation protocol. All various kinds of outside attacks and participant attacks are discussed in detail. In addition, we code all players’ Bell-basis measurement outcomes into one classical bit (cbit). Not only the cost of classical information in the public communication network is decreased, but also the security of the protocol is improved. The protocol is also generalized into multi-party quantum summation. It is secure for the collusive attack performed by at most n−2 players.  相似文献   
8.
Through designing a quantum communication network, we propose a protocol for the teleportation between multiple senders and multiple receivers via only one controller. In order to rationally employ the quantum entanglement resources, the controller shares the entangled state with every sender, while there is no directly shared entanglement link between sender and receiver. The security is analyzed in detail. Moreover, this protocol reduces the classical communication cost in the public channel by means of the coding.  相似文献   
9.
In this paper, we propose an improved version of K. Loukopoulos and D.E. Browne’s quantum multiparty computation protocol (Phys. Rev. A 81:062336, 2010). Compared to the previously protocol, the improved protocol can avoid a security flaw and has higher efficiency.  相似文献   
10.
Quantum watermarking is the technique which embeds the invisible quantum signal such as the owner’s identification into quantum multimedia data (such as audio, video and image) for copyright protection. In this paper, a watermark strategy for quantum images is proposed based on flexible representation for quantum images (FRQI). Compared with the former strategy, which can only be used to verify the identity of the true owner of a carrier image, the proposed method can be used to find out who is the real owner, and our strategy’s capacity reaches the largest. It is impossible for anyone except the copyrighter to clear off or extract the watermark images.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号