排序方式: 共有114条查询结果,搜索用时 46 毫秒
1.
A conclusive teleportation protocol of a d-dimensional two-particle unknown quantum state using three d- dimensional particles in an arbitrary pure state is proposed. A sender teleports the unknown state conclusively to a receiver by using the positive operator valued measure(POVM) and introducing an ancillary qudit to perform the generalized Bell basis measurement, We calculate the optimal teleportation fidelity. We also discuss and analyse the reason why the information on the teleported state is lost in the course of the protocol, 相似文献
2.
3.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology. 相似文献
4.
We present a quantum protocol for the solution of a two-party comparison task with the help of a semi-honest third party, which can be used to solve the millionaire problem. The secrets are coded into the phases of d-level entangled states by local operations and read by the third party's collective measurements. The two parties can deduce the results of comparisons based on the secret bits shared between them beforehand and the announcement of the third party. Moreover, others will learn no information of the comparison results, even the third party. Our scheme is private and fair, and the security has also been discussed. 相似文献
5.
A novel quantum key distribution scheme based on the path-spin hybrid entanglement is proposed and analyzed. In this proposed scheme, the entanglement between the path and the spin degrees of freedom is confined locally with the single particle and transmitted in one-way direction. Two split pulses of a single spin-1/2 particle are not simultaneously transmitted through the public quantum channels for the security goal. The scheme is robust against any individual attack even in noisy environments. Moreover, it also has high-efficiency since one single particle can be used to generate one bit key on average. 相似文献
6.
Three-party quantum secret sharing of secure direct communication based on x-type entangled states
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. 相似文献
7.
Xiu-Bo Chen Gang Xu Yi-Xian Yang Qiao-Yan Wen 《International Journal of Theoretical Physics》2010,49(11):2793-2804
In this paper, a new and efficient quantum protocol which allows a group of mutually distrustful players to perform the summation
computation is proposed. Different from previous protocols, we utilize the multi-particle entangled states as the information
carriers. A third party, i.e. TP, is assumed semi-honest in the two-party quantum summation protocol. All various kinds of
outside attacks and participant attacks are discussed in detail. In addition, we code all players’ Bell-basis measurement
outcomes into one classical bit (cbit). Not only the cost of classical information in the public communication network is
decreased, but also the security of the protocol is improved. The protocol is also generalized into multi-party quantum summation.
It is secure for the collusive attack performed by at most n−2 players. 相似文献
8.
Through designing a quantum communication network, we propose a protocol for the teleportation between multiple senders and multiple receivers via only one controller. In order to rationally employ the quantum entanglement resources, the controller shares the entangled state with every sender, while there is no directly shared entanglement link between sender and receiver. The security is analyzed in detail. Moreover, this protocol reduces the classical communication cost in the public channel by means of the coding. 相似文献
9.
Yan-Bing Li Qiao-Yan Wen Su-Juan Qin 《International Journal of Theoretical Physics》2013,52(1):199-205
In this paper, we propose an improved version of K. Loukopoulos and D.E. Browne’s quantum multiparty computation protocol (Phys. Rev. A 81:062336, 2010). Compared to the previously protocol, the improved protocol can avoid a security flaw and has higher efficiency. 相似文献
10.
Wei-Wei Zhang Fei Gao Bin Liu Heng-Yue Jia Qiao-Yan Wen Hui Chen 《International Journal of Theoretical Physics》2013,52(2):504-513
Quantum watermarking is the technique which embeds the invisible quantum signal such as the owner’s identification into quantum multimedia data (such as audio, video and image) for copyright protection. In this paper, a watermark strategy for quantum images is proposed based on flexible representation for quantum images (FRQI). Compared with the former strategy, which can only be used to verify the identity of the true owner of a carrier image, the proposed method can be used to find out who is the real owner, and our strategy’s capacity reaches the largest. It is impossible for anyone except the copyrighter to clear off or extract the watermark images. 相似文献