排序方式: 共有22条查询结果,搜索用时 15 毫秒
1.
A conclusive teleportation protocol of a d-dimensional two-particle unknown quantum state using three d- dimensional particles in an arbitrary pure state is proposed. A sender teleports the unknown state conclusively to a receiver by using the positive operator valued measure(POVM) and introducing an ancillary qudit to perform the generalized Bell basis measurement, We calculate the optimal teleportation fidelity. We also discuss and analyse the reason why the information on the teleported state is lost in the course of the protocol, 相似文献
2.
3.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology. 相似文献
4.
Three-party quantum secret sharing of secure direct communication based on x-type entangled states 下载免费PDF全文
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. 相似文献
5.
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless states traveling on the quantum channel. Although this scheme uses entangled states for encoding, only single-particle product measurements are required. 相似文献
6.
In this paper an efficient quantum secure direct communication (QSDC) scheme with
authentication is presented, which is based on quantum entanglement and
polarized single photons. The present protocol uses Einstein--Podolsky--Rosen
(EPR) pairs and polarized
single photons in batches. A particle of the EPR pairs is retained
in the sender's station, and the other is transmitted forth and back
between the sender and the receiver, similar to the `ping--pong'
QSDC protocol. According to the shared information beforehand, these
two kinds of quantum states are mixed and then transmitted via a
quantum channel. The EPR pairs are used to transmit secret messages
and the polarized single photons used for authentication and
eavesdropping check. Consequently, because of the dual contributions
of the polarized single photons, no classical information is needed.
The intrinsic efficiency and total efficiency are both 1 in this
scheme as almost all of the instances are useful and each EPR pair
can be used to carry two bits of information. 相似文献
7.
8.
Two simple quantum broadcast communication schemes are proposed.A central party can broadcast his secret message to all the legitimate receivers simultaneously.Compared with the three schemes proposed recently (Wang et al.2007 Chin.Phys.16 1868),the proposed schemes have the advantages of consuming fewer quantum and classical resources,lessening the difficulty and intensity of necessary operations,and having higher efficiency. 相似文献
9.
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. 相似文献
10.
提出了一种单个N维量子系统的量子秘密共享方案.在该方案中,利用对Bennett和Brassard协议(BB84协议)中使用的两基四态扩展到多基多态,分发者对要共享的秘密采用多基多态编码,将被编码的单个N维量子系统发送给他的两个代理人之一,该代理人利用一个N维克隆机对接收到的粒子做幺正操作,然后把粒子发送给另一代理人.在得知最后一个代理人接收到该粒子之后,分发者告知两个代理人他所用的制备基,然后两个代理人分别对自己的系统进行测量并在合作之后获知分发者所发送的粒子的量子态.该方案的安全性基于量子不可克隆定理.
关键词:
量子秘密共享
多基多态编码
N维克隆机
量子不可克隆定理 相似文献