首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   19篇
物理学   21篇
无线电   9篇
  2022年   3篇
  2021年   1篇
  2020年   1篇
  2019年   2篇
  2018年   4篇
  2017年   5篇
  2016年   4篇
  2014年   1篇
  2013年   1篇
  2012年   1篇
  2011年   1篇
  2010年   1篇
  2009年   3篇
  2007年   2篇
排序方式: 共有30条查询结果,搜索用时 343 毫秒
1.
We extend an optimal entanglement distillation of the triplet Greenberger-Horne-Zeilinger (GHZ) state via entanglement concentrating in the three-partite partially electron-spin-entangled systems. Two entanglement concen- tration protocols are similarly designed in detail with the post-selection in quantum-dot (QD) and micro-cavity coupled systems. The proposed protocol can be repeated several rounds to achieve an optimal success probability with an as- sistance of the ancillary QD, where only the single photon needs to pass through the micro-cavity for each round. It increases the total success probability of the distillation even if the implemented cavity is imperfect in practice during the whole process.  相似文献   
2.
提出一种模糊集信任度量方法,按QoS属性分类度量,采用7个等级评价服务,综合评价值得出信任向量,仿真显示此方法较为精确地刻画了网格服务的行为特征.基于同一网格节点共享给虚拟组织的所有网格服务的表现.给出网格节点局部声誉计算方法.提出适合网格环境的声誉覆盖网来汇聚局部声誉值.分析和仿真说明,此网较好地抑止了篡改与协同欺骗行为,声誉信息传输代价小,满足了较为精确地求解全局声誉值的要求.  相似文献   
3.
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function,together with high-dimensional superdense-coding, provide convenience, security, and large capability quantum channel forsecret distribution and recovering. Analysis shows the security of the scheme.  相似文献   
4.
Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable(CV) quantum key distribution(QKD) based air-to-water channel. The effects of the absorption and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously.Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle.  相似文献   
5.
We propose a method to improve the secret key rate of an eight-state continuous-variable quantum key distribution(CVQKD) by using a linear optics cloning machine(LOCM). In the proposed scheme, an LOCM is exploited to compensate for the imperfections of Bob's apparatus, so that the generated secret key rate of the eight-state protocol could be well enhanced. We investigate the security of our proposed protocol in a finite-size scenario so as to further approach the practical value of a secret key rate. Numeric simulation shows that the LOCM with reasonable tuning gain λ and transmittance τcan effectively improve the secret key rate of eight-state CVQKD in both an asymptotic limit and a finite-size regime.Furthermore, we obtain the tightest bound of the secure distance by taking the finite-size effect into account, which is more practical than that obtained in the asymptotic limit.  相似文献   
6.
杨芳丽  郭迎  石金晶  王焕礼  潘矜矜 《中国物理 B》2017,26(10):100303-100303
A modified continuous-variable quantum key distribution(CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator(LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection.  相似文献   
7.
施荣华  肖伊  石金晶  郭迎 《中国物理 B》2016,25(6):60301-060301
We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy.The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission,which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states.It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security,especially in large-scale votes.  相似文献   
8.
罗浩  王一军  叶炜  钟海  毛宜钰  郭迎 《中国物理 B》2022,31(2):20306-020306
Continuous-variable quantum key distribution(CVQKD)allows legitimate parties to extract and exchange secret keys.However,the tradeoff between the secret key rate and the accuracy of parameter estimation still around the present CVQKD system.In this paper,we suggest an approach for parameter estimation of the CVQKD system via artificial neural networks(ANN),which can be merged in post-processing with less additional devices.The ANN-based training scheme,enables key prediction without exposing any raw key.Experimental results show that the error between the predicted values and the true ones is in a reasonable range.The CVQKD system can be improved in terms of the secret key rate and the parameter estimation,which involves less additional devices than the traditional CVQKD system.  相似文献   
9.
在激光作为能量载体给远程移动设备如无人机充电的过程中,为确保接收端能精准接收到从发射端发射来的激光束,设计了一套基于四象限探测器的激光束二维扫描跟踪系统.该系统通过实时测量入射激光的光斑中心相对于四象限探测器中心的偏移量,利用监控和控制计算机、控制柜以及二轴转台构建闭环控制系统,可实现激光对移动目标的实时跟踪.测试结果表明,当移动目标在距离激光束发射端高1m、横向宽度30 cm的区域内以不大于5 cm/s的速度移动时,该跟踪扫描系统可较准确、实时地跟踪移动目标.  相似文献   
10.
基于Petri网的数字媒体分发协议的安全性证明   总被引:2,自引:0,他引:2       下载免费PDF全文
郭迎九  林闯  尹浩  田立勤 《电子学报》2009,37(5):1030-1036
 安全协议的形式化证明是目前的一个热点和难点问题.本文以一种数字媒体分发协议(DMDP)为例,采用基于Petri网模型并结合进程代数和逻辑归纳方法对其进行形式化证明,新的方法有效避免了状态空间爆炸问题.在证明过程中,采用协议安全性等价原则,对分发协议进行简化,使证明更加简洁.文章同时对证明方法的完备性进行了讨论,说明了Petri网模型证明协议安全性的有效性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号