排序方式: 共有30条查询结果,搜索用时 343 毫秒
1.
We extend an optimal entanglement distillation of the triplet Greenberger-Horne-Zeilinger (GHZ) state via entanglement concentrating in the three-partite partially electron-spin-entangled systems. Two entanglement concen- tration protocols are similarly designed in detail with the post-selection in quantum-dot (QD) and micro-cavity coupled systems. The proposed protocol can be repeated several rounds to achieve an optimal success probability with an as- sistance of the ancillary QD, where only the single photon needs to pass through the micro-cavity for each round. It increases the total success probability of the distillation even if the implemented cavity is imperfect in practice during the whole process. 相似文献
2.
3.
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function,together with high-dimensional superdense-coding, provide convenience, security, and large capability quantum channel forsecret distribution and recovering. Analysis shows the security of the scheme. 相似文献
4.
Security Simulation of Continuous-Variable Quantum Key Distribution over Air-to-Water Channel Using Monte Carlo Method 下载免费PDF全文
Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable(CV) quantum key distribution(QKD) based air-to-water channel. The effects of the absorption and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously.Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle. 相似文献
5.
Finite-size analysis of eight-state continuous-variable quantum key distribution with the linear optics cloning machine 下载免费PDF全文
We propose a method to improve the secret key rate of an eight-state continuous-variable quantum key distribution(CVQKD) by using a linear optics cloning machine(LOCM). In the proposed scheme, an LOCM is exploited to compensate for the imperfections of Bob's apparatus, so that the generated secret key rate of the eight-state protocol could be well enhanced. We investigate the security of our proposed protocol in a finite-size scenario so as to further approach the practical value of a secret key rate. Numeric simulation shows that the LOCM with reasonable tuning gain λ and transmittance τcan effectively improve the secret key rate of eight-state CVQKD in both an asymptotic limit and a finite-size regime.Furthermore, we obtain the tightest bound of the secure distance by taking the finite-size effect into account, which is more practical than that obtained in the asymptotic limit. 相似文献
6.
Improving continuous-variable quantum key distribution under local oscillator intensity attack using entanglement in the middle 下载免费PDF全文
A modified continuous-variable quantum key distribution(CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator(LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection. 相似文献
7.
We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy.The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission,which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states.It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security,especially in large-scale votes. 相似文献
8.
Parameter estimation of continuous variable quantum key distribution system via artificial neural networks 下载免费PDF全文
Continuous-variable quantum key distribution(CVQKD)allows legitimate parties to extract and exchange secret keys.However,the tradeoff between the secret key rate and the accuracy of parameter estimation still around the present CVQKD system.In this paper,we suggest an approach for parameter estimation of the CVQKD system via artificial neural networks(ANN),which can be merged in post-processing with less additional devices.The ANN-based training scheme,enables key prediction without exposing any raw key.Experimental results show that the error between the predicted values and the true ones is in a reasonable range.The CVQKD system can be improved in terms of the secret key rate and the parameter estimation,which involves less additional devices than the traditional CVQKD system. 相似文献
9.
在激光作为能量载体给远程移动设备如无人机充电的过程中,为确保接收端能精准接收到从发射端发射来的激光束,设计了一套基于四象限探测器的激光束二维扫描跟踪系统.该系统通过实时测量入射激光的光斑中心相对于四象限探测器中心的偏移量,利用监控和控制计算机、控制柜以及二轴转台构建闭环控制系统,可实现激光对移动目标的实时跟踪.测试结果表明,当移动目标在距离激光束发射端高1m、横向宽度30 cm的区域内以不大于5 cm/s的速度移动时,该跟踪扫描系统可较准确、实时地跟踪移动目标. 相似文献
10.