您的位置: 专家智库 > >

国家教育部博士点基金(20090005110010)

作品数:9 被引量:41H指数:4
相关作者:温巧燕王天银更多>>
相关机构:北京邮电大学洛阳师范学院更多>>
发文基金:国家教育部博士点基金国家自然科学基金北京市自然科学基金更多>>
相关领域:理学电子电信机械工程更多>>

文献类型

  • 9篇中文期刊文章

领域

  • 9篇理学
  • 5篇电子电信
  • 4篇机械工程

主题

  • 2篇QUANTU...
  • 2篇CLUSTE...
  • 2篇ENTANG...
  • 1篇单光子
  • 1篇多粒子
  • 1篇多粒子纠缠态
  • 1篇通信
  • 1篇匿名
  • 1篇量子
  • 1篇量子通信
  • 1篇接收者
  • 1篇纠缠
  • 1篇纠缠态
  • 1篇光子
  • 1篇MULTIP...
  • 1篇OPERAT...
  • 1篇OVER
  • 1篇QUANTU...
  • 1篇QUANTU...
  • 1篇QUANTU...

机构

  • 1篇北京邮电大学
  • 1篇洛阳师范学院

作者

  • 1篇王天银
  • 1篇温巧燕

传媒

  • 4篇Chines...
  • 4篇Scienc...
  • 1篇中国科学:物...

年份

  • 1篇2013
  • 2篇2012
  • 3篇2011
  • 3篇2010
9 条 记 录,以下是 1-9
排序方式:
匿名接收者的量子通信
2010年
提出了一种新的匿名量子通信协议.在该协议中,除了指数小的概率,接收者的匿名性和传输的量子消息的保密性被完美的保护.而且,该协议利用单光子而不是多粒子纠缠态构造匿名纠缠.因此,与先前的工作相比,该协议节省了量子资源.
王天银温巧燕朱甫臣
关键词:单光子多粒子纠缠态
Quantum communications with an anonymous receiver被引量:5
2010年
A new protocol for the anonymous communication of quantum information is proposed. The anonymity of the receiver and the privacy of the quantum information are perfectly protected except with exponentially small probability in this protocol. Furthermore, this protocol uses single photons to construct anonymous entanglement instead of multipartite entangled states, and therefore it reduces quantum resources compared with the pioneering work.
WANG TianYinWEN QianYanZHU FuChen
Quantum secure direct communication with cluster states被引量:20
2010年
A quantum secure direct communication protocol with cluster states is proposed.Compared with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(Int.J.Quant.Inform.,2009,7:689),this protocol can achieve higher intrinsic efficiency by using two-step transmission.The implementation of this protocol is also discussed.
CAO WeiFengYANG YuGuangWEN QiaoYan
Undeniable quantum state sharing with a five-atom cluster state in cavity QED被引量:1
2012年
We present an efficient scheme for undeniable five-party quantum state sharing(FQSTS) of an arbitrary single-atom state with a five-atom cluster state in cavity QED.The implementation of this scheme does not involve the joint-state measurement of multi-atoms,which makes it convenient in a practical application.The scheme is also insensitive to the cavity decay and the thermal field.
YANG YuGuangXIA JuanJIA XinZHANG Hua
General description of discriminating quantum operations
2011年
The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this paper, we provide a general description of discriminating quantum operations. Concretely speaking, we describe the distinguisha- bility between quantum operations using a measure called operator fidelity. It is shown that, employing the theory of operator fidelity, we can not only verify some previous results to discriminate unitary operations, but also exhibit a more general discrimination condition. We further apply our results to analysing the security of some quantum cryptographic protocols and discuss the realization of our method using well-developed quantum algorithms.
张可佳朱萍高飞郭奋卓秦素娟温巧燕
Controlled quantum teleportation with Bell states被引量:4
2011年
We propose a new scheme for controlled quantum teleportation with Bell states in which classical keys for controllers' portion are used. We also discuss the security of the proposed scheme and show that it can satisfy the requirements for controlled quantum teleportation. The comparison between this scheme and the previous ones shows that it is more economical and efficient.
王天银温巧燕
关键词:CONTROLLEDTELEPORTATION
Entanglement distribution using three-mode separable state with imperfect equipments
2011年
We show a scheme to distribute the entanglement by using three-mode separable Gaussian state prepared with imperfect equipments. The scheme achieves the aim that the entanglement is distributed between two distant parties with only Gaussian operations and linear optics elements. Moreover, we analyse the logarithmic negativity of the entanglement shared between the two parties when the systems are imperfect and arrive at the conclusion that the logarithmic negativity is asymptotically stable with fluctuations within a certain space range.
宋婷婷张劼高飞温巧燕
Fault tolerant quantum secure direct communication with quantum encryption against collective noise被引量:9
2012年
We present two novel quantum secure direct communication(QSDC) protocols over different collective-noise channels.Different from the previous QSDC schemes over collective-noise channels,which are all source-encrypting protocols,our two protocols are based on channel-encryption.In both schemes,two authorized users first share a sequence of EPR pairs as their reusable quantum key.Then they use their quantum key to encrypt and decrypt the secret message carried by the decoherence-free states over the collective-noise channel.In theory,the intrinsic efficiencies of both protocols are high since there is no need to consume any entangled states including both the quantum key and the information carriers except the ones used for eavesdropping checks.For checking eavesdropping,the two parties only need to perform two-particle measurements on the decoy states during each round.Finally,we make a security analysis of our two protocols and demonstrate that they are secure.
黄伟温巧燕贾恒越秦素娟高飞
Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels被引量:6
2013年
We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this protocol.By utilizing collective eavesdropping detection strategy,our protocol has the advantage of higher qubit efficiency and lower cost of implementation.In addition to this protocol,we further introduce three robust versions which can be immune to collective dephasing noise,collective-rotation noise and all types of unitary collective noise,respectively.Finally,we show that our protocols can be secure against the attacks from both the outside eavesdroppers and the inside participants by using the theorems on quantum operation discrimination.
HUANG WeiWEN QiaoYanLIU BinGAO FeiSUN Ying
共1页<1>
聚类工具0