首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Abstract

Measurement device independent Quantum Key Distribution (MDI-QKD), is immune to all attacks on detection and achieve immense improvement with respect to quantum key distribution system security. However, Bell state measurement (BSM), the kernel processing in MDI-QKD, can only identify two of the four Bell states, which limits the efficiency of the protocol. In this paper, a modified MDI-QKD with hybrid qubit is proposed to provide a major step towards answering this question. The hybrid qubits, which are composed of single photon qubit qubits and coherent qubit, are sent to the quantum relay to perform parallel BSMs synchronously and bit flip can be easily operated to complete the whole key distribution process. The secure key rate can be improved with our modified protocol owing to the higher success probability of BSM, which is increased by adding the parity check of coherent qubit. Furthermore, though our protocol requires photon number resolving detectors, the BSM of coherent state could be instead implemented using squeezed state which makes our scheme practical with state-of-the-art devices.  相似文献   

2.
In this work we present optical setups for a polarization encoded qubit, based only on common linear optical devices, which implement probabilistic bipartite and tripartite entanglement generation, as well probabilistic quantum teleportation. The setups can be implemented with current technology and they permit the realization of several quantum communication protocols.  相似文献   

3.
Quantum secure communications could securely transmit quantum information by using quantum resource. Recently, novel applications such as bidirectional and asymmetric quantum protocols have been developed. In this paper, we propose a new method for generating entanglement which is highly useful for multiparty quantum communications such as teleportation and Remote State Preparation (RSP). As one of its applications, we propose a new type of quantum secure communications, i.e. cyclic RSP protocols. Starting from a four-party controlled cyclic RSP protocol of one-qubit states, we show that this cyclic protocol can be generalized to a multiparty controlled cyclic RSP protocol for preparation of arbitrary qubit states. We point out that previous bidirectional and asymmetric protocols can be regarded as a simpler form of our cyclic RSP protocols.  相似文献   

4.
The interferometry of single-photon pulses has been used to implement quantum technology systems, like quantum key distribution, interaction-free measurement and some other quantum communication protocols. In most of these implementations, Mach–Zehnder, Michelson and Fabry–Pérot interferometers are the most used. In this work we present optical setups for interaction-free measurement, quantum key distribution, quantum secret sharing and secure classical prisoners' dilemma game using the Sagnac interferometer. The proposed setups are described and as well the quantum protocols using them are explained.  相似文献   

5.
In January 2015, the first quantum homomorphic signature scheme was proposed creatively. However, only one verifier is allowed to verify a signature once in this scheme. In order to support repeatable verification for general scenario, we propose a new quantum homomorphic signature scheme with repeatable verification by introducing serial verification model and parallel verification model. Serial verification model solves the problem of signature verification by combining key distribution and Bell measurement. Parallel verification model solves the problem of signature duplication by logically treating one particle of an EPR pair as a quantum signature and physically preparing a new EPR pair. These models will be beneficial to the signature verification of general scenarios. Scheme analysis shows that both intermediate verifiers and terminal verifiers can successfully verify signatures in the same operation with fewer resource consumption, and especially the verified signature in entangled states can be used repeatedly.  相似文献   

6.
Oscillations of superconducting current between clockwise and counterclockwise directions in a flux qubit do not conserve the angular momentum of the qubit. To compensate for this effect the solid containing the qubit must oscillate in unison with the current. This requires entanglement of quantum states of the qubit with quantum states of a macroscopic body. The question then arises whether slow decoherence of quantum oscillations of the current is consistent with fast decoherence of quantum states of a macroscopic solid. This problem is analyzed within an exactly solvable quantum model of a qubit embedded in an absolutely rigid solid and for the elastic model that conserves the total angular momentum. We show that while the quantum state of a flux qubit is, in general, a mixture of a large number of rotational states, slow decoherence is permitted if the system is macroscopically large. Practical implications of entanglement of qubit states with mechanical rotations are discussed.  相似文献   

7.
We analyze the dispersive readout of superconducting charge and flux qubits as a quantum measurement process. The measurement oscillator frequency is considered much lower than the qubit frequency. This regime is interesting because large detuning allows for strong coupling between the measurement oscillator and the signal transmission line, thus allowing for fast readout. Due to the large detuning we may not use the rotating wave approximation in the oscillator-qubit coupling. Instead we start from an approximation where the qubit follows the oscillator adiabatically, and show that non-adiabatic corrections are small. We find analytic expressions for the measurement time, as well as for the back-action, both while measuring and in the off-state. The quantum efficiency is found to be unity within our approximation, both for charge and flux qubit readout.   相似文献   

8.
Abstract

Quantum cryptography has been shown to be an effective technology for the secure distribution of keys on point-to-point optical links. We show how the existing techniques can be extended to allow multi-user secure key distribution on optical networks. We demonstrate that using network configurations typical of those found in passive optical network architectures any of the current quantum key distribution protocols can be adapted to implement secure key distribution from any user to any other user. An important feature of these adapted protocols is that the broadcaster, or service provider on the network, does not have to be trusted by the two users who wish to establish a key.  相似文献   

9.
10.
The objective of the Third International Intercomparison on EPR Tooth Dosimetry was to evaluate laboratories performing tooth enamel dosimetry <300 mGy. Final analysis of results included a correlation analysis between features of laboratory dose reconstruction protocols and dosimetry performance. Applicability of electron paramagnetic resonance (EPR) tooth dosimetry at low dose was shown at two applied dose levels of 79 and 176 mGy. Most (9 of 12) laboratories reported the dose to be within 50 mGy of the delivered dose of 79 mGy, and 10 of 12 laboratories reported the dose to be within 100 mGy of the delivered dose of 176 mGy. At the high-dose tested (704 mGy) agreement within 25% of the delivered dose was found in 10 laboratories. Features of EPR dose reconstruction protocols that affect dosimetry performance were found to be magnetic field modulation amplitude in EPR spectrum recording, EPR signal model in spectrum deconvolution and duration of latency period for tooth enamel samples after preparation.  相似文献   

11.
With the emergence of classical communication security problems, quantum communication has been studied more extensively. In this paper, a novel probabilistic hierarchical quantum information splitting protocol is designed by using a non-maximally entangled four-qubit cluster state. Firstly, the sender Alice splits and teleports an arbitrary one-qubit secret state invisibly to three remote agents Bob, Charlie, and David. One agent David is in high grade, the other two agents Bob and Charlie are in low grade. Secondly, the receiver in high grade needs the assistance of one agent in low grade, while the receiver in low grade needs the aid of all agents. While introducing an ancillary qubit, the receiver’s state can be inferred from the POVM measurement result of the ancillary qubit. Finally, with the help of other agents, the receiver can recover the secret state probabilistically by performing certain unitary operation on his own qubit. In addition, the security of the protocol under eavesdropping attacks is analyzed. In this proposed protocol, the agents need only single-qubit measurements to achieve probabilistic hierarchical quantum information splitting, which has appealing advantages in actual experiments. Such a probabilistic hierarchical quantum information splitting protocol hierarchical is expected to be more practical in multipartite quantum cryptography.  相似文献   

12.
The or-exclusive function (xor) is one of the most important logical functions, and can be used in several protocols and algorithms, as encryption and error correction. This paper discusses several ways to implement the xor function, in a secure way using quantum communication, between users of a network. It is shown how to implement it using bipartite, tripartite and four-partite maximally entangled states, as well using an optical interferometer and strongly attenuated coherent states. Some protocols for secure communication using the xor, as quantum key distribution, are also proposed.  相似文献   

13.
Phosphorus donor spins in silicon are promising quantum bit (qubit) candidates. They have a natural confinement potential, long spin lifetimes and decades of use in the semiconductor fabrication industry. Readout of a single qubit is a necessary step to build a quantum computer, which could potentially solve particular problems exponentially faster than conventional computers. Electrically detected magnetic resonance has previously been used to measure the spin state of an ensemble of spins. In this literature review, the concept of a quantum computer is introduced before the potential of using electrically detected magnetic resonance to measure the spin state of a single donor spin qubit in a silicon transistor is discussed.  相似文献   

14.
Combined with the dense coding mechanism and the bias-BB84 protocol, an efficient quantum key distribution protocol with dense coding on single photons (QDKD-SP) is proposed. Compared with the BB84 or bias-BB84 protocols based on single photons, our QDKD-SP protocol has a higher capacity without increasing the difficulty of its experiment implementation as each correlated photon can carry two bits of useful information. Compared with the quantum dense key distribution (QDKD) protocol based on entangled states, our protocol is more feasible as the preparation and the measurement of a single-photon quantum state is not difficult with current technology. In addition, our QDKD-SP protocol is theoretically proved to be secure against the intercept-resend attack.  相似文献   

15.
Two classes of superconducting devices have been proposed as quantum bits (qubits) for realizing quantum logic operations. The flux qubits based on a superconducting quantum interference device (SQUID) appear to be particularly promising owing to the macroscopic nature of the qubit and potential integration with high-speed control circuitry in the form of rapid single-flux quantum electronics. Recent progress is discussed and near-term challenges mentioned. The radio frequency SQUID-based qubit offers a prospect for a reliably manufacturable scalable approach.  相似文献   

16.
We consider a parametrically driven system of a qubit coupled to a cavity taking into account different channels of energy dissipation. We focus on the periodic modulation of a single parameter of this hybrid system, which is the coupling constant between the two subsystems. Such a modulation is possible within the superconducting realization of qubit–cavity coupled systems, characterized by an outstanding degree of tunability and flexibility. Our major result is that energy dissipation in the cavity can enhance population of the excited state of the qubit in the steady state, while energy dissipation in the qubit subsystem can enhance the number of photons generated from vacuum. We find optimal parameters for the realization of such dissipation-induced amplification of quantum effects. Our results might be of importance for the full control of quantum states of coupled systems as well as for the storage and engineering of quantum states.  相似文献   

17.
Detector control attacks on quantum key distribution systems exploit the linear mode of avalanche photodiode in single photon detectors. So far, the protocols under consideration have been the BB84 protocol and its derivatives. Here we present how bright tailored illumination exploiting the linear mode of detectors can be used to eavesdrop on distributed-phase-reference protocols, such as differential-phase-shift and coherent-one-way.  相似文献   

18.
We assess the overall performance of our quantum key distribution (QKD) system implementing the measurement-device-independent (MDI) protocol using components with varying capabilities such as different single-photon detectors and qubit preparation hardware. We experimentally show that superconducting nanowire single-photon detectors allow QKD over a channel featuring 60 dB loss, and QKD with more than 600 bits of secret key per second (not considering finite key effects) over a 16 dB loss channel. This corresponds to 300 and 80 km of standard telecommunication fiber, respectively. We also demonstrate that the integration of our QKD system into FPGA-based hardware (instead of state-of-the-art arbitrary waveform generators) does not impact on its performance. Our investigation allows us to acquire an improved understanding of the trade-offs between complexity, cost and system performance, which is required for future customization of MDI-QKD. Given that our system can be operated outside the laboratory over deployed fiber, we conclude that MDI-QKD is a promising approach to information-theoretic secure key distribution.  相似文献   

19.
We investigate a scheme for implementing quantum dense coding via cavity decay and linear optics devices. Our scheme combines two distinct advantages: the atomic qubit serves as a stationary bit and the photonic qubit as a flying bit, thus it is suitable for long distant quantum communication.  相似文献   

20.
Theory and experiments of a three-cavity wavelength-selective photodetector   总被引:7,自引:0,他引:7  
Liu K  Huang Y  Ren X 《Applied optics》2000,39(24):4263-4269
We propose a novel wavelength-selective photodetector with three subcavities, i.e., a filtering cavity, a spacer cavity, and an absorption cavity, for obtaining a narrow spectral response linewidth and a high quantum efficiency simultaneously. A theoretical prediction has been made that a less than 1-nm linewidth and a quantum efficiency as high as 90% are possible. We discuss the effects of the key factors on the performance of this type of photodetector that has been designed and fabricated. A spectral response linewidth of approximately 1.4 nm (FWHM) and an external quantum efficiency higher than 50% have been achieved experimentally. Such devices are promising for wavelength-division multiplexing applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号