期刊文献+
共找到271篇文章
< 1 2 14 >
每页显示 20 50 100
Robust Hyper-Polarization Protocol of Nuclear Spins via Magic Sequence
1
作者 Haiyang Li Yongju Li +1 位作者 Hao Liao Ping Wang 《Chinese Physics Letters》 2026年第1期105-128,共24页
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei... Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center. 展开更多
关键词 transferring polarization electrons hyperpolarization protocols quantum information technologiesas nuclear spins pulse polarization nuclear spin polarization magic sequences nuclear magnetic resonance
原文传递
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:11
2
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol EAVESDROPPING
原文传递
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
3
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "Ping-pong " protocol protocol security eavesdropping detection
在线阅读 下载PDF
Quantum key distribution series network protocol with M-classical Bobs 被引量:4
4
作者 张现周 公伟贵 +2 位作者 谭勇刚 任振忠 郭笑天 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2143-2148,共6页
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu... Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack. 展开更多
关键词 quantum key distribution symmetrical attack network protocol
原文传递
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
5
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua... The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 展开更多
关键词 ergodic matrix tensor problem resist quantum key exchange protocol ENCRYPTION
在线阅读 下载PDF
Multi-agent controlled teleportation of multi-qubit quantum information via two-step protocol 被引量:3
6
作者 杨杰 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第11期2149-2152,共4页
Utilizing both the general quantum teleportation and the two-step protocol, a new method is presented by which multi-qubit quantum information can be teleported in a much easier way from a sender Alice to a receiver B... Utilizing both the general quantum teleportation and the two-step protocol, a new method is presented by which multi-qubit quantum information can be teleported in a much easier way from a sender Alice to a receiver Bob via the control of many agents in a network than by Yang et al's method. In this method, only all the agents collaborate with Bob can the unknown states in Alice's qubits be fully reconstructed in Bob's qubits. Comparisons between the method and Yang et al's method are made. Results show that, in this method, the preparation difficulty of initial states and the identification difficulty of entangled states are considerably reduced, new method is more feasible in technique, and Hadamard operations are not needed at all. 展开更多
关键词 quantum teleportation two-step protocol quantum information
原文传递
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
7
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution "Ping-pong" protocol extended three-particle GHZ state eavesdropping detection
在线阅读 下载PDF
Quantum Private Comparison Protocol Based on Bell Entangled States 被引量:3
8
作者 刘文 王永滨 崔巍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第4期583-588,共6页
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The c... In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 展开更多
关键词 quantum private comparison protocol Bell entangled state PRIVATE
原文传递
Rational Non-Hierarchical Quantum State Sharing Protocol 被引量:3
9
作者 Zhao Dou Gang Xu +1 位作者 Xiubo Chen Kaiguo Yuan 《Computers, Materials & Continua》 SCIE EI 2019年第2期335-347,共13页
Rational participants want to maximize their benefits.The protocol with rational participants will be more realistic than the protocol with honest,semi-honest and dishonest participants.We research the rational non-hi... Rational participants want to maximize their benefits.The protocol with rational participants will be more realistic than the protocol with honest,semi-honest and dishonest participants.We research the rational non-hierarchical quantum state sharing in this paper.General steps of some known quantum state sharing protocol are summarized.Based on these steps,a new rational protocol is proposed.It means that lots of common protocols could be modified to rational protocols.Our protocol is widely applicable.Analyses show that the proposed protocol is rational and secure.It is also all-win for agents.Furthermore,number of deceiving agents is considered to redefine the utilities of agents. 展开更多
关键词 quantum secret sharing rational protocol general steps
在线阅读 下载PDF
New semi-quantum key agreement protocol based on high-dimensional single-particle states 被引量:2
10
作者 Huan-Huan Li Li-Hua Gong Nan-Run Zhou 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第11期189-196,共8页
A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum sy... A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum system,the propounded protocol makes use of the advantage of the high-dimensional quantum system,which possesses higher efficiency and better robustness against eavesdropping.Besides,the protocol allows the classical participant to encode the secret key with qudit shifting operations without involving any quantum measurement abilities.The designed semi-quantum key agreement protocol could resist both participant attacks and outsider attacks.Meanwhile,the conjoint analysis of security and efficiency provides an appropriate choice for reference on the dimension of single-particle states and the number of decoy states. 展开更多
关键词 semi-quantum key agreement protocol high-dimensional quantum state quantum cryptography quantum communication
原文传递
A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States 被引量:2
11
作者 张盛 王剑 +1 位作者 唐朝京 张权 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第8期268-272,共5页
It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocom... It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocombine two or more quantum protocols.To fill this gap,we propose a composed quantum protocol,containing bothquantum identity authentication and quantum key distribution,using squeezed states.Hence,not only the identity canbe verified,but also a new private key can be generated by our new protocol.We also analyze the security under anoptimal attack,and the efficiency,which is defined by the threshold of the tolerant error rate,using Gaussian errorfunction. 展开更多
关键词 quantum key distribution quantum cryptography composed protocol
在线阅读 下载PDF
Efficient quantum private comparison protocol based on one direction discrete quantum walks on the circle 被引量:1
12
作者 Jv-Jie Wang Zhao Dou +2 位作者 Xiu-Bo Chen Yu-Ping Lai Jian Li 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第5期150-156,共7页
We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to... We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to set a flag to judge the comparing result,which improves the qubit efficiency and the maximum quantity of the participants’secret messages.Besides,our protocol can judge the size of the secret messages,not only equality.Furthermore,the quantum walks particle is disentangled in the initial state.It only requires a quantum walks operator to move,making our proposed protocol easy to implement and reducing the quantum resources.Through security analysis,we prove that our protocol can withstand well-known attacks and brute-force attacks.Analyses also reveal that our protocol is correct and practical. 展开更多
关键词 quantum private comparison protocol one direction quantum walks EFFICIENCY brute-force attack
原文传递
A Practical Quantum Network Coding Protocol Based on Non-Maximally Entangled State 被引量:1
13
作者 Zhen-Zhen Li Zi-Chen Li +3 位作者 Xiu-Bo Chen Zhiguo Qu Xiaojun Wang Haizhu Pan 《Computers, Materials & Continua》 SCIE EI 2021年第8期2651-2663,共13页
In many earlier works,perfect quantum state transmission over the butterfly network can be achieved via quantum network coding protocols with the assist of maximally entangled states.However,in actual quantum networks... In many earlier works,perfect quantum state transmission over the butterfly network can be achieved via quantum network coding protocols with the assist of maximally entangled states.However,in actual quantum networks,a maximally entangled state as auxiliary resource is hard to be obtained or easily turned into a non-maximally entangled state subject to all kinds of environmental noises.Therefore,we propose a more practical quantum network coding scheme with the assist of non-maximally entangled states.In this paper,a practical quantum network coding protocol over grail network is proposed,in which the non-maximally entangled resource is assisted and even the desired quantum state can be perfectly transmitted.The achievable rate region,security and practicability of the proposed protocol are discussed and analyzed.This practical quantum network coding protocol proposed over the grail network can be regarded as a useful attempt to help move the theory of quantum network coding towards practicability. 展开更多
关键词 quantum network coding non-maximally entangled state quantum grail network practical protocol
在线阅读 下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
14
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The Security Analysis of Two-Step quantum Direct Communication protocol in Collective-Rotation Noise Channel EPR
原文传递
New protocols for non-orthogonal quantum key distribution
15
作者 周媛媛 周学军 +1 位作者 田培根 王瑛剑 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第1期88-93,共6页
Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state... Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state photon source for quantum key distribution. Two special cases of this protocol are deduced, i.e., a one-vacuum-and-one-weak-decoy-state protocol and a one-weak-decoy-state protocol. In these protocols, the sender prepares decoy states actively, which avoids the crude estimation of parameters in the SARG04 passive decoy-state method. With the passive decoy-state idea, the detection events on Bob's side that are non-triggered on Alice's side are not discarded, but used to estimate the fractions of single-photon and two-photon pulses, which offsets the limitation of the detector's low efficiency and overcomes the shortcoming that the performance of the active decoy-state protocol critically depends on the efficiency of detector. The simulation results show that the combination of the active and passive decoy-state ideas increases the key generation rate. With a one-vacuum-and-two-weak-decoy-state protocol, one can achieve a key generation rate that is close to the theoretical limit of an infinite decoy-state protocol. The performance of the other two protocols is a little less than with the former, but the implementation is easier. Under the same condition of implementation, higher key rates can be obtained with our protocols than with existing methods. 展开更多
关键词 quantum key distribution non-orthogonal encoding protocol active decoy state passive decoy state
原文传递
Twin-Field Quantum Key Distribution Protocol Based on Wavelength-Division-Multiplexing Technology
16
作者 Yanxin Han Zhongqi Sun +5 位作者 Tianqi Dou Jipeng Wang Zhenhua Li Yuqing Huang Pengyun Li Haiqiang Ma 《Chinese Physics Letters》 SCIE EI CAS CSCD 2022年第7期3-8,共6页
Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes ... Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes feasible and economical to combine QKD with classical optical communication through the same fiber using dense wavelength division multiplexing(DWDM) technology. This study proposes a detailed scheme of TF-QKD protocol with DWDM technology and analyzes its performance, considering the influence of quantum channel number and adjacent quantum crosstalk on the secret key rates. The simulation results show that the scheme further increases the secret key rate of TF-QKD and its variants. Therefore, this scheme provides a method for improving the secret key rate for practical quantum networks. 展开更多
关键词 Twin-Field quantum Key Distribution protocol Based on Wavelength-Division-Multiplexing Technology QKD quantum protocol KEY
原文传递
Control Protocol of Finite Dimensional Quantum Systems
17
作者 唐剑炬 付洪忱 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第12期731-737,共7页
An analytic control protocol of two types of finite dimensional quantum systems is proposed. The system can be driven to an arbitrary target state using cosine classical fields in finite cycles. The control parameters... An analytic control protocol of two types of finite dimensional quantum systems is proposed. The system can be driven to an arbitrary target state using cosine classical fields in finite cycles. The control parameters which are time periods of interaction between systems and control fields in each cycle are connected with the probability amplitudes of target states via trigonometrical functions and can be determined analytically. 展开更多
关键词 quantum control control protocol control fields
原文传递
Analysis of the one-decoy-state SARG04 quantum cryptography protocol in the presence of afterpulse effects
18
作者 Hu Nian Ya-Feng Nie +1 位作者 Chun-Mei Zhang Liang-Liang Lu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2024年第6期66-71,共6页
The SARG04 quantum key distribution protocol can offer greater robustness against photon number splitting attacks than the BB84 protocol that is implemented with weak pulses.In this paper,we propose a tight key analys... The SARG04 quantum key distribution protocol can offer greater robustness against photon number splitting attacks than the BB84 protocol that is implemented with weak pulses.In this paper,we propose a tight key analysis for the SARG04 protocol,by considering the one-decoy method and investigating its performance under the influence of a detector afterpulse.Our results demonstrate that an increase in block size leads to a slight increase in both the secure key rate and the maximum transmission distance.Importantly,the detector afterpulse plays a crucial role in practical applications and has a more pronounced effect on the SARG04 protocol compared to the BB84 protocol. 展开更多
关键词 quantum key distribution SARG04 protocol one decoy afterpulse
原文传递
Proof of Security of a Semi-Device-Independent Quantum Key Distribution Protocol
19
作者 Peng Xu Wan-Su Bao +2 位作者 Hong-Wei Li Yang Wang Hai-Ze Bao 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第2期7-10,共4页
Semi-device-independent quantum key distribution (SDI-QKD) has been proposed by applying the quantum dimension correlation, and the security relies on the violation of quantum dimension witness inequalities. We prov... Semi-device-independent quantum key distribution (SDI-QKD) has been proposed by applying the quantum dimension correlation, and the security relies on the violation of quantum dimension witness inequalities. We prove the security of the SDI-QKD protocol under the depolarization channel by considering the quantum dimension witness inequalities and minimum entropy and the specific process of the QKD protocol, combining with a four- quantum-state preparation and three measurement bases. We also provide the relationship between the dimension witness value, the error rate and the security key rate by the numerical simulation. 展开更多
关键词 QKD Proof of Security of a Semi-Device-Independent quantum Key Distribution protocol SDI
原文传递
Six-State Symmetric Quantum Key Distribution Protocol
20
作者 Makhamisa Senekane Mhlambululi Mafu Francesco Petruccione 《Journal of Quantum Information Science》 2015年第2期33-40,共8页
We propose and demonstrate an optical implementation of a quantum key distribution protocol, which uses three-non-orthogonal states and six states in total. The proposed scheme improves the protocol that is proposed b... We propose and demonstrate an optical implementation of a quantum key distribution protocol, which uses three-non-orthogonal states and six states in total. The proposed scheme improves the protocol that is proposed by Phoenix, Barnett and Chefles [J. Mod. Opt. 47, 507 (2000)]. An additional feature, which we introduce in our scheme, is that we add another detection set;where each detection set has three non-orthogonal states. The inclusion of an additional detection set leads to improved symmetry, increased eavesdropper detection and higher security margin for our protocol. 展开更多
关键词 quantum KEY Distribution QKD SYMMETRIC protocol Six-State quantum PBC00 Optical Implementation
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部