期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
SWHC-Strict Weak Hybrid Coherence Model for Pthread
1
作者 Rong Li Dingxing Wang & Meiming Shen(Department of Computer Science & TechnologyTsing Hua University, Beijing 100084, China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1995年第3期70-75,共6页
DSM(SVM) is a memory model which was proposed at the 1980s'. DSM solved the problem thatscalability was contradict with easy programming and merge their merits. The efficiency of DSM is still aproblem. The propose... DSM(SVM) is a memory model which was proposed at the 1980s'. DSM solved the problem thatscalability was contradict with easy programming and merge their merits. The efficiency of DSM is still aproblem. The proposed solutions include prefetching and adopting new coherence model, but neither ofthem is a perfect solution. Prefetch will be less efficient when there are too many false sharing. The weak, relaxed coherence model is quite different from sequential coherence which was assumed by mostprogrammers intuitively, so programming and debugging becomes very difficult. We have proposed StrictWeak Hybrid Coherence (SWHC) model which can eliminate false sharing and provide more temporal andspatial locality, we also provide a scheme to keep sequential coherent. But SWHC model is complicate, asimplified model for Pthread share memory parallel computing model is proposed in the paper. 展开更多
关键词 Parallel processing DSM Strict weak Hybrid coherence
在线阅读 下载PDF
Hong–Ou–Mandel interference with two independent weak coherent states 被引量:4
2
作者 陈华 安雪碧 +4 位作者 伍娟 银振强 王双 陈巍 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第2期76-81,共6页
Recently, the Hong-Ou-Mandel (HOM) interference between two independent weak coherent pulses (WCPs) has been paid much attention due to the measurement-device-independent (MDI) quantum key distribution (QKD). ... Recently, the Hong-Ou-Mandel (HOM) interference between two independent weak coherent pulses (WCPs) has been paid much attention due to the measurement-device-independent (MDI) quantum key distribution (QKD). Using classical wave theory, articles reported before show that the visibility of this kind of HOM-type interference is 〈 50%. In this work, we analyze this kind of interference using quantum optics, which reveals more details compared to the wave theory. Analyses confirm the maximum visibility of 50%. And we conclude that the maximum visibility of 50% comes from the two single-photon states in WCPs, without considering the noise. In the experiment, we successfully approach the visibility of 50% by using WCPs splitting from the single pico-second laser source and phase scanning. Since this kind of HOM interference is immune to slow phase fluctuations, both the realized and proposed experiment designs can provide stable ways of high-resolution optical distance detection. 展开更多
关键词 Hong-Ou-Mandel interference weak coherent states measurement-device-independent quantumkey distribution
原文传递
Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key 被引量:1
3
作者 李源 鲍皖苏 +2 位作者 李宏伟 周淳 汪洋 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第1期452-459,共8页
Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this paper, based on the ... Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this paper, based on the WCP source which can be used for the passive decoy-state method, we obtain the expressions of single-photon error rates, single-photon counts, and phase error rates. According to the information of smooth min-entropy, we calculate the key generation rate under the condition of finite-length key. Key generation rates with different numbers of pulses are compared by numerical simulations. From the results, it can be seen that the passive decoy-state method can have good results if the total number of pulses reaches 1010. We also simulate the passive decoy-state method with different probabilities of choosing a pulse for parameter estimation when the number of pulses is fixed. 展开更多
关键词 quantum key distribution passive decoy-state finite-length key weak coherent pulses
原文传递
Passive decoy-state quantum key distribution using weak coherent pulses with modulator attenuation
4
作者 李源 鲍皖苏 +2 位作者 李宏伟 周淳 汪洋 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第11期118-124,共7页
Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on t... Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. We introduce and analyze the unbalanced Mach-Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modulator attenuation. According to the attenuation parameter 6, the pass efficiencies are given. Then, the key generation rate can be acquired. From numerical simulations, it can be seen that modulator attenuation has a non- negligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation. 展开更多
关键词 quantum key distribution passive decoy state modulator attenuation weak coherent pulses
原文传递
Generation of entanglement molecules via weak coherent field in cavity QED
5
作者 苏万钧 杨贞标 吴怀志 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第2期593-596,共4页
This paper presents a method for generating entanglement molecules, which is introduced by Dur (2001 Phys. Rev. A). In this scheme, N ladder-type three-level atoms are sent through a resonant weak coherent cavity fi... This paper presents a method for generating entanglement molecules, which is introduced by Dur (2001 Phys. Rev. A). In this scheme, N ladder-type three-level atoms are sent through a resonant weak coherent cavity field, then the system states are measured. And the system field may collapse onto some possible types of entanglement molecules. Meanwhile it discusses about the interaction time from the experimental point of view, and compare the result with the previous scheme proposed by Huang (2004 J. Phys. B: At. Mol. Opt. Phys.). 展开更多
关键词 weak coherent state resonant interaction entanglement molecules
原文传递
Multi-channel Hong–Ou–Mandle interference between independent comb-based weak coherent pulses
6
作者 LONG HUANG LINHAN TANG +6 位作者 YANG WANG MINHUI CHENG B.E.LITTLE SAI TCHU WEI ZHAO WEIQIANG WANG WENFU ZHANG 《Photonics Research》 2025年第4期837-844,共8页
With the widespread application of quantum communication technology,there is an urgent need to enhance unconditionally secure key rates and capacity.Measurement-device-independent quantum key distribution(MDI-QKD),pro... With the widespread application of quantum communication technology,there is an urgent need to enhance unconditionally secure key rates and capacity.Measurement-device-independent quantum key distribution(MDI-QKD),proven to be immune to detection-side channel attacks,is a secure and reliable quantum communication scheme.The core of this scheme is Hong–Ou–Mandle(HOM)interference,a quantum optical phenomenon with no classical analog,where identical photons meeting on a symmetric beam splitter(BS)undergo interference and bunching.Any differences in the degrees of freedom(frequency,arrival time,spectrum,polarization,and the average number of photons per pulse)between the photons will deteriorate the interference visibility.Here,we demonstrate 16-channel weak coherent pulses(WCPs)of HOM interference with all channels’interference visibility over 46%based on two independent frequency-post-aligned soliton microcombs(SMCs).In our experiment,full locking and frequency alignment of the comb teeth between the two SMCs were achieved through pump frequency stabilization,SMC repetition rate locking,and fine tuning of the repetition rate.This demonstrates the feasibility of using independently generated SMCs as multi-wavelength sources for quantum communication.Meanwhile,SMC can achieve hundreds of frequency-stable comb teeth by locking only two parameters,which further reduces the complexity of frequency locking and the need for finding sufficient suitable frequency references compared to independent laser arrays. 展开更多
关键词 quantum optical phenomenon identical photons measurement device independent quantum key distribution weak coherent pulses soliton microcombs enhance unconditionally secure key rates symmetric beam splitter bs undergo Hong Ou Mandel interference
原文传递
Information-theoretically secure quantum timestamping with one-time universal hashing
7
作者 Ming-Yang Li Chen-Xun Weng +2 位作者 Wen-Bo Liu Mengya Zhu Zeng-Bing Chen 《Science China(Physics,Mechanics & Astronomy)》 2025年第10期172-183,共12页
Accurate and tamper-resistant timestamps are essential for applications demanding verifiable chronological ordering,such as legal documentation and digital intellectual property protection.Classical timestamp protocol... Accurate and tamper-resistant timestamps are essential for applications demanding verifiable chronological ordering,such as legal documentation and digital intellectual property protection.Classical timestamp protocols rely on computational assumptions for security,rendering them vulnerable to quantum attacks,which is a critical limitation given the rapid progress in quantum computing.To address this,we propose an information-theoretically secure quantum timestamping protocol based on one-time universal hashing with quantum keys.Our protocol simultaneously achieves information-theoretic security and high efficiency,enabling secure timestamping for arbitrarily long documents.Simulations demonstrate a generation rate exceeding 100 timestamps per second over intercity distances.In addition,our protocol only requires weak coherent states,making it practical for large-scale deployment.This work advances the field of quantum timestamping and contributes to the broader development of quantum cryptography and the future quantum internet. 展开更多
关键词 quantum timestamp one-time universal hashing NON-REPUDIATION UNFORGEABILITY weak coherent states
原文传递
Decoy-state method for quantum-key-distribution-based quantum private query 被引量:3
8
作者 Bin Liu Shuang Xia +3 位作者 Di Xiao Wei Huang Bingjie Xu Yang Li 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2022年第4期41-48,共8页
The quantum private query(QPQ)is a quantum solution for the symmetrically private information retrieval problem.We study the security of quantum-key-distribution-based QPQ with weak coherent pulses.The result shows th... The quantum private query(QPQ)is a quantum solution for the symmetrically private information retrieval problem.We study the security of quantum-key-distribution-based QPQ with weak coherent pulses.The result shows that multiphoton pulses have posed a serious threat to the participant’s privacy in QPQ protocols.Then we propose a decoy-state method that can help the honest participant detect the attack by exploiting multiphoton pulses and improving the key distillation process to defend against such attack.The analysis demonstrates that our decoy-state method significantly improves the security of the QPQ with weak coherent pulses,which solves a major obstacle in the practical application of the QPQ. 展开更多
关键词 quantum private query symmetrically private information retrieval quantum key distribution decoy state weak coherent pulse
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部