A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys...A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.展开更多
We construct efficient quantum logic network for probabilistic cloning the quantum states used in imple mented tasks for which cloning provides some enhancement in performance.
Probabilistic quantum cloning(PQC) cannot copy a set of linearly dependent quantum states.In this paper,we show that if incorrect copies are allowed to be produced,linearly dependent quantum states may also be clone...Probabilistic quantum cloning(PQC) cannot copy a set of linearly dependent quantum states.In this paper,we show that if incorrect copies are allowed to be produced,linearly dependent quantum states may also be cloned by the PQC.By exploiting this kind of PQC to clone a special set of three linearly dependent quantum states,we derive the upper bound of the maximum confidence measure of a set.An explicit transformation of the maximum confidence measure is presented.展开更多
We exploit optimal probabilistic cloning to rederive the JS limit.Dependent on the formulation given by the optimal probabilistic cloning,the explicit transformation of a measure of the JS limit is presented.Based on ...We exploit optimal probabilistic cloning to rederive the JS limit.Dependent on the formulation given by the optimal probabilistic cloning,the explicit transformation of a measure of the JS limit is presented.Based on linear optical devices,we propose an experimentally feasible scheme to implement the JS limit measure of a general pair of two nonorthogonal quantum states.The success probability of the proposed scheme is unity.展开更多
文摘A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.
文摘We construct efficient quantum logic network for probabilistic cloning the quantum states used in imple mented tasks for which cloning provides some enhancement in performance.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 11074002,61073048,and 11104057)the Natural Science Foundation of the Education Department of Anhui Province,China (Grant Nos. KJ2010ZD08 and KJ2012A245)the Postgraduate Program of Huainan Normal University of China
文摘Probabilistic quantum cloning(PQC) cannot copy a set of linearly dependent quantum states.In this paper,we show that if incorrect copies are allowed to be produced,linearly dependent quantum states may also be cloned by the PQC.By exploiting this kind of PQC to clone a special set of three linearly dependent quantum states,we derive the upper bound of the maximum confidence measure of a set.An explicit transformation of the maximum confidence measure is presented.
基金supported by the National Natural Science Foundation of China (Grant Nos. 11074002,61073048 and 11104057)the Natural Science Foundation of the Education Department of Anhui Province of China(Grant Nos. KJ2010ZD08 and KJ2012A245)the Postgraduate Program of Huainan Normal University
文摘We exploit optimal probabilistic cloning to rederive the JS limit.Dependent on the formulation given by the optimal probabilistic cloning,the explicit transformation of a measure of the JS limit is presented.Based on linear optical devices,we propose an experimentally feasible scheme to implement the JS limit measure of a general pair of two nonorthogonal quantum states.The success probability of the proposed scheme is unity.