期刊文献+
共找到1,082篇文章
< 1 2 55 >
每页显示 20 50 100
Encoding converters for quantum communication networks
1
作者 Hua-Xing Xu Shao-Hua Wang +2 位作者 Ya-Qi Song Ping Zhang Chang-Lei Wang 《Chinese Physics B》 2025年第5期64-69,共6页
Quantum communication networks,such as quantum key distribution(QKD)networks,typically employ the measurement-resend mechanism between two users using quantum communication devices based on different quantum encoding ... Quantum communication networks,such as quantum key distribution(QKD)networks,typically employ the measurement-resend mechanism between two users using quantum communication devices based on different quantum encoding types.To achieve direct communication between the devices with different quantum encoding types,in this paper,we propose encoding conversion schemes between the polarization bases(rectilinear,diagonal and circular bases)and the time-bin phase bases(two phase bases and time-bin basis)and design the quantum encoding converters.The theoretical analysis of the encoding conversion schemes is given in detail,and the basis correspondence of encoding conversion and the property of bit flip are revealed.The conversion relationship between polarization bases and time-bin phase bases can be easily selected by controlling a phase shifter.Since no optical switches are used in our scheme,the converter can be operated with high speed.The converters can also be modularized,which may be utilized to realize miniaturization in the future. 展开更多
关键词 quantum communication networks encoding conversion polarization encoding time-bin phase encoding
原文传递
Distribution algorithm of entangled particles for wireless quantum communication mesh networks
2
作者 王霄峻 施丽慧 +2 位作者 占海涛 项睿清 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2015年第4期450-456,共7页
With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes ... With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes selection in order to save cost and reduce complexity. A minimum spanning tree( MST)-based quantum distribution algorithm( QDMST) is presented to construct the mesh backbone network. First, the articulation points are found,and for each connected block uncovered by the articulation points, the general centers are solved. Then, both articulation points and general centers are classified as backbone nodes and an M ST is formed. The quantum path between every two neighbor nodes on the MST is calculated. The nodes on these paths are also classified as backbone nodes. Simulation results validate the advantages of QDMST in the average backbone nodes number and average quantum channel distance compared to the existing random selection algorithm under multiple network scenarios. 展开更多
关键词 wireless quantum communication networks entangled particles distribution wireless mesh networks minimum spanning tree
在线阅读 下载PDF
A Review of Quantum Cryptography Communication for Wireless Networks
3
作者 CHEN Si-guang WU Meng 《南京邮电大学学报(自然科学版)》 2010年第1期59-63,共5页
We analyze the development of quantum cryptography communication,including analyze the problems lie in the existent literatures and give the resolve methods according to these problems.Then discuss the quantum cryptog... We analyze the development of quantum cryptography communication,including analyze the problems lie in the existent literatures and give the resolve methods according to these problems.Then discuss the quantum cryptography communication for wireless networks and also point out the shortcoming of current research and the future of quantum wireless networks. 展开更多
关键词 计算机网络 密码系统 网络安全 RSA
在线阅读 下载PDF
An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication 被引量:10
4
作者 刘文杰 陈汉武 +3 位作者 马廷淮 李志强 刘志昊 胡文博 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第10期4105-4109,共5页
A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit tw... A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. 展开更多
关键词 deterministic secure quantum communication cluster state identity authentication
原文传递
Distributed wireless quantum communication networks with partially entangled pairs 被引量:9
5
作者 余旭涛 张在琛 徐进 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第1期66-73,共8页
Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks ... Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible. 展开更多
关键词 distributed wireless quantum communication networks partially entangled pairs routing multi-hop teleportation
原文传递
Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability 被引量:3
6
作者 张盛 王剑 唐朝京 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期33-40,共8页
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-sp... Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency. 展开更多
关键词 quantum cryptography quantum counterfactuality quantum information
原文传递
Dynamic Polarization-Basis Compensation for Free-Space Quantum Communications 被引量:3
7
作者 张光宇 杨哲 +2 位作者 张成龙 朱智涵 王振华 《China Communications》 SCIE CSCD 2013年第2期27-32,共6页
In polarization-encoded free-space quantum communications, a transmitter on a satellite and a receiver in a ground station each have a respective polarization zero direction, by which they encode and decode every pola... In polarization-encoded free-space quantum communications, a transmitter on a satellite and a receiver in a ground station each have a respective polarization zero direction, by which they encode and decode every polariza-tion quantum bit required for a quantum com-munication protocol. In order to complete the protocol, the ground-based receiver needs to track and compensate for the polarization zero direction of the satellite-based transmitter. Ex- pressions satisfied by amplitudes of the s-polarization component and the p-polarization component are derived based on a two-mirror model, and a condition satisfied by the reflec- tion coefficients of the two mirrors is given. A polarization tracking principle is analyzed for satellite-to-ground quanaun communications, and quantum key encoding and decoding prin- ciples based on polarization tracking are given. A half-wave-plate-based dynamic polariza- tion-basis compensation scheme is proposed in this paper, and this scheme is proved to be suitable for satellite-to-ground and intersatellite quantum communications. 展开更多
关键词 dynamic polarization-basis com-pensation half-wave plate two-mirror model free-space quantum communications
在线阅读 下载PDF
Robust Quantum Secure Direct Communication and Deterministic Secure Quantum Communication over Collective Dephasing Noisy Channel 被引量:2
8
作者 YUAN Hao SONG Jun +4 位作者 HE Qin HAN Lian-Fang HOU Kui HU Xiao-Yuan SHI Shou-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第9期627-632,共6页
We propose two schemes for quantum secure direct communication (QSDC) and deterministic securequantum communication (DSQC) over collective dephasing noisy channel.In our schemes,four special two-qubit statesare used a... We propose two schemes for quantum secure direct communication (QSDC) and deterministic securequantum communication (DSQC) over collective dephasing noisy channel.In our schemes,four special two-qubit statesare used as the quantum channel.Since these states are unchanged through the collective dephasing noisy channel,the effect of the channel noise can be perfectly overcome.Simultaneously,the security against some usual attacks canbe ensured by utilizing the various checking procedures.Furthermore,these two schemes are feasible with present-daytechnique. 展开更多
关键词 quantum secure direct communication deterministic secure quantum communication collective dephasing noisy channel special two-qubit states
在线阅读 下载PDF
Deterministic Secure Quantum Communication with Cluster State and Bell-Basis Measurements 被引量:3
9
作者 YUAN Hao HE Qin +3 位作者 HU Xiao-Yuan HOU Kui HAN Lian-Fang SHI Shou-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第11期1105-1108,共4页
We present a novel protocol for deterministic secure quantum communication by using the lour-qubit cluster state as quantum channel. It is shown that two legitimate users can directly transmit the secret messages base... We present a novel protocol for deterministic secure quantum communication by using the lour-qubit cluster state as quantum channel. It is shown that two legitimate users can directly transmit the secret messages based on Bellbasis measurements and classical communication. The present protocol makes use of the ideas of block transmission and decoy particle checking technique. It has a high capacity as each cluster state can carry two 5its of information, and has a high intrinsic efficieney 5ecause almost all the instances except the decoy checking particles (its numSer is negligible) are useful. Furthermore, this protocol is feasible with present-day technique. 展开更多
关键词 deterministic secret quantum communication cluster state Bell-basis measurement block transmission decoy photon checking technology
在线阅读 下载PDF
Hierarchical simultaneous entanglement swapping for multi-hop quantum communication based on multi-particle entangled states 被引量:1
10
作者 Guang Yang Lei Xing +2 位作者 Min Nie Yuan-Hua Liu Mei-Ling Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第3期151-159,共9页
Entanglement swapping is a key technology for multi-hop communication based on entanglement in quantum networks. However, the end-to-end delay of the traditional sequential entanglement swapping (SEQES) grows rapidly ... Entanglement swapping is a key technology for multi-hop communication based on entanglement in quantum networks. However, the end-to-end delay of the traditional sequential entanglement swapping (SEQES) grows rapidly withthe increase of network scale. To solve this problem, we first propose a low-delay multi-particle simultaneous entanglementswapping (SES) scheme to establish the remote four-particle Greenberger–Horne–Zeilinger (GHZ) channel states for thebidirectional teleportation of three-particle GHZ states, in which the intermediate nodes perform Bell state measurements,send the measurement results and the Bell state type to the user node Bob (or Alice) through classical channel simultaneously. Bob (or Alice) only needs to carry out a proper unitary operation according to the information he (or she) hasreceived. Further, we put forward a hierarchical simultaneous entanglement swapping (HSES) scheme to reduce the classical information transmission cost, which is composed of level-1 SES and level-2 SES (schemes). The former is an innersegment SES, and the latter is an inter segments SES. Theoretical analysis and simulation results show the HSES can obtainthe optimal performance tradeoff between end-to-end delay and classical cost. 展开更多
关键词 multi-hop quantum communication entanglement swapping TELEPORTATION MULTI-PARTICLE
原文传递
Controlled Deterministic Secure Quantum Communication Protocol Based on Three-Particle GHZ States in X-Basis 被引量:1
11
作者 昌燕 张仕斌 +1 位作者 闫丽丽 韩桂华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第3期285-290,共6页
A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are require... A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are required,which makes the scheme more convenient than others in practical applications.By distributing a random key between both sides of the communication and performing classical XOR operation,we realize a one-time-pad scheme,therefore our protocol achieves unconditional secure.Because only user with legitimate identity string can decrypt the secret,our protocol can resist man-in-the middle attack.The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping.The detection rate reaches 75% per qubit. 展开更多
关键词 deterministic secure quantum communication eavesdropping detection classical XOR operation
原文传递
Fault tolerant deterministic secure quantum communication using logical Bell states against collective noise 被引量:1
12
作者 王朝 刘建伟 +2 位作者 陈秀波 毕亚港 尚涛 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第4期53-62,共10页
This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding... This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding function, which is designed by exploiting the property of the corresponding logical Bell states immune to collective-dephasing noise and collective-rotation noise, respectively. The secret message can be encoded by two simple unitary operations and decoded by merely performing Bell measurements, which can make the proposed scheme more convenient in practical applications. Moreover, the strategy of one-step quanta transmission, together with the technique of decoy logical qubits checking not only reduces the influence of other noise existing in a quantum channel, but also guarantees the security of the communication between two legitimate users. The final analysis shows that the proposed schemes are feasible and robust against various well-known attacks over the collective noise channel. 展开更多
关键词 collective noise deterministic secure quantum communication logical Bell states
原文传递
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
13
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers ALGORITHM Post-quantum cryptography
暂未订购
Controlled Secure Quantum Communication Using Pure Entangled W Class States
14
作者 XIA Yan SONG Jie SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第4期919-924,共6页
We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorize... We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies. 展开更多
关键词 controlled secure quantum communication EAVESDROPPER non-maximally entangled W state
在线阅读 下载PDF
Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State
15
作者 袁好 周军 +2 位作者 张刚 魏相飞 刘向远 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第6期984-988,共5页
A two-step deterministic secure quantum communication (DSQC) scheme using blocks of three-qubit W state is proposed. In this scheme, the secret messages can be encoded by employing four two-particle unitary operatio... A two-step deterministic secure quantum communication (DSQC) scheme using blocks of three-qubit W state is proposed. In this scheme, the secret messages can be encoded by employing four two-particle unitary operations and directly decoded by utilizing the corresponding measurements in Bell basis or single-particle basis. Comparing with most previous DSQC protocols, the present scheme has a high total efficiency, which comes up to 50%. Apart from this, it has still the advantages of high capacity as each W state can carry two bits of secret information, and high intrinsic efficiency because almost all the instances are useful. Furthermore, the security of this communication can be ensured by the decoy particle checking technique and the two-step transmitting idea. 展开更多
关键词 deterministic secret quantum communication three-qubit W states decoy particle checking technique two-step transmitting idea
在线阅读 下载PDF
Probabilistic direct counterfactual quantum communication
16
作者 Sheng Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期68-74,共7页
It is striking that the quantum Zeno effect can be used to launch a direct counterfactual communication between two spatially separated parties, Alice and Bob. So far, existing protocols of this type only provide a de... It is striking that the quantum Zeno effect can be used to launch a direct counterfactual communication between two spatially separated parties, Alice and Bob. So far, existing protocols of this type only provide a deterministic counterfactual communication service. However, this counterfactuality should be payed at a price. Firstly, the transmission time is much longer than a classical transmission costs. Secondly, the chained-cycle structure makes them more sensitive to channel noises. Here, we extend the idea of counterfactual communication, and present a probabilistic-counterfactual quantum communication protocol, which is proved to have advantages over the deterministic ones. Moreover, the presented protocol could evolve to a deterministic one solely by adjusting the parameters of the beam splitters. 展开更多
关键词 quantum communication quantum cryptography optical implementation of quantum information processing
原文传递
On Security of Quantum Cryptography by Probabilistic Analysis
17
作者 Jianzhong Zhao 《Journal of Quantum Information Science》 CAS 2022年第4期91-98,共8页
The existing quantum cryptography is a classical cryptography in nature and basically insecure because of its classical (conventional) bits, classical encryption algorithm and classical (public) channel. A novel topic... The existing quantum cryptography is a classical cryptography in nature and basically insecure because of its classical (conventional) bits, classical encryption algorithm and classical (public) channel. A novel topic about successful communication between the legitimate users, Alice and Bob, is discussed with probability of solution uniqueness of Bob’s decryption equation. We find, by probabilistic analysis, that success of communication between Alice and Bob is probabilistic with a probability bigger than 1/2. It is also novel to define insecurity of the quantum cryptography by probability of solution uniqueness of the search equation of Eve, the eavesdropper. The probability of Eve’s success to find the plain-text of Alice (and Bob) is greater than 1/2, and so the quantum cryptography is seriously insecure. 展开更多
关键词 quantum cryptography Classical cryptography Fundamental Equations Unique Solution PROBABILITY Insecure
在线阅读 下载PDF
A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
18
作者 赵楠 朱畅华 权东晓 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期22-26,共5页
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep... We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information. 展开更多
关键词 A Novel Basis Splitting Eavesdropping Scheme in quantum cryptography Based on the BB84 Protocol BB
原文传递
Physical Layer Security for Wireless and Quantum Communications
19
作者 Jinhong Yuan Yixian Yang Nanrun Zhou 《ZTE Communications》 2013年第3期1-2,共2页
his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issu... his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security forwireless networks. The second Part comprises another four papers on quantum com- munications. 展开更多
关键词 SECURITY Physical Layer Security for Wireless and quantum communications
在线阅读 下载PDF
Quantum Cryptography-A Theoretical Overview
20
作者 Pratik Roy Saptarshi Sahoo +1 位作者 Amit Kumar Mandal Indranil Basu 《Journal of Quantum Computing》 2021年第4期151-160,共10页
Quantum Key Distribution seems very promising as it offers unconditional security,that’s why it is being implemented by the tech giants of the networking industry and government.Having quantum phenomenon as a backbon... Quantum Key Distribution seems very promising as it offers unconditional security,that’s why it is being implemented by the tech giants of the networking industry and government.Having quantum phenomenon as a backbone,QKD protocols become indecipherable.Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication.This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography. 展开更多
关键词 quantum information quantum cryptography quantum entanglement
在线阅读 下载PDF
上一页 1 2 55 下一页 到第
使用帮助 返回顶部