期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
On Universality of Quantum Fourier Transform
1
作者 Arpita Maitra Santanu Sarkar 《Chinese Physics Letters》 SCIE CAS CSCD 2012年第3期17-20,共4页
A methodology is presented to obtain the basis of qudits which are admissible to quantum Fourier transform(QFT)in the sense that the set of such kets are related by the QFT in the same way as the kets of the computati... A methodology is presented to obtain the basis of qudits which are admissible to quantum Fourier transform(QFT)in the sense that the set of such kets are related by the QFT in the same way as the kets of the computational basis.We first study this method for qubits to characterize the ensemble that works for the Hadamard transformation(QFT for two dimension).In this regard we identify certain incompleteness in the result of Maitra and Parashar(Int.J.Quantum Inform.4(2006)653).Next we characterize the ensemble of qutrits for which QFT is possible.Further,some theoretical results related to higher dimensions are also discussed.Considering the unitary matrix Un related to QFT,the issue boils down to the problem of characterizing matrices that commute with Un. 展开更多
关键词 ENSEMBLE ADMISSIBLE DIMENSIONS
原文传递
Improving the security of “measurement-device-independent quantum communication without encryption” 被引量:1
2
作者 Nayana Das Goutam Paul 《Science Bulletin》 SCIE EI CSCD 2020年第24期2048-2049,M0004,共3页
In 2018, Niu et al. [1] proposed a measurement-device-independent quantum secure direct communication(MDI-QSDC) protocol and quantum dialogue(MDI-QD) protocol using Einstein-Podolsky-Rosen(EPR) pairs. In their protoco... In 2018, Niu et al. [1] proposed a measurement-device-independent quantum secure direct communication(MDI-QSDC) protocol and quantum dialogue(MDI-QD) protocol using Einstein-Podolsky-Rosen(EPR) pairs. In their protocols, the two legitimate parties prepare two sets of EPR pairs in their locations, and send the partner qubits of their EPR pairs to an untrusted third party(UTP). Here we analyze these protocols and show that 50% of the information about the secret message bits is leaked out in both the protocols. 展开更多
关键词 quantum 量子通信 EINSTEIN
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部