排序方式: 共有111条查询结果,搜索用时 15 毫秒
91.
We present two schemes for multiparty quantum remote secret conference in which each legitimate conferee can read out securely the secret message announced by another, but a vicious eavesdropper can get nothing about it. The first one is based on the same key shared efficiently and securely by all the parties with Greenberger-Horne- Zeilinger (GHZ) states, and each conferee sends his secret message to the others with one-time pad crypto-system. The other one is based on quantum encryption with a quantum key~ a sequence of GHZ states shared among all the conferees and used repeatedly after confirming their security. Both these schemes are optimal as their intrinsic efficiency for qubits approaches the maximal value. 相似文献
92.
实验测量了7Li+11B 体系的弹性散射角分布,其中弹核7Li 的入射能量分别为9.85,13.3,18.3,23.3 和28.3 MeV,测量的角度范围为θc:m: ≈ 15◦ ∼ 80◦。通过对本次实验数据以及文献中34 MeV 的数据拟合,抽取了该体系的唯象光学势参数。结果表明,在固定作用势形状因子下,势深度与能量具有线性相依的关系:实部深度随着弹核能量的增加而线性减小,而虚部深度则在平均值10.35 MeV 附近变化。Angular distributions of 7Li+11B elastic scattering were measured at Elab(7Li)=9.85, 13.3, 18.3, 23.3 and 28.3 MeV within the angular range of θc:m: ≈ 15◦ s 80◦. The analyse of these angular distributions together with the data taken from literatures at Elab(7Li) = 34 MeV have been performed to extract the parameters of optical model potential. With the fixed geometrical shapes, the potential strengths show a concise relation to the reaction energy: the depths of real potential decrease linearly with energy increasing, whereas the depths of imaginary part just slightly vary around the average value of 10.35 MeV. 相似文献
93.
94.
95.
96.
97.
系统总结了研究近垒和垒下重离子熔合裂变反应碎片各向异性的异常的结果 ,提出一个新的预平衡裂变模型,成功地解释了碎片各向异性的异常现象 .但对异常宽峰结构不能说明 ,有待进一步研究. Systematic summary on the anomalous anisotropies of fission fragments in near and sub barrier fusion fission reactions is presented. A new version of the preequilibrium fission model is put forward to explain the anomalous anisotropies of fission fragments, except the bump of anomaly. Further study is still needed. 相似文献
98.
99.
This paper presents a scheme for faithfully distributing a pure
entanglement between two parties over an arbitrary collective-noise
channel with linear optics. The transmission is assisted by an
additional qubit against collective noise. The receiver can take
advantage of the time discrimination and the measurement results of
the assistant qubit to reconstruct a pure entanglement with the
sender. Although the scheme succeeds probabilistically, the resource
used to get a pure entanglement state is finite, and so is easier to
establish entanglement in practice than quantum entanglement
purification. 相似文献
100.
A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency. 相似文献