排序方式: 共有16条查询结果,搜索用时 93 毫秒
1.
2.
Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack 下载免费PDF全文
For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack. 相似文献
3.
The dependence of fidelity on the squeezing parameter in teleportation of the squeezed coherent states 下载免费PDF全文
This paper investigates an analytical expression of teleportation fidelity in the teleportation scheme of a single mode of electromagnetic field.The fidelity between the original squeezed coherent state and the teleported one is expressed in terms of the squeezing parameter r and the quantum channel parameter(two-mode squeezed state) p.The results of analysis show that the fidelity increases with the increase of the quantum channel parameter p,while the fidelity decreases with the increase of the squeezing parameter r of the squeezed state.Thus the coherent state(r = 0) is the best quantum signal for continuous variable quantum teleportation once the quantum channel is built. 相似文献
4.
采用连续变量量子密钥分发的纠缠模型,在反向协商情况下,研究法拉第镜不完善对系统安全密钥速率的影响.结果表明,不完善的法拉第镜会降低系统实际的密钥速率,并且降低安全通信距离,且随着法拉第镜失偏角度的增大而增大.此外,使用大的调制方差,可以降低法拉第镜不完善对系统的影响. 相似文献
5.
A quantum identification scheme including registration and identification phases is proposed. The users‘ passwords are transmitted by qubit string and recorded as a set of quantum operators. The security of the proposed scheme is guaranteed by the no-cloning theorem. Based on photon polarization modulation, an experimental approach is also designed to implement our proposed scheme. 相似文献
6.
7.
8.
9.
10.
In this paper security of the quantum key distribution scheme using
correlations of continuous variable Einstein--Podolsky--Rosen (EPR)
pairs is investigated. A new approach for calculating the secret
information rate Δ I is proposed by using the Shannon
information theory. Employing an available parameter F which is
associated with the entanglement of the EPR pairs, one can detect
easily the eavesdropping. Results show that the proposed scheme is
secure against individual beam splitter attack strategy with a
proper squeeze parameter. 相似文献