期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
量子直接通信 被引量:7
1
作者 李熙涵 《物理学报》 SCIE EI CAS CSCD 北大核心 2015年第16期39-55,共17页
量子直接通信是量子通信中的一个重要分支,它是一种不需要事先建立密钥而直接传输机密信息的新型通信模式.本综述将介绍量子直接通信的基本原理,回顾量子直接通信的发展历程,从最早的高效量子直接通信协议、两步量子直接通信模型、量子... 量子直接通信是量子通信中的一个重要分支,它是一种不需要事先建立密钥而直接传输机密信息的新型通信模式.本综述将介绍量子直接通信的基本原理,回顾量子直接通信的发展历程,从最早的高效量子直接通信协议、两步量子直接通信模型、量子一次一密直接通信模型等,到抗噪声的量子直接通信模型以及基于单光子多自由度量子态及超纠缠态的量子直接通信模型,最后介绍量子直接通信的研究现状并展望其发展未来. 展开更多
关键词 量子通信 量子直接通信 量子直接通信网络
下载PDF
量子安全直接通信研究进展 被引量:3
2
作者 邓富国 周萍 +2 位作者 李熙涵 李春燕 周宏余 《原子核物理评论》 CAS CSCD 北大核心 2005年第4期382-386,共5页
简要地介绍了量子安全直接通信的必要条件,初步介绍了两个量子安全直接通信模型,即Two-Step和Quantum-One-Time-Pad模型。
关键词 量子信息 量子通讯 安全直接通信 Two-step协议 Quantum-One-Time-Pad协议
下载PDF
量子安全直接通信 被引量:4
3
作者 邓富国 李熙涵 龙桂鲁 《北京师范大学学报(自然科学版)》 CAS CSCD 北大核心 2016年第6期790-799,共10页
"墨子"号量子科学实验卫星的发射,进一步吸引了人们对量子通信的关注.自1984年IBM的Bennett和加拿大蒙特利尔大学的Brassard提出第一个量子密钥随机分配协议以来,量子通信能否进行机密信息的安全直接传输一直是困扰量子通信... "墨子"号量子科学实验卫星的发射,进一步吸引了人们对量子通信的关注.自1984年IBM的Bennett和加拿大蒙特利尔大学的Brassard提出第一个量子密钥随机分配协议以来,量子通信能否进行机密信息的安全直接传输一直是困扰量子通信界的一个难题.2000年,清华大学龙桂鲁等萌芽了量子安全直接通信的初步思想,随后的几年,我们建立了量子安全直接通信的完整理论,创建了4个判据,构造了2个最早期完整的量子安全直接通信代表性方案,为量子安全直接通信方案设计及其应用提供了物理原理依据,吸引了众多学者的关注与投入,促进了这一领域的发展.本文首先以第一个量子秘钥随机分配协议为例介绍量子通信如何为经典保密通信服务;随后,以最早期完整的2个量子安全直接通信方案为基础,阐述了为什么可以进行量子安全直接通信,并介绍量子安全直接通信的物理原理. 展开更多
关键词 量子安全直接通信 两步方案 量子一次一密 量子通信
下载PDF
基于光量子态避错及容错传输的量子通信 被引量:8
4
作者 邓富国 李熙涵 李涛 《物理学报》 SCIE EI CAS CSCD 北大核心 2018年第13期1-15,共15页
量子通信以量子态为信息载体在远距离的通信各方之间传递信息,因此量子态的传输和远距离共享是量子通信的首要步骤.信道噪声不仅会影响通信效率还可能被窃听者利用从而威胁通信安全,对抗信道噪声是实现安全高效量子通信亟需解决的问题.... 量子通信以量子态为信息载体在远距离的通信各方之间传递信息,因此量子态的传输和远距离共享是量子通信的首要步骤.信道噪声不仅会影响通信效率还可能被窃听者利用从而威胁通信安全,对抗信道噪声是实现安全高效量子通信亟需解决的问题.本文介绍基于光量子态的两类对抗信道噪声的实用方法——量子态的避错传输和容错的量子通信,包括对抗噪声的基本原理和两种方法的代表性方案,并从资源消耗和可操作性的角度分析了方案的实用价值. 展开更多
关键词 光量子态 联合噪声 避错传输 容错量子通信
下载PDF
Quantum Secure Direct Communication Network with Two-Step Protocol 被引量:20
5
作者 李熙涵 周萍 +3 位作者 梁玉洁 李春燕 周宏余 邓富国 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第5期1080-1083,共4页
An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice,... An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values. 展开更多
关键词 LOCAL UNITARY OPERATIONS KEY DISTRIBUTION EPR PAIRS BELL THEOREM GHZSTATE CRYPTOGRAPHY ENTANGLEMENT SCHEME TELEPORTATION DIALOGUE
下载PDF
Quantum secure direct communication with quantum encryption based on pure entangled states 被引量:42
6
作者 李熙涵 李春燕 +3 位作者 邓富国 周萍 梁玉洁 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第8期2149-2153,共5页
This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and de... This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the travelling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message. 展开更多
关键词 quantum secure direct communication quantum encryption quantum key pure entangled states
下载PDF
Controlled Teleportation of an Arbitrary Multi-Qudit State in a General Form with d-Dimensional Greenberger-Horne-Zeilinger States 被引量:14
7
作者 李熙涵 邓富国 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第5期1151-1153,共3页
A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m ... A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efticiency for qudits in this scheme approaches 100% in principle. 展开更多
关键词 QUANTUM INFORMATION ENTANGLED STATES 2-PARTICLE STATE BELL STATES NETWORK
下载PDF
Faithful quantum entanglement sharing based on linear optics with additional qubits 被引量:2
8
作者 李熙涵 段晓礁 +2 位作者 盛宇波 周宏余 邓富国 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第9期3710-3713,共4页
This paper presents a scheme for faithfully distributing a pure entanglement between two parties over an arbitrary collective-noise channel with linear optics. The transmission is assisted by an additional qubit again... This paper presents a scheme for faithfully distributing a pure entanglement between two parties over an arbitrary collective-noise channel with linear optics. The transmission is assisted by an additional qubit against collective noise. The receiver can take advantage of the time discrimination and the measurement results of the assistant qubit to reconstruct a pure entanglement with the sender. Although the scheme succeeds probabilistically, the resource used to get a pure entanglement state is finite, and so is easier to establish entanglement in practice than quantum entanglement purification. 展开更多
关键词 entanglement sharing quantum communication linear optics
下载PDF
Multiparty Quantum Remote Secret Conference 被引量:1
9
作者 李熙涵 李春燕 +3 位作者 邓富国 周萍 梁玉洁 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第1期23-26,共4页
We present two schemes for multiparty quantum remote secret conference in which each legitimate conferee can read out securely the secret message announced by another, but a vicious eavesdropper can get nothing about ... We present two schemes for multiparty quantum remote secret conference in which each legitimate conferee can read out securely the secret message announced by another, but a vicious eavesdropper can get nothing about it. The first one is based on the same key shared efficiently and securely by all the parties with Greenberger-Horne- Zeilinger (GHZ) states, and each conferee sends his secret message to the others with one-time pad crypto-system. The other one is based on quantum encryption with a quantum key~ a sequence of GHZ states shared among all the conferees and used repeatedly after confirming their security. Both these schemes are optimal as their intrinsic efficiency for qubits approaches the maximal value. 展开更多
下载PDF
Efficient Quantum Cryptography Network without Entanglement and Quantum Memory 被引量:24
10
作者 李春燕 李熙涵 +3 位作者 邓富国 周萍 梁玉洁 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第11期2896-2899,共4页
An efficient quantum cryptography network protocol is proposed with d-dimensional polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for p... An efficient quantum cryptography network protocol is proposed with d-dimensional polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0〉. The users code the information on the single photons with some unitary operations. To prevent the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum states and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse. 展开更多
关键词 KEY DISTRIBUTION BELL THEOREM STATES COMMUNICATION
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
11
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol EAVESDROPPING
下载PDF
Economical quantum secure direct communication network with single photons 被引量:10
12
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第12期3553-3559,共7页
In this paper a scheme for quantum secure direct communication (QSDC) network is proposed with a sequence of polarized single photons. The single photons are prepared originally in the same state (0) by the server... In this paper a scheme for quantum secure direct communication (QSDC) network is proposed with a sequence of polarized single photons. The single photons are prepared originally in the same state (0) by the servers on the network, which will reduce the difficulty for the legitimate users to check eavesdropping largely. The users code the information on the single photons with two unitary operations which do not change their measuring bases. Some decoy photons, which are produced by operating the sample photons with a Hadamard, are used for preventing a potentially dishonest server from eavesdropping the quantum lines freely. This scheme is an economical one as it is the easiest way for QSDC network communication securely. 展开更多
关键词 quantum secure direct communication NETWORK single photons
下载PDF
Efficient Three-Party Quantum Secret Sharing with Single Photons 被引量:4
13
作者 周萍 李熙涵 +1 位作者 邓富国 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第8期2181-2184,共4页
A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice ... A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large. 展开更多
关键词 PODOLSKY-ROSEN PAIRS HORNE-ZEILINGER STATES COMMUNICATION PROTOCOLS ENTANGLED STATES BELL STATES INFORMATION NETWORK CRYPTOGRAPHY SCHEME
下载PDF
Efficient Multiparty Quantum Secret Sharing with Greenberger-Horne-Zeilinger States 被引量:4
14
作者 邓富国 周萍 +2 位作者 李熙涵 李春燕 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第5期1084-1087,共4页
An effcient multiparty quantum secret sharing scheme is proposed with Greenberger-Horne-Zeilinger (GHZ) states following some ideas in quantum dense coding. The agents take the single-photon measurements on the phot... An effcient multiparty quantum secret sharing scheme is proposed with Greenberger-Horne-Zeilinger (GHZ) states following some ideas in quantum dense coding. The agents take the single-photon measurements on the photons received for eavesdropping check and exploit the four local unitary operations Ⅰ, σx, σx and iσy to code their message. This scheme has the advantage of high capacity as each GHZ state can carry two bits of information. The parties do not need to announce the measuring bases for almost all the photons, which will reduce the classical information exchanged largely. The intrinsic efficiency for qubits and the total effciency both approach the maximal values. 展开更多
关键词 SECURE DIRECT COMMUNICATION LOCAL UNITARY OPERATIONS KEY DISTRIBUTION NOISY CHANNELS ENTANGLEMENT SCHEME TELEPORTATION CRYPTOGRAPHY PAIRS
下载PDF
Probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel and its application in quantum state sharing 被引量:3
15
作者 周萍 李熙涵 +1 位作者 邓富国 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第10期2867-2874,共8页
This paper presents a scheme for probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel. The sender Alice first teleports the coefficients of the unknown state t... This paper presents a scheme for probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel. The sender Alice first teleports the coefficients of the unknown state to the receiver Bob, and then Bob reconstructs the state with an auxiliary particle and some unitary operations if the teleportation succeeds. This scheme has the advantage of transmitting much less particles for teleporting an arbitrary GHZ-class state than others. Moreover, it discusses the application of this scheme in quantum state sharing. 展开更多
关键词 quantum teleportation arbitrary GHZ-class state pure entanglement quantum state sharing
下载PDF
Efficient quantum secure communication with a publicly known key 被引量:1
16
作者 李春燕 李熙涵 +1 位作者 邓富国 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第7期2352-2355,共4页
This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357).... This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently, 展开更多
关键词 quantum communication quantum cryptography
下载PDF
Multiparty Quantum Secret Report
17
作者 邓富国 李熙涵 +3 位作者 李春燕 周萍 梁玉洁 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1676-1679,共4页
A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice k... A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency. 展开更多
关键词 SECURE DIRECT COMMUNICATION LOCAL UNITARY OPERATIONS KEY DISTRIBUTION BELLTHEOREM GHZ STATES ENTANGLEMENT CRYPTOGRAPHY SCHEME PROTOCOL NETWORK
下载PDF
Theoretical Investigation of the Exotic Structure of the Mirror Nuclei ^17Ne and ^17N
18
作者 梁玉洁 李熙涵 +2 位作者 邓富国 刘祖华 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第5期1142-1145,共4页
The exotic structures of the ground state of the mirror nuclei ^17Ne and ^17N are investigated by means of the asymptotic normalization coefficient (ANC) method to explore the role of the Coulomb interaction, The pr... The exotic structures of the ground state of the mirror nuclei ^17Ne and ^17N are investigated by means of the asymptotic normalization coefficient (ANC) method to explore the role of the Coulomb interaction, The probebilities of a valence nucleon outside the binding-potential are P = 56.69±2.98/7.46% for ^17Ne and P = 45.51±2.32/5.81% for ^17N. The rms radii are (r^2)^1/2 = 5.06±0.11/0.30 fm and (r^2)^1/2=4.24±0.06/0.16 fm, respectively. The results obtained are nearly independent of the potential parameters. According to the halo occurrence conditions, it is suggested that ^17Ne is a two-proton halo and ^17N is a two-neutron skin. Moreover, two effects of the Coulomb interact-ion on the exotic structure are analysed. From the present results, the exotic structure of the nucleus in the proton-rich side is more obvious than that of its mirror nucleus because of the Coulomb interaction. 展开更多
下载PDF
Theoretical Analysis of the Exotic Structure of ^17F
19
作者 梁玉洁 李熙涵 +1 位作者 周宏余 刘祖华 《Chinese Physics Letters》 SCIE CAS CSCD 2005年第5期1086-1088,共3页
下载PDF
^(21)Na第三激发态的奇异结构
20
作者 李熙涵 梁玉洁 +2 位作者 邓富国 刘祖华 周宏余 《科学通报》 EI CAS CSCD 北大核心 2005年第24期2702-2705,共4页
根据已有的实验数据,利用渐近归一化系数(ANC)方法计算了21Na处于第三激发态的最后一个质子的核外几率P和均方根半径(?r2?1/2).结果为P=54.73%,?r2?1/2=5.28fm.比较了第三激发态与另外几个低能激发态的价核子核外几率P及核外部分对均方... 根据已有的实验数据,利用渐近归一化系数(ANC)方法计算了21Na处于第三激发态的最后一个质子的核外几率P和均方根半径(?r2?1/2).结果为P=54.73%,?r2?1/2=5.28fm.比较了第三激发态与另外几个低能激发态的价核子核外几率P及核外部分对均方根半径的贡献.处于第三激发态的价核子的核外几率明显大于其他激发态.与核芯核20Ne中核子的密度分布相比,在21Na第三激发态的价核子密度分布中可以清楚地看到一个弥散的长尾巴.这一些现象表明21Na的第三激发态是质子晕态. 展开更多
关键词 晕态 均方根半径 密度分布 渐近归一化系数
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部