期刊文献+
共找到423篇文章
< 1 2 22 >
每页显示 20 50 100
Quantum Oblivious Transfer with Reusable Bell State
1
作者 Shu-Yu Kuo Kuo-Chun Tseng +1 位作者 Yao-Hsin Chou Fan-Hsun Tseng 《Computers, Materials & Continua》 SCIE EI 2023年第1期915-932,共18页
In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contra... In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time. 展开更多
关键词 Quantum cryptography information security quantum oblivious transfer bell state
下载PDF
Controlled quantum teleportation with Bell states 被引量:4
2
作者 王天银 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期65-69,共5页
We propose a new scheme for controlled quantum teleportation with Bell states in which classical keys for controllers' portion are used. We also discuss the security of the proposed scheme and show that it can satisf... We propose a new scheme for controlled quantum teleportation with Bell states in which classical keys for controllers' portion are used. We also discuss the security of the proposed scheme and show that it can satisfy the requirements for controlled quantum teleportation. The comparison between this scheme and the previous ones shows that it is more economical and efficient. 展开更多
关键词 CONTROLLED TELEPORTATION bell state
下载PDF
Dynamic quantum secret sharing protocol based on two-particle transform of Bell states 被引量:3
3
作者 杜宇韬 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期118-123,共6页
To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a nove... To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a novel dynamic quantum secret sharing protocol. The new protocol can not only resist some typical attacks, but also be more efficient than the existing protocols. Furthermore, we take advantage of the protocol to establish the dynamic secret sharing of a quantum state protocol for two-particle maximum entangled states. 展开更多
关键词 quantum secret sharing two-particle transform of bell states ATTACK DYNAMIC
下载PDF
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:1
4
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level bell states
下载PDF
Fault tolerant deterministic secure quantum communication using logical Bell states against collective noise 被引量:1
5
作者 王朝 刘建伟 +2 位作者 陈秀波 毕亚港 尚涛 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第4期53-62,共10页
This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding... This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding function, which is designed by exploiting the property of the corresponding logical Bell states immune to collective-dephasing noise and collective-rotation noise, respectively. The secret message can be encoded by two simple unitary operations and decoded by merely performing Bell measurements, which can make the proposed scheme more convenient in practical applications. Moreover, the strategy of one-step quanta transmission, together with the technique of decoy logical qubits checking not only reduces the influence of other noise existing in a quantum channel, but also guarantees the security of the communication between two legitimate users. The final analysis shows that the proposed schemes are feasible and robust against various well-known attacks over the collective noise channel. 展开更多
关键词 collective noise deterministic secure quantum communication logical bell states
下载PDF
Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model 被引量:2
6
作者 Zhexi Zhang Zhiguo Qu 《Journal of Quantum Computing》 2019年第2期89-109,共21页
How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy prepara... How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy preparation of Bell states, a novelanti-noise quantum network coding protocol is proposed in this paper. The new protocolencodes and transmits classical information by virtue of Bell states. It can guarantee thetransparency of the intermediate nodes during information, so that the eavesdropper Evedisables to get any information even if he intercepts the transmitted quantum states. Inview of the inevitability of quantum noise in quantum channel used, this paper analyzesthe influence of four kinds of noises on the new protocol in detail further, and verifies theefficiency of the protocol under different noise by mathematical calculation and analysis.In addition, based on the detailed mathematical analysis, the protocol has functioned wellnot only on improving the efficiency of information transmission, throughput and linkutilization in the quantum network, but also on enhancing reliability and antieavesdroppingattacks. 展开更多
关键词 Network coding quantum network coding bell states butterfly networkmodel quantum communication eavesdropping detection
下载PDF
A novel scheme of hybrid entanglement swapping and teleportation using cavity QED in the small and large detuning regimes and quasi-Bell state measurement method 被引量:1
7
作者 R Pakniat M K Tavassoly M H Zandi 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第10期45-51,共7页
We outline a scheme for entanglement swapping based on cavity QED as well as quasi-Bell state measurement(quasiBSM) methods. The atom–field interaction in the cavity QED method is performed in small and large detunin... We outline a scheme for entanglement swapping based on cavity QED as well as quasi-Bell state measurement(quasiBSM) methods. The atom–field interaction in the cavity QED method is performed in small and large detuning regimes.We assume two atoms are initially entangled together and, distinctly two cavities are prepared in an entangled coherent–coherent state. In this scheme, we want to transform entanglement to the atom-field system. It is observed that, the fidelities of the swapped entangled state in the quasi-BSM method can be compatible with those obtained in the small and large detuning regimes in the cavity QED method(the condition of this compatibility will be discussed). In addition, in the large detuning regime, the swapped entangled state is obtained by detecting and quasi-BSM approaches. In the continuation,by making use of the atom–field entangled state obtained in both approaches in a large detuning regime, we show that the atomic as well as field states teleportation with complete fidelity can be achieved. 展开更多
关键词 entanglement swapping quantum teleportation cavity QED quasi-bell state measurement
下载PDF
Bell States and Two-Qubit Logic Gate with Superconducting Charge Qubits Coupling to a Nanomechanical Resonator
8
作者 LIAO Jie-Qiao~1 and WANG Xin-Wen~(2,3)~1 Department of Physics,Hunan Normal University,Changsha 410081,China~2 Department of Physics,Beijing Normal University,Beijing 100875,China~3 Department of Electronic Engineering and Physics,Hunan University of Science and Engineering,Yongzhou 425100,China 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第12期999-1002,共4页
We propose a scheme for generating Bell states involving two SQUID-based charge qubits by coupling themto a nanomechanical resonator.We also show that it is possible to implement a two-qubit logic gate between the two... We propose a scheme for generating Bell states involving two SQUID-based charge qubits by coupling themto a nanomechanical resonator.We also show that it is possible to implement a two-qubit logic gate between the twocharge qubits by choosing carefully the interaction time. 展开更多
关键词 bell states superconducting charge qubit two-qubit logic gate nanomechanical resonator
下载PDF
Indistinguishability of orthogonal time-separated bell states
9
作者 谭勇刚 蔡庆宇 史庭云 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第9期3194-3197,共4页
This paper proves that it is impossible to identify orthogonally time-separated Bell states. If two qubits of a Bell state interact with the measurement apparatus at different time, any attempt to identify this state ... This paper proves that it is impossible to identify orthogonally time-separated Bell states. If two qubits of a Bell state interact with the measurement apparatus at different time, any attempt to identify this state will disturb it. 展开更多
关键词 bell states time-separated INDISTINGUISHABILITY
下载PDF
Perfect Quantum Teleportation via Bell States
10
作者 Xiaoqing Tan Xiaochun Li Pei Yang 《Computers, Materials & Continua》 SCIE EI 2018年第12期495-503,共9页
Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation(QT).QT... Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation(QT).QT was proposed to transmit the unknown states,in which EPR pairs,the entangled states,can be used as quantum channels.In this paper,we present two simple schemes for teleporting a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state respectively.Alice and Bob have shared an entangle state.Two Bell states are used as quantum channels.Then after Alice measuring her qubits and informing Bob her measurement results,Bob can perfectly reconstruct the original state by performing corresponding unitary operators on his qubits.It shown that a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state can be teleported perfectly,i.e.the success probabilities of our schemes are both 1. 展开更多
关键词 Quantum teleportation bell states product state pure entangled state
下载PDF
Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States
11
作者 Lili Yan Shibin Zhang +2 位作者 Yan Chang Zhibin Sun Zhiwei Sheng 《Computers, Materials & Continua》 SCIE EI 2020年第6期1297-1307,共11页
Quantum secure direct communication(QSDC)can transmit secret messages directly from one user to another without first establishing a shared secret key,which is different from quantum key distribution.In this paper,we ... Quantum secure direct communication(QSDC)can transmit secret messages directly from one user to another without first establishing a shared secret key,which is different from quantum key distribution.In this paper,we propose a novel quantum secure direct communication protocol based on signal photons and Bell states.Before the execution of the proposed protocol,two participants Alice and Bob exchange their corresponding identity IDA and IDB through quantum key distribution and keep them secret,respectively.Then the message sender,Alice,encodes each secret message bit into two single photons(|01>or|10>)or a Bell state(1|φ^(+)>=1/√2(|0>|-|1>1>)),and composes an ordered secret message sequence.To insure the security of communication,Alice also prepares the decoy photons and inserts them into secret message sequence on the basis of the values of IDA and IDB.By the secret identity IDA and IDB,both sides of the communication can check eavesdropping and identify each other.The proposed protocol not only completes secure direct communication,but also realizes the mutual authentication.The security analysis of the proposed protocol is presented in the paper.The analysis results show that this protocol is secure against some common attacks,and no secret message leaks even if the messages are broken.Compared with the two-way QSDC protocols,the presented protocol is a one-way quantum communication protocol which has the immunity to Trojan horse attack.Furthermore,our proposed protocol can be realized without quantum memory. 展开更多
关键词 Quantum secure direct communication mutual authentication bell states single photons
下载PDF
Multiparty Quantum Secret Sharing Using Two-Photon Three-Dimensional Bell States 被引量:3
12
作者 GAO Gan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第9期421-424,共4页
We present a two-photon three-dimensional multiparty quantum secret sharing scheme.The secret messagesare encoded by performing local operations.This is different from those quantum secret sharing protocols that all s... We present a two-photon three-dimensional multiparty quantum secret sharing scheme.The secret messagesare encoded by performing local operations.This is different from those quantum secret sharing protocols that all sharersmust make a state measurement.The merit of our protocol is the high capacity. 展开更多
关键词 量子秘密共享 双光子 三维 贝尔 秘密共享方案 秘密信息 多量子 高容量
下载PDF
Quantum Information Splitting of an Arbitrary Three-Qubit State by Using Cluster States and Bell States 被引量:2
13
作者 LI Yuan-Hua LIU Jun-Chang NIE Yi-You 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第3期421-425,共5页
簇状态的新应用为一个任意的 three-qubit 状态的切开的量信息(QIS ) 被调查。在我们的计划,一个 four-qubit 簇状态和一个贝尔状态被一个发送者(艾莉斯) 分享,一个控制器(查理) ,和接收装置(鲍勃) 。发送者和控制器仅仅需要执行钟... 簇状态的新应用为一个任意的 three-qubit 状态的切开的量信息(QIS ) 被调查。在我们的计划,一个 four-qubit 簇状态和一个贝尔状态被一个发送者(艾莉斯) 分享,一个控制器(查理) ,和接收装置(鲍勃) 。发送者和控制器仅仅需要执行钟状态大小(BSM ) ,接收装置能重建由在他知道发送者和控制器的测量结果以后,在他的 qubits 上执行一些适当地单一的转变州的任意的 three-qubit。这个 QIS 计划是确定的。 展开更多
关键词 bell 量子比特 信息使用 分裂 聚类 控制器 三粒子态 量子信息
下载PDF
Entropy of Field Interacting With Two Atoms in Bell State
14
作者 JIAO Zhi-Yong MA Jun-Mao LI Ning FU Xia 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第1期53-56,共4页
在这篇论文,我们调查开始处于四个贝尔状态之一与二个二水平的原子交往的单个模式的协调的光地的熵性质。二个原子的不同起始的状态导致地熵的不同进化,这被发现,这块地的紧张为地熵的进化性质起一个重要作用。
关键词 场熵演化 双原子 贝尔 二能级原子 相干光场 初始状态 性质
下载PDF
Quantum States Transfer by Analogous Bell States
15
作者 MEI Di LI Chong YANG Guo-Hui SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第2期347-350,共4页
由类似的贝尔状态的隧道播送量状态在这篇论文被学习。我们分析播送过程,构造了 probabilitic 单一的操作员,和获得最大的成功的转移量状态概率。
关键词 量子力学 理论物理 量子态转移 相似贝尔态
下载PDF
A New Quantum Communication Scheme by Using Bell States
16
作者 CAO Hai-Jing CHEN Jing SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第2期271-274,共4页
一个新量通讯计划基于纠纷交换被介绍。简化计算符号被采用认识到这个过程。安全直接通讯能同时是的量关键分发和量在计划完成了。二个合法通信员能秘密地经由三 EPR 对(量隧道) 分享四某些关键位和四随机的关键位。
关键词 量子通信 bell状态 量子电键分布 量子安全导引通信
下载PDF
记忆泡利信道下Bell态的几何失协
17
作者 熊思婷 柏明强 杨振 《四川师范大学学报(自然科学版)》 CAS 2024年第4期548-554,共7页
几何失协是度量量子关联的一种重要方法.通过引入记忆参数,使得泡利噪声具有记忆性,此时噪声被定义为记忆泡利噪声.依据不同记忆泡利信道的噪声参数,讨论xz退相位噪声、去极化噪声、双泡利噪声以及3种翻转噪声下Bell态的几何失协,得到B... 几何失协是度量量子关联的一种重要方法.通过引入记忆参数,使得泡利噪声具有记忆性,此时噪声被定义为记忆泡利噪声.依据不同记忆泡利信道的噪声参数,讨论xz退相位噪声、去极化噪声、双泡利噪声以及3种翻转噪声下Bell态的几何失协,得到Bell态的几何失协与噪声参数之间的关系,并且分析记忆参数对几何失协的影响.结果表明,在记忆泡利信道下Bell态的几何失协受到噪声影响的程度更小,即记忆泡利信道可有效增强噪声影响下Bell态几何失协的稳定性.这表明记忆泡利信道可以捕获更多的信息,有利于节约量子资源. 展开更多
关键词 几何失协 记忆泡利信道 bell
下载PDF
Quantum information splitting of a two-qubit Bell state using a four-qubit entangled state 被引量:4
18
作者 李冬芬 王瑞锦 张凤荔 《Chinese Physics C》 SCIE CAS CSCD 2015年第4期26-30,共5页
A scheme is proposed for quantum information splitting of a two-qubit Bell state by using a four-qubit entangled state as a quantum channel. In the scenario, it is supposed that there axe three legitimate parties, say... A scheme is proposed for quantum information splitting of a two-qubit Bell state by using a four-qubit entangled state as a quantum channel. In the scenario, it is supposed that there axe three legitimate parties, say Alice, Bob and Chaxlie. Alice is the sender of quantum information. Bob and Charlie are two agents. Alice first performs GHZ state measurement and tells Bob and Chaxlie the measurement results via a classical channel. It is impossible for Bob to reconstruct the original state with local operations unless help is obtained from Chaxlie. If Chaxlie allows Bob to reconstruct the original state information, he needs to perform a single-qubit measurement and tell Bob the measurement result. Using the measurement results from Alice and Charlie, Bob can reconstruct the original state. We also consider the problem of security attacks. This protocol is considered to be secure. 展开更多
关键词 quantum information quantum information splitting two-qubit bell state GHZ state measurement
原文传递
Deterministic Teleportation Channel Using Bell State Measurements Only 被引量:1
19
作者 姜敏 黄旭 周一鸣 《Tsinghua Science and Technology》 SCIE EI CAS 2010年第2期184-189,共6页
Teleportation schemes based on probabilistic channels usually rely heavily on the implementation of high-dimensional unitary operations. Since high-dimensional unitary operations are very difficult to directly impleme... Teleportation schemes based on probabilistic channels usually rely heavily on the implementation of high-dimensional unitary operations. Since high-dimensional unitary operations are very difficult to directly implement in physics experiments, methods are used to avoid high-dimensional unitary operations during the teleportation process. This paper describes how to construct a deterministic teleportation channel and a control channel using Bell state measurements only instead of high-dimensional unitary operations. Here, the general four-particle and five-particle class states are used as the potential quantum channel and the control channel for deterministic teleportation even without access to the relevant parameters. The results show that this scheme makes physical realization of teleportation more reasonable. 展开更多
关键词 quantum information deterministic teleportation multi-particle state bell state measurements
原文传递
New controlled quantum key agreement protocols based on Bell states 被引量:1
20
作者 He Yefeng Yue Yuru +3 位作者 Li Guoqing Liu Jixiang Di Man Pang Yibo 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2022年第4期42-50,共9页
The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols a... The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols are mostly two-party or three-party,and they do not entirely meet the actual needs.To address this problem,this paper proposes new CQKA protocols based on Bell states and Bell measurements.The new CQKA protocols can be successfully implemented for any N-party,not just two-party.Furthermore,the security and efficiency analyses demonstrate that the new CQKA protocols are not only secure but also more efficient in terms of quantum bit. 展开更多
关键词 quantum cryptography quantum key agreement controlled quantum key agreement bell states CONTROLLER
原文传递
上一页 1 2 22 下一页 到第
使用帮助 返回顶部