期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
Dynamic quantum secret sharing protocol based on two-particle transform of Bell states 被引量:2
1
作者 杜宇韬 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期118-123,共6页
To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a nove... To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a novel dynamic quantum secret sharing protocol. The new protocol can not only resist some typical attacks, but also be more efficient than the existing protocols. Furthermore, we take advantage of the protocol to establish the dynamic secret sharing of a quantum state protocol for two-particle maximum entangled states. 展开更多
关键词 quantum secret sharing two-particle transform of bell states ATTACK DYNAMIC
下载PDF
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:1
2
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level bell states
下载PDF
Fault tolerant deterministic secure quantum communication using logical Bell states against collective noise 被引量:1
3
作者 王朝 刘建伟 +2 位作者 陈秀波 毕亚港 尚涛 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第4期53-62,共10页
This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding... This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding function, which is designed by exploiting the property of the corresponding logical Bell states immune to collective-dephasing noise and collective-rotation noise, respectively. The secret message can be encoded by two simple unitary operations and decoded by merely performing Bell measurements, which can make the proposed scheme more convenient in practical applications. Moreover, the strategy of one-step quanta transmission, together with the technique of decoy logical qubits checking not only reduces the influence of other noise existing in a quantum channel, but also guarantees the security of the communication between two legitimate users. The final analysis shows that the proposed schemes are feasible and robust against various well-known attacks over the collective noise channel. 展开更多
关键词 collective noise deterministic secure quantum communication logical bell states
下载PDF
Bell States and Two-Qubit Logic Gate with Superconducting Charge Qubits Coupling to a Nanomechanical Resonator
4
作者 LIAO Jie-Qiao~1 and WANG Xin-Wen~(2,3)~1 Department of Physics,Hunan Normal University,Changsha 410081,China~2 Department of Physics,Beijing Normal University,Beijing 100875,China~3 Department of Electronic Engineering and Physics,Hunan University of Science and Engineering,Yongzhou 425100,China 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第12期999-1002,共4页
We propose a scheme for generating Bell states involving two SQUID-based charge qubits by coupling themto a nanomechanical resonator.We also show that it is possible to implement a two-qubit logic gate between the two... We propose a scheme for generating Bell states involving two SQUID-based charge qubits by coupling themto a nanomechanical resonator.We also show that it is possible to implement a two-qubit logic gate between the twocharge qubits by choosing carefully the interaction time. 展开更多
关键词 bell states superconducting charge qubit two-qubit logic gate nanomechanical resonator
下载PDF
Indistinguishability of orthogonal time-separated bell states
5
作者 谭勇刚 蔡庆宇 史庭云 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第9期3194-3197,共4页
This paper proves that it is impossible to identify orthogonally time-separated Bell states. If two qubits of a Bell state interact with the measurement apparatus at different time, any attempt to identify this state ... This paper proves that it is impossible to identify orthogonally time-separated Bell states. If two qubits of a Bell state interact with the measurement apparatus at different time, any attempt to identify this state will disturb it. 展开更多
关键词 bell states time-separated INDISTINGUISHABILITY
下载PDF
Perfect Quantum Teleportation via Bell States
6
作者 Xiaoqing Tan Xiaochun Li Pei Yang 《Computers, Materials & Continua》 SCIE EI 2018年第12期495-503,共9页
Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation(QT).QT... Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation(QT).QT was proposed to transmit the unknown states,in which EPR pairs,the entangled states,can be used as quantum channels.In this paper,we present two simple schemes for teleporting a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state respectively.Alice and Bob have shared an entangle state.Two Bell states are used as quantum channels.Then after Alice measuring her qubits and informing Bob her measurement results,Bob can perfectly reconstruct the original state by performing corresponding unitary operators on his qubits.It shown that a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state can be teleported perfectly,i.e.the success probabilities of our schemes are both 1. 展开更多
关键词 Quantum teleportation bell states product state pure entangled state
下载PDF
Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States
7
作者 Lili Yan Shibin Zhang +2 位作者 Yan Chang Zhibin Sun Zhiwei Sheng 《Computers, Materials & Continua》 SCIE EI 2020年第6期1297-1307,共11页
Quantum secure direct communication(QSDC)can transmit secret messages directly from one user to another without first establishing a shared secret key,which is different from quantum key distribution.In this paper,we ... Quantum secure direct communication(QSDC)can transmit secret messages directly from one user to another without first establishing a shared secret key,which is different from quantum key distribution.In this paper,we propose a novel quantum secure direct communication protocol based on signal photons and Bell states.Before the execution of the proposed protocol,two participants Alice and Bob exchange their corresponding identity IDA and IDB through quantum key distribution and keep them secret,respectively.Then the message sender,Alice,encodes each secret message bit into two single photons(|01>or|10>)or a Bell state(1|φ^(+)>=1/√2(|0>|-|1>1>)),and composes an ordered secret message sequence.To insure the security of communication,Alice also prepares the decoy photons and inserts them into secret message sequence on the basis of the values of IDA and IDB.By the secret identity IDA and IDB,both sides of the communication can check eavesdropping and identify each other.The proposed protocol not only completes secure direct communication,but also realizes the mutual authentication.The security analysis of the proposed protocol is presented in the paper.The analysis results show that this protocol is secure against some common attacks,and no secret message leaks even if the messages are broken.Compared with the two-way QSDC protocols,the presented protocol is a one-way quantum communication protocol which has the immunity to Trojan horse attack.Furthermore,our proposed protocol can be realized without quantum memory. 展开更多
关键词 Quantum secure direct communication mutual authentication bell states single photons
下载PDF
Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model
8
作者 Zhexi Zhang Zhiguo Qu 《Journal of Quantum Computing》 2019年第2期89-109,共21页
How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy prepara... How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy preparation of Bell states, a novelanti-noise quantum network coding protocol is proposed in this paper. The new protocolencodes and transmits classical information by virtue of Bell states. It can guarantee thetransparency of the intermediate nodes during information, so that the eavesdropper Evedisables to get any information even if he intercepts the transmitted quantum states. Inview of the inevitability of quantum noise in quantum channel used, this paper analyzesthe influence of four kinds of noises on the new protocol in detail further, and verifies theefficiency of the protocol under different noise by mathematical calculation and analysis.In addition, based on the detailed mathematical analysis, the protocol has functioned wellnot only on improving the efficiency of information transmission, throughput and linkutilization in the quantum network, but also on enhancing reliability and antieavesdroppingattacks. 展开更多
关键词 Network coding quantum network coding bell states butterfly networkmodel quantum communication eavesdropping detection
下载PDF
Controlled quantum teleportation with Bell states 被引量:4
9
作者 王天银 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期65-69,共5页
We propose a new scheme for controlled quantum teleportation with Bell states in which classical keys for controllers' portion are used. We also discuss the security of the proposed scheme and show that it can satisf... We propose a new scheme for controlled quantum teleportation with Bell states in which classical keys for controllers' portion are used. We also discuss the security of the proposed scheme and show that it can satisfy the requirements for controlled quantum teleportation. The comparison between this scheme and the previous ones shows that it is more economical and efficient. 展开更多
关键词 CONTROLLED TELEPORTATION bell state
下载PDF
New controlled quantum key agreement protocols based on Bell states 被引量:1
10
作者 He Yefeng Yue Yuru +3 位作者 Li Guoqing Liu Jixiang Di Man Pang Yibo 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2022年第4期42-50,共9页
The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols a... The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols are mostly two-party or three-party,and they do not entirely meet the actual needs.To address this problem,this paper proposes new CQKA protocols based on Bell states and Bell measurements.The new CQKA protocols can be successfully implemented for any N-party,not just two-party.Furthermore,the security and efficiency analyses demonstrate that the new CQKA protocols are not only secure but also more efficient in terms of quantum bit. 展开更多
关键词 quantum cryptography quantum key agreement controlled quantum key agreement bell states CONTROLLER
原文传递
Generation and dynamic manipulation of frequency degenerate polarization entangled Bell states by a silicon quantum photonic circuit 被引量:1
11
作者 Dong-Ning Liu Jing-Yuan Zheng +5 位作者 Ling-Jie Yu Xue Feng Fang Liu Kai-Yu Cui Yi-Dong Huang Wei Zhang 《Chip》 2022年第1期1-7,共7页
A silicon quantum photonic circuit was proposed and realized for the generation and the dynamic manipulation of telecom-band frequency-degenerate polarization entangled Bell states.Frequency degenerate biphoton states... A silicon quantum photonic circuit was proposed and realized for the generation and the dynamic manipulation of telecom-band frequency-degenerate polarization entangled Bell states.Frequency degenerate biphoton states were generated in four silicon waveguides by spontaneous four wave mixing.They were transformed to polar-ization entangled Bell states through on-chip quantum interference and quantum superposition,and then coupled to optical fibers.The property of polarization entanglement in generated photon pairs was demonstrated by two-photon interference under two non-orthogonal polarization bases.The output state could be dynamically switched between two Bell states,which was demonstrated by the simplified Bell state measurement.The experiment results indicated that the manipulation speed supported a modulation rate of several tens kHz,showing its potential on applications of quantum communication and quantum information processing requiring Bell state encoding and dynamic control. 展开更多
关键词 Quantum information processing Silicon quantum photonic circuits Spontaneous four wave mixing Quantum interference bell states
原文传递
Deterministic and complete hyperentangled Bell states analysis assisted by frequency and time interval degrees of freedom
12
作者 Xin-Jie Zhou Wen-Qiang Liu +2 位作者 Hai-Rui Wei Yan-Bei Zheng Fang-Fang Du 《Frontiers of physics》 SCIE CSCD 2022年第5期149-157,共9页
Hyperentangled Bell states analysis(HBSA)is an essential building block for certain hyper-parallel quantum information processing.We propose a complete and deterministic HBSA scheme encoded in spatial and polarization... Hyperentangled Bell states analysis(HBSA)is an essential building block for certain hyper-parallel quantum information processing.We propose a complete and deterministic HBSA scheme encoded in spatial and polarization degrees of freedom(DOFs)of two-photon system assisted by a fixed frequency-based entanglement and a time interval DOF.The parity information the spatial-based and polarization-based hyper-entanglement can be distinguished by the distinct time intervals of the photon pairs,and the phase information can be distinguished by the detection signature.Compared with previous schemes,the number of the auxiliary entanglements is reduced from two to one by introducing time interval DOF.Moreover,the additional frequency and time interval DOFs suffer less from the collective channel noise. 展开更多
关键词 hyperentangled bell states analysis multiple degrees of freedom time interval
原文传递
A Novel Semi-Quantum Private Comparison Scheme Using Bell Entangle States
13
作者 Yuhua Sun Lili Yan +2 位作者 Zhibin Sun Shibin Zhang Jiazhong Lu 《Computers, Materials & Continua》 SCIE EI 2021年第3期2385-2395,共11页
Private comparison is the basis of many encryption technologies,and several related Quantum Private Comparison(QPC)protocols have been published in recent years.In these existing protocols,secret information is encode... Private comparison is the basis of many encryption technologies,and several related Quantum Private Comparison(QPC)protocols have been published in recent years.In these existing protocols,secret information is encoded by using conjugate coding or orthogonal states,and all users are quantum participants.In this paper,a novel semi-quantum private comparison scheme is proposed,which employs Bell entangled states as quantum resources.Two semi-quantum participants compare the equivalence of their private information with the help of a semi-honest third party(TP).Compared with the previous classical protocols,these two semi-quantum users can only make some particular action,such as to measure,prepare and reflect quantum qubits only in the classical basis fj0i;j1ig,and TP needs to perform Bell basis measurement on reflecting qubits to obtain the results of the comparison.Further,analysis results show that this scheme can avoid outside and participant attacks and its’qubit efficiency is better than the other two protocols mentioned in the paper. 展开更多
关键词 CRYPTOGRAPHY bell entangled states a semi-honest TP security analysis semi-quantum private comparison
下载PDF
Quantum Oblivious Transfer with Reusable Bell State
14
作者 Shu-Yu Kuo Kuo-Chun Tseng +1 位作者 Yao-Hsin Chou Fan-Hsun Tseng 《Computers, Materials & Continua》 SCIE EI 2023年第1期915-932,共18页
In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contra... In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time. 展开更多
关键词 Quantum cryptography information security quantum oblivious transfer bell State
下载PDF
Controlled Teleportation of an Arbitrary Multi-Qudit State in a General Form with d-Dimensional Greenberger-Horne-Zeilinger States 被引量:13
15
作者 李熙涵 邓富国 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第5期1151-1153,共3页
A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m ... A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efticiency for qudits in this scheme approaches 100% in principle. 展开更多
关键词 QUANTUM INFORMATION ENTANGLED states 2-PARTICLE STATE bell states NETWORK
下载PDF
Cryptanalysis and improvement of a quantum secret sharing scheme based on χ-type entangled states 被引量:1
16
作者 朱珍超 张玉清 付安民 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第1期1-5,共5页
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is... In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement. 展开更多
关键词 quantum secret sharing quantum entanglement bell state nonorthogonal base
下载PDF
Efficient quantum secret sharing scheme with two-particle entangled states
17
作者 朱珍超 张玉清 付安民 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期59-64,共6页
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ... This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. 展开更多
关键词 quantum secret sharing quantum entanglement bell state nonorthogonal base
下载PDF
On Topics in Quantum Games
18
作者 Yshai Avishai 《Journal of Quantum Information Science》 2023年第3期79-130,共52页
This work concentrates on simultaneous move non-cooperating quantum games. Part of it is evidently not new, but it is included for the sake self consistence, as it is devoted to introduction of the mathematical and ph... This work concentrates on simultaneous move non-cooperating quantum games. Part of it is evidently not new, but it is included for the sake self consistence, as it is devoted to introduction of the mathematical and physical grounds of the pertinent topics, and the way in which a simple classical game is modified to become a quantum game (a procedure referred to as a quantization of a classical game). The connection between game theory and information science is briefly stressed, and the role of quantum entanglement (that plays a central role in the theory of quantum games), is exposed. Armed with these tools, we investigate some basic concepts like the existence (or absence) of a pure strategy and mixed strategy Nash equilibrium and its relation with the degree of entanglement. The main results of this work are as follows: 1) Construction of a numerical algorithm based on the method of best response functions, designed to search for pure strategy Nash equilibrium in quantum games. The formalism is based on the discretization of a continuous variable into a mesh of points, and can be applied to quantum games that are built upon two-players two-strategies classical games, based on the method of best response functions. 2) Application of this algorithm to study the question of how the existence of pure strategy Nash equilibrium is related to the degree of entanglement (specified by a continuous parameter γ ). It is shown that when the classical game G<sub>C</sub> has a pure strategy Nash equilibrium that is not Pareto efficient, then the quantum game G<sub>Q</sub> with maximal entanglement (γ = π/2) has no pure strategy Nash equilibrium. By studying a non-symmetric prisoner dilemma game, it is found that there is a critical value 0γ<sub>c</sub> such that for γγ<sub>c</sub> there is a pure strategy Nash equilibrium and for γ≥γ<sub>c </sub>there is no pure strategy Nash equilibrium. The behavior of the two payoffs as function of γ starts at that of the classical ones at (D, D) and approaches the cooperative classical ones at (C, C) (C = confess, D = don’t confess). 3) We then study Bayesian quantum games and show that under certain conditions, there is a pure strategy Nash equilibrium in such games even when entanglement is maximal. 4) We define the basic ingredients of a quantum game based on a two-player three strategies classical game. This requires the introduction of trits (instead of bits) and quantum trits (instead of quantum bits). It is proved that in this quantum game, there is no classical commensurability in the sense that the classical strategies are not obtained as a special case of the quantum strategies. 展开更多
关键词 Two-Players Two Strategies Quantum Game and SU(2) Strategies Relevance of Entanglement and bell states Nash Equilibrium and Its Relation to Entanglement in Pure and Mixed Strategy Quantum Games Nash Equilibrium and Partial Entanglement Nash Equilibrium Despite Maximal Entanglement Two Players Three Strategies Quantum Games: Qutrits and SU(3) Strategies
下载PDF
Quantum homomorphic broadcast multi-signature based on homomorphic aggregation 被引量:1
19
作者 徐鑫 殷爱菡 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期254-261,共8页
Quantum multi-signature has attracted extensive attention since it was put forward.Beside its own improvement,related research is often combined with other quantum signature.However,this type of quantum signature has ... Quantum multi-signature has attracted extensive attention since it was put forward.Beside its own improvement,related research is often combined with other quantum signature.However,this type of quantum signature has one thing in common,that is,the generation and verification of signature depend heavily on the shared classical secret key.In order to increase the reliability of signature,the homomorphic aggregation technique is applied to quantum multi-signature,and then we propose a quantum homomorphic multi-signature protocol.Unlike previous quantum multi-signature protocols,this protocol utilizes homomorphic properties to complete signature generation and verification.In the signature generation phase,entanglement swapping is introduced,so that the individual signatures of multiple users are aggregated into a new multi-signature.The original quantum state is signed by the shared secret key to realize the verification of the signature in the verification phase.The signature process satisfies the homomorphic property,which can improve the reliability of the signature. 展开更多
关键词 quantum signature homomorphic aggregation homomorphic multi-signature bell state
下载PDF
An Implementation of a Positive Operator Valued Measure
20
作者 闫凤利 高亭 李有成 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第2期322-325,共4页
We present an implementation of the positive operator valued measure (POVM). By using this POVM, one can realize the probabilistic teleportation of an unknown two-particle state.
关键词 SECURE DIRECT COMMUNICATION SWAPPING QUANTUM ENTANGLEMENT PODOLSKY-ROSENCHANNELS PROBABILISTIC TELEPORTATION 2-PARTICLE STATE bell states EPR PAIRS SCHEME
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部