Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doub...Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD. An interesting question is whether the transmission distance can be extended further. In this work, we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD. Our numerical results show that the secure transmission distances are increased by about 12kin and 8 km when the 1 13 and the 2 B steps are implemented, respectively.展开更多
This paper describes the DFH-2A communications satellite which is the second generation of Chinese domestic communications satellites.From March 7,1988 to December 28,1991,China launched 4 DFH-2A satellites.They have ...This paper describes the DFH-2A communications satellite which is the second generation of Chinese domestic communications satellites.From March 7,1988 to December 28,1991,China launched 4 DFH-2A satellites.They have been used for CCTV’s and local TV’s programs transmission,domestic communications and broadcasting to foreign countries.展开更多
We classify biqutrit and triqutrit pure states under stochastic local operations and classical communication. By investigating the right singular vector spaces of the coefticient matrices of the states, we obtain expl...We classify biqutrit and triqutrit pure states under stochastic local operations and classical communication. By investigating the right singular vector spaces of the coefticient matrices of the states, we obtain explicitly two equivalent classes of biqutrit states and twelve equivalent classes of triqutrit states respectively.展开更多
The simplified four-qubit cluster state (i.e., (|0000〉 + |0011〉 + |1100〉 -|1111〉)/2) is explored for splitting an arbitrary single-qubit quantum information (QI). Various feasible distributions of the ...The simplified four-qubit cluster state (i.e., (|0000〉 + |0011〉 + |1100〉 -|1111〉)/2) is explored for splitting an arbitrary single-qubit quantum information (QI). Various feasible distributions of the four qubits among the Q,I sender and receivers for tri-splitting or hi-splitting are found out. For the distribution representations the corresponding splitting schemes and their LOCCs (local operation and classical communication) are presented amply while others are mentioned concisely.展开更多
The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its...The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its longer secure transmission distance and more convenient operation design. In this paper, we first improve the protocol with the aid of local operation and two-way classical communication (2-LOCC). After our modifications, the secure transmission distance is increased by about 20 km, which will make the protocol more practicable.展开更多
Objective To investigate the procedure via pterional-orbital approach for cranio-orbital communicating tumors. Methods 13 patients with cranio-orbital communicating tumors were retrospectively analyzed. Pterional appr...Objective To investigate the procedure via pterional-orbital approach for cranio-orbital communicating tumors. Methods 13 patients with cranio-orbital communicating tumors were retrospectively analyzed. Pterional approach was adopted for the operations with resection of orbital roof,and the surgical advantages and cautions were concerned. Results In 13 patients,10 cases展开更多
In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme who...In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme whose messages are hidden in the entanglement correlation), "HIAO"(The scheme whose messages are hidden with the assistant operations) and "HIMB"(The scheme whose messages are hidden in the selected measurement basis), have been presented to share the single-qubit operations determinately on target states in a remote node. These schemes only require Bell states as quantum resources. Therefore, they can be directly applied in quantum networks, since Bell states are considered the basic quantum channels in quantum networks. Furthermore, after analyse on the security and resource consumptions, the task of QOS can be achieved securely and effectively in these schemes.展开更多
基金Supported by the National Natural Science Foundation of China under Grant No 61378011the Program for Science and Technology Innovation Research Team in University of Henan Province under Grant No 13IRTSTHN020
文摘Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD. An interesting question is whether the transmission distance can be extended further. In this work, we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD. Our numerical results show that the secure transmission distances are increased by about 12kin and 8 km when the 1 13 and the 2 B steps are implemented, respectively.
文摘This paper describes the DFH-2A communications satellite which is the second generation of Chinese domestic communications satellites.From March 7,1988 to December 28,1991,China launched 4 DFH-2A satellites.They have been used for CCTV’s and local TV’s programs transmission,domestic communications and broadcasting to foreign countries.
文摘We classify biqutrit and triqutrit pure states under stochastic local operations and classical communication. By investigating the right singular vector spaces of the coefticient matrices of the states, we obtain explicitly two equivalent classes of biqutrit states and twelve equivalent classes of triqutrit states respectively.
基金Supported by the Program for New Century Excellent Talents at the University of China under Grant No.NCET-06-0554the National Natural Science Foundation of China under Grant Nos.10975001,60677001,10747146,and 10874122+3 种基金the Science-technology Fund of Anhui Province for Outstanding Youth under Grant No.06042087the Key Fund of the Ministry of Education of China under Grant No.206063 the General Fund of the Educational Committee of Anhui Province under Grant No.2006KJ260Bthe Natural Science Foundation of Guangdong Province under Grant Nos.06300345 and 7007806
文摘The simplified four-qubit cluster state (i.e., (|0000〉 + |0011〉 + |1100〉 -|1111〉)/2) is explored for splitting an arbitrary single-qubit quantum information (QI). Various feasible distributions of the four qubits among the Q,I sender and receivers for tri-splitting or hi-splitting are found out. For the distribution representations the corresponding splitting schemes and their LOCCs (local operation and classical communication) are presented amply while others are mentioned concisely.
基金supported by the Young Scientists Fund of the National Natural Science Foundation of China (Grant No. 10905028/A050104)the Natural Science Foundation of Henan Province,China (Grant No. 092300410188)+1 种基金the Science Foundation of Hennan Provincial Education Department (Grant No. 2010A140010)Youth Fund of Luoyang Normal College
文摘The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its longer secure transmission distance and more convenient operation design. In this paper, we first improve the protocol with the aid of local operation and two-way classical communication (2-LOCC). After our modifications, the secure transmission distance is increased by about 20 km, which will make the protocol more practicable.
文摘Objective To investigate the procedure via pterional-orbital approach for cranio-orbital communicating tumors. Methods 13 patients with cranio-orbital communicating tumors were retrospectively analyzed. Pterional approach was adopted for the operations with resection of orbital roof,and the surgical advantages and cautions were concerned. Results In 13 patients,10 cases
基金supported by the National Natural Science Foundation of China(Grant Nos.61272057,61572081 and 61502200)Beijing Higher Education Young Elite Teacher Project(Grant Nos.YETP0475and YETP0477)+2 种基金the Natural Science Foundation of Guangdong Province(Grant No.2014A030310245)the Fundamental Research Funds for the Central Universities(Grant No.21615313)the Youth Foundation of Heilongjiang University from January,2016
文摘In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme whose messages are hidden in the entanglement correlation), "HIAO"(The scheme whose messages are hidden with the assistant operations) and "HIMB"(The scheme whose messages are hidden in the selected measurement basis), have been presented to share the single-qubit operations determinately on target states in a remote node. These schemes only require Bell states as quantum resources. Therefore, they can be directly applied in quantum networks, since Bell states are considered the basic quantum channels in quantum networks. Furthermore, after analyse on the security and resource consumptions, the task of QOS can be achieved securely and effectively in these schemes.