A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys...A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.展开更多
A simplified version of the quantum teleportation protocol is presented in here. Its experimental confirmation will have deep implications for a better understanding of Quantum Entanglement with a particular projectio...A simplified version of the quantum teleportation protocol is presented in here. Its experimental confirmation will have deep implications for a better understanding of Quantum Entanglement with a particular projection on Quantum Communications.展开更多
It seems there is a large gap between quantum cloning and classical duplication since quantum mechanics forbid perfect copies of unknown quantum states. In this paper, we prove that a classical duplication process can...It seems there is a large gap between quantum cloning and classical duplication since quantum mechanics forbid perfect copies of unknown quantum states. In this paper, we prove that a classical duplication process can be realized by using a universal quantum cloning machine(QCM). A classical bit is encoded not on a single quantum state, but on a large number of single identical quantum states. Errors are inevitable when copying these identical quantum states due to the quantum no-cloning theorem. When a small part of errors are ignored, i.e., errors as the minority are automatically corrected by the majority, the fidelity of duplicated copies of classical information will approach unity infinitely. In this way, the classical bits can be duplicated precisely with a universal QCM, which presents a natural transition from quantum cloning to classical duplication. The implement of classical duplication by using QCM shines new lights on the universality of quantum mechanics.展开更多
文摘A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.
文摘A simplified version of the quantum teleportation protocol is presented in here. Its experimental confirmation will have deep implications for a better understanding of Quantum Entanglement with a particular projection on Quantum Communications.
基金supported by the National Natural Science Foundation of China(Grant Nos.11725524,and 61471356)
文摘It seems there is a large gap between quantum cloning and classical duplication since quantum mechanics forbid perfect copies of unknown quantum states. In this paper, we prove that a classical duplication process can be realized by using a universal quantum cloning machine(QCM). A classical bit is encoded not on a single quantum state, but on a large number of single identical quantum states. Errors are inevitable when copying these identical quantum states due to the quantum no-cloning theorem. When a small part of errors are ignored, i.e., errors as the minority are automatically corrected by the majority, the fidelity of duplicated copies of classical information will approach unity infinitely. In this way, the classical bits can be duplicated precisely with a universal QCM, which presents a natural transition from quantum cloning to classical duplication. The implement of classical duplication by using QCM shines new lights on the universality of quantum mechanics.