Traditionally, in weak interaction, I<sub>3</sub>, Y and four flavour quantum numbers are not conserved but several empirical selection rules work well. Recently, it was found that, in weak interaction, th...Traditionally, in weak interaction, I<sub>3</sub>, Y and four flavour quantum numbers are not conserved but several empirical selection rules work well. Recently, it was found that, in weak interaction, there are three levels of conservation of additive quantum numbers, and fermion quantum number F is conserved in all kinds of interactions. It is known that weak interaction has three types: fermionic, pure hadronic and pure leptonic, corresponding to the first and the second level of conservation of additive quantum numbers respectively. It is demonstrated in this paper that the selection rules in all types of weak interaction can be interpreted by conservation of F, and the formula of relation between Q/e, F and F<sub>0</sub> is more general than Gell-Mann-Nishijima formula. Description of weak interaction becomes simpler, If only we take Q, F<sub>0</sub> and F, based on the conserved physical quantities.展开更多
In this paper, we analyze the enthalpy, enthalpy energy density, thermodynamic volume, and the equation of state of a modified white hole. We obtain new possible mathematical connections with some sectors of Number Th...In this paper, we analyze the enthalpy, enthalpy energy density, thermodynamic volume, and the equation of state of a modified white hole. We obtain new possible mathematical connections with some sectors of Number Theory, Ramanujan Recurring Numbers, DN Constant and String Theory, that enable us to extract the quantum geometrical properties of these thermodynamic equations and the implication to the quantum vacuum spacetime geometry of our early universe as they act as the constraints to the nature of quantum gravity of the universe.展开更多
Quantum random number generators adopting single negligible dead time of avalanche photodiodes (APDs) photon detection have been restricted due to the non- We propose a new approach based on an APD array to improve...Quantum random number generators adopting single negligible dead time of avalanche photodiodes (APDs) photon detection have been restricted due to the non- We propose a new approach based on an APD array to improve the generation rate of random numbers significantly. This method compares the detectors' responses to consecutive optical pulses and generates the random sequence. We implement a demonstration experiment to show its simplicity, compactness and scalability. The generated numbers are proved to be unbiased, post-processing free, ready to use, and their randomness is verified by using the national institute of standard technology statistical test suite. The random bit generation efficiency is as high as 32.8% and the potential generation rate adopting the 32× 32 APD array is up to tens of Gbits/s.展开更多
In this paper the evolution characteristics of the fidelity of quantum information for the V-type three-level atom interacting with number state light field in Kerr meddium are investigated. It shows that the periodic...In this paper the evolution characteristics of the fidelity of quantum information for the V-type three-level atom interacting with number state light field in Kerr meddium are investigated. It shows that the periodicity of the evolutions of fidelity of quantum information is influenced by the Kerr coefficient, the photon number of the initial field and intensity of light. The evolutions of the fidelity of quantum information are modulated by the initial number state field. The Rabi oscillation frequency and the modulation frequency of fidelity for the field and the system vary with the value of the Kerr coefficient. The evolutions of fidelity of quantum information obviously show the quantum collapse and revival behaviours in the system of atom interacting with light field.展开更多
Quantum randomness amplification protocols have increasingly attracted attention tbr their tantastic ability to ampllI~, weak randomness to almost ideal randomness by utilizing quantum systems. Recently, a realistic n...Quantum randomness amplification protocols have increasingly attracted attention tbr their tantastic ability to ampllI~, weak randomness to almost ideal randomness by utilizing quantum systems. Recently, a realistic noise-tolerant randomness amplification protocol using a finite number of untrusted devices was proposed. The protocol has the composable security against non-signalling eavesdroppers and could produce a single bit of randomness from weak randomness sources, which is certified by the violation of certain Bell inequalities. However, the protocol has a non-ignorable limitation on the min- entropy of independent sources. In this paper, we further develop the randomness amplification method and present a novel quantum randomness amplification protocol based on an explicit non-malleable two independent-source randomness extractor, which could remarkably reduce the above-mentioned specific limitation. Moreover, the composable security of our improved protocol is also proposed. Our results could significantly expand the application range for practical quantum randomness amplification, and provide a new insight on the practical design method for randomness extraction.展开更多
In GaN-based green light-emitting diodes(LEDs) with different green quantum well numbers grown on Si(111)substrates by metal organic chemical vapor deposition are investigated. It is observed that V-shaped pits ap...In GaN-based green light-emitting diodes(LEDs) with different green quantum well numbers grown on Si(111)substrates by metal organic chemical vapor deposition are investigated. It is observed that V-shaped pits appear in the AFM images with the green quantum well number increasing from 5 to 9, and results in larger reverse-bias leakage current. Meanwhile, in the case of the sample with the number from 5 to 7 then to 9, the external quantum efficiency increases firstly, and then decreases. These phenomena may be related to the size of V-shaped pits in the active area and the distribution of electrons and holes in the active area caused by V-shaped pits. The optimal number of green quantum wells is determined to be 7.展开更多
How to estimate the randomness of the measurement outcomes generated by a given device is an important issue in quantum information theory. Recently, Brunner et al. [Phys. Rev. Lett. 112 (2014)140407] proposed a pre...How to estimate the randomness of the measurement outcomes generated by a given device is an important issue in quantum information theory. Recently, Brunner et al. [Phys. Rev. Lett. 112 (2014)140407] proposed a prepare-and-measure quantum random number generation scenario with device-independent assumption, which indicates a method to test the randomness of bit strings according to the generation process rather than the results. Based on this protocol, we implement a quantum random number generator with an intrinsic stable phase-encoded quantum key distribution system. The system has been continuously running for more than 200 h, a stable witness W with the average value of 0.9752 and a standard deviation of 0.0024 are obtained. More than 1 G random bits are generated and the results pass all items of NIST test suite.展开更多
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br...The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography.展开更多
SARG04 protocol has its advantages in defending photon number splitting attack, benefited from two-photon pulses part. In this paper, we present a passive decoy state SARG04 scheme combining with practical photon numb...SARG04 protocol has its advantages in defending photon number splitting attack, benefited from two-photon pulses part. In this paper, we present a passive decoy state SARG04 scheme combining with practical photon number resolving (PNR) detectors. Two kinds of practical detectors, transition-edge sensor and time-multiplexing detector, are taken into consideration. Theoretical analysis shows that both of them are compatible with the passive decoy state SARG04. Compared with the original SARG04, two detectors can boost the key generation rate and maximal secure distance obviously. Meanwhile, the result shows that quantum efficiency and dark count of the detector influence the maximal distance slightly, which indicates the prospect of implementation in real quantum key distribution system with imperfect practical PNS detectors.展开更多
We propose an arbitrary controlled-unitary (CU) gate and a bidirectional transfer scheme of quantum information (BTQI) for unknown photons. The proposed CU gate utilizes quantum non-demolition photon-number-resolv...We propose an arbitrary controlled-unitary (CU) gate and a bidirectional transfer scheme of quantum information (BTQI) for unknown photons. The proposed CU gate utilizes quantum non-demolition photon-number-resolving measure- ment based on the weak cross-Kerr nonlinearities (XKNLs) and two quantum bus beams; the proposed CU gate consists of consecutive operations of a controlled-path gate and a gathering-path gate. It is almost deterministic and is feasible with current technology when a strong amplitude of the coherent state and weak XKNLs are employed. Compared with the existing optical multi-qubit or controlled gates, which utilize XKNLs and homodyne detectors, the proposed CU gate can increase experimental realization feasibility and enhance robustness against decoherence. According to the CU gate, we present a BTQI scheme in which the two unknown states of photons between two parties (Alice and Bob) are mutually swapped by transferring only a single photon. Consequently, by using the proposed CU gate, it is possible to experimentally implement the BTQI scheme with a certain probability of success.展开更多
The quantum phase properties of the generalized squeezed vacuum states associated with solvable quantum systems are studied by using the Pegg-Barnett formalism.Then,two nonclassical features,i.e.,squeezing in the numb...The quantum phase properties of the generalized squeezed vacuum states associated with solvable quantum systems are studied by using the Pegg-Barnett formalism.Then,two nonclassical features,i.e.,squeezing in the number and phase operators,as well as the number-phase Wigner function of the generalized squeezed states are investigated.Due to some actual physical situations,the present approach is applied to two classes of generalized squeezed states:solvable quantum systems with discrete spectra and nonlinear squeezed states with particular nonlinear functions.Finally,the time evolution of the nonclassical properties of the considered systems has been numerically investigated.展开更多
In the existing formalism of quantum states, probability amplitudes of quantum states are complex numbers. A composition of entangled quantum states, such as a Bell state, cannot be decomposed into its constituent qua...In the existing formalism of quantum states, probability amplitudes of quantum states are complex numbers. A composition of entangled quantum states, such as a Bell state, cannot be decomposed into its constituent quantum states, implying that quantum states lose their identities when they get entangled. This is contrary to the observation that a composition of entangled quantum states decays back to its constituent quantum states. To eliminate this discrepancy, this paper introduces a new type of numbers, called virtual numbers, which produce zero upon multiplication with complex numbers. In the proposed formalism of quantum states, probability amplitudes of quantum states are general numbers made of complex and virtual numbers. A composition of entangled quantum states, such as a Bell state, can then be decomposed into its constituent quantum states, implying that quantum states retain their identities when they get entangled.展开更多
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis...This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture.展开更多
For the unsorted database quantum search with the unknown fraction λ of target items, there are mainly two kinds of methods, i.e., fixed-point and trail-and-error.(i) In terms of the fixed-point method, Yoder et al. ...For the unsorted database quantum search with the unknown fraction λ of target items, there are mainly two kinds of methods, i.e., fixed-point and trail-and-error.(i) In terms of the fixed-point method, Yoder et al. [Phys. Rev. Lett.113 210501(2014)] claimed that the quadratic speedup over classical algorithms has been achieved. However, in this paper, we point out that this is not the case, because the query complexity of Yoder’s algorithm is actually in O(1/λ01/2)rather than O(1/λ1/2), where λ0 is a known lower bound of λ.(ii) In terms of the trail-and-error method, currently the algorithm without randomness has to take more than 1 times queries or iterations than the algorithm with randomly selected parameters. For the above problems, we provide the first hybrid quantum search algorithm based on the fixed-point and trail-and-error methods, where the matched multiphase Grover operations are trialed multiple times and the number of iterations increases exponentially along with the number of trials. The upper bound of expected queries as well as the optimal parameters are derived. Compared with Yoder’s algorithm, the query complexity of our algorithm indeed achieves the optimal scaling in λ for quantum search, which reconfirms the practicality of the fixed-point method. In addition, our algorithm also does not contain randomness, and compared with the existing deterministic algorithm, the query complexity can be reduced by about 1/3. Our work provides a new idea for the research on fixed-point and trial-and-error quantum search.展开更多
It is a fact that imaginary numbers do not have practical significance. But the role of imaginary numbers is very broad and enormous, due to the existence of Euler’s formula. Due to Euler’s formula, imaginary number...It is a fact that imaginary numbers do not have practical significance. But the role of imaginary numbers is very broad and enormous, due to the existence of Euler’s formula. Due to Euler’s formula, imaginary numbers have been applied in many theoretical theories. One of the biggest functions of imaginary numbers is to represent changes in phase, which is indispensable in signal analysis theory. The imaginary numbers in quantum mechanics pose a greater mystery: do the imaginary numbers really exist? This question still needs further scientific development to be answered.展开更多
文摘Traditionally, in weak interaction, I<sub>3</sub>, Y and four flavour quantum numbers are not conserved but several empirical selection rules work well. Recently, it was found that, in weak interaction, there are three levels of conservation of additive quantum numbers, and fermion quantum number F is conserved in all kinds of interactions. It is known that weak interaction has three types: fermionic, pure hadronic and pure leptonic, corresponding to the first and the second level of conservation of additive quantum numbers respectively. It is demonstrated in this paper that the selection rules in all types of weak interaction can be interpreted by conservation of F, and the formula of relation between Q/e, F and F<sub>0</sub> is more general than Gell-Mann-Nishijima formula. Description of weak interaction becomes simpler, If only we take Q, F<sub>0</sub> and F, based on the conserved physical quantities.
文摘In this paper, we analyze the enthalpy, enthalpy energy density, thermodynamic volume, and the equation of state of a modified white hole. We obtain new possible mathematical connections with some sectors of Number Theory, Ramanujan Recurring Numbers, DN Constant and String Theory, that enable us to extract the quantum geometrical properties of these thermodynamic equations and the implication to the quantum vacuum spacetime geometry of our early universe as they act as the constraints to the nature of quantum gravity of the universe.
基金Supported by the Chinese Academy of Sciences Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics,Shanghai Branch,University of Science and Technology of Chinathe National Natural Science Foundation of China under Grant No 11405172
文摘Quantum random number generators adopting single negligible dead time of avalanche photodiodes (APDs) photon detection have been restricted due to the non- We propose a new approach based on an APD array to improve the generation rate of random numbers significantly. This method compares the detectors' responses to consecutive optical pulses and generates the random sequence. We implement a demonstration experiment to show its simplicity, compactness and scalability. The generated numbers are proved to be unbiased, post-processing free, ready to use, and their randomness is verified by using the national institute of standard technology statistical test suite. The random bit generation efficiency is as high as 32.8% and the potential generation rate adopting the 32× 32 APD array is up to tens of Gbits/s.
文摘In this paper the evolution characteristics of the fidelity of quantum information for the V-type three-level atom interacting with number state light field in Kerr meddium are investigated. It shows that the periodicity of the evolutions of fidelity of quantum information is influenced by the Kerr coefficient, the photon number of the initial field and intensity of light. The evolutions of the fidelity of quantum information are modulated by the initial number state field. The Rabi oscillation frequency and the modulation frequency of fidelity for the field and the system vary with the value of the Kerr coefficient. The evolutions of fidelity of quantum information obviously show the quantum collapse and revival behaviours in the system of atom interacting with light field.
基金Project supported by the National Natural Science Foundation of China(Grant No.61775185)
文摘Quantum randomness amplification protocols have increasingly attracted attention tbr their tantastic ability to ampllI~, weak randomness to almost ideal randomness by utilizing quantum systems. Recently, a realistic noise-tolerant randomness amplification protocol using a finite number of untrusted devices was proposed. The protocol has the composable security against non-signalling eavesdroppers and could produce a single bit of randomness from weak randomness sources, which is certified by the violation of certain Bell inequalities. However, the protocol has a non-ignorable limitation on the min- entropy of independent sources. In this paper, we further develop the randomness amplification method and present a novel quantum randomness amplification protocol based on an explicit non-malleable two independent-source randomness extractor, which could remarkably reduce the above-mentioned specific limitation. Moreover, the composable security of our improved protocol is also proposed. Our results could significantly expand the application range for practical quantum randomness amplification, and provide a new insight on the practical design method for randomness extraction.
基金Supported by the National Key Research and Development Program of China under Grant No 2016YFB0400601the National Natural Science Foundation of China under Grant Nos 61704069,11674147,61604066,51602141 and 11604137
文摘In GaN-based green light-emitting diodes(LEDs) with different green quantum well numbers grown on Si(111)substrates by metal organic chemical vapor deposition are investigated. It is observed that V-shaped pits appear in the AFM images with the green quantum well number increasing from 5 to 9, and results in larger reverse-bias leakage current. Meanwhile, in the case of the sample with the number from 5 to 7 then to 9, the external quantum efficiency increases firstly, and then decreases. These phenomena may be related to the size of V-shaped pits in the active area and the distribution of electrons and holes in the active area caused by V-shaped pits. The optimal number of green quantum wells is determined to be 7.
基金Supported by the National Basic Research Program of China under Grant Nos 2011CBA00200 and 2011CB921200the National Natural Science Foundation of China under Grant Nos 61201239,61205118,11304397 and 61475148the Strategic Priority Research Program(B) of Chinese Academy of Sciences under Grant Nos XDB01030100 and XDB01030300
文摘How to estimate the randomness of the measurement outcomes generated by a given device is an important issue in quantum information theory. Recently, Brunner et al. [Phys. Rev. Lett. 112 (2014)140407] proposed a prepare-and-measure quantum random number generation scenario with device-independent assumption, which indicates a method to test the randomness of bit strings according to the generation process rather than the results. Based on this protocol, we implement a quantum random number generator with an intrinsic stable phase-encoded quantum key distribution system. The system has been continuously running for more than 200 h, a stable witness W with the average value of 0.9752 and a standard deviation of 0.0024 are obtained. More than 1 G random bits are generated and the results pass all items of NIST test suite.
文摘The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography.
基金Project supported by the National Basic Research Program of China (Grant No. 2006CB921900)the National Natural Science Foundation of China (Grant Nos. 60537020 and 60621064)the Innovation Funds of the Chinese Academy of Sciences
文摘SARG04 protocol has its advantages in defending photon number splitting attack, benefited from two-photon pulses part. In this paper, we present a passive decoy state SARG04 scheme combining with practical photon number resolving (PNR) detectors. Two kinds of practical detectors, transition-edge sensor and time-multiplexing detector, are taken into consideration. Theoretical analysis shows that both of them are compatible with the passive decoy state SARG04. Compared with the original SARG04, two detectors can boost the key generation rate and maximal secure distance obviously. Meanwhile, the result shows that quantum efficiency and dark count of the detector influence the maximal distance slightly, which indicates the prospect of implementation in real quantum key distribution system with imperfect practical PNS detectors.
文摘We propose an arbitrary controlled-unitary (CU) gate and a bidirectional transfer scheme of quantum information (BTQI) for unknown photons. The proposed CU gate utilizes quantum non-demolition photon-number-resolving measure- ment based on the weak cross-Kerr nonlinearities (XKNLs) and two quantum bus beams; the proposed CU gate consists of consecutive operations of a controlled-path gate and a gathering-path gate. It is almost deterministic and is feasible with current technology when a strong amplitude of the coherent state and weak XKNLs are employed. Compared with the existing optical multi-qubit or controlled gates, which utilize XKNLs and homodyne detectors, the proposed CU gate can increase experimental realization feasibility and enhance robustness against decoherence. According to the CU gate, we present a BTQI scheme in which the two unknown states of photons between two parties (Alice and Bob) are mutually swapped by transferring only a single photon. Consequently, by using the proposed CU gate, it is possible to experimentally implement the BTQI scheme with a certain probability of success.
文摘The quantum phase properties of the generalized squeezed vacuum states associated with solvable quantum systems are studied by using the Pegg-Barnett formalism.Then,two nonclassical features,i.e.,squeezing in the number and phase operators,as well as the number-phase Wigner function of the generalized squeezed states are investigated.Due to some actual physical situations,the present approach is applied to two classes of generalized squeezed states:solvable quantum systems with discrete spectra and nonlinear squeezed states with particular nonlinear functions.Finally,the time evolution of the nonclassical properties of the considered systems has been numerically investigated.
文摘In the existing formalism of quantum states, probability amplitudes of quantum states are complex numbers. A composition of entangled quantum states, such as a Bell state, cannot be decomposed into its constituent quantum states, implying that quantum states lose their identities when they get entangled. This is contrary to the observation that a composition of entangled quantum states decays back to its constituent quantum states. To eliminate this discrepancy, this paper introduces a new type of numbers, called virtual numbers, which produce zero upon multiplication with complex numbers. In the proposed formalism of quantum states, probability amplitudes of quantum states are general numbers made of complex and virtual numbers. A composition of entangled quantum states, such as a Bell state, can then be decomposed into its constituent quantum states, implying that quantum states retain their identities when they get entangled.
文摘This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11504430 and 61502526)the National Basic Research Program of China(Grant No.2013CB338002)
文摘For the unsorted database quantum search with the unknown fraction λ of target items, there are mainly two kinds of methods, i.e., fixed-point and trail-and-error.(i) In terms of the fixed-point method, Yoder et al. [Phys. Rev. Lett.113 210501(2014)] claimed that the quadratic speedup over classical algorithms has been achieved. However, in this paper, we point out that this is not the case, because the query complexity of Yoder’s algorithm is actually in O(1/λ01/2)rather than O(1/λ1/2), where λ0 is a known lower bound of λ.(ii) In terms of the trail-and-error method, currently the algorithm without randomness has to take more than 1 times queries or iterations than the algorithm with randomly selected parameters. For the above problems, we provide the first hybrid quantum search algorithm based on the fixed-point and trail-and-error methods, where the matched multiphase Grover operations are trialed multiple times and the number of iterations increases exponentially along with the number of trials. The upper bound of expected queries as well as the optimal parameters are derived. Compared with Yoder’s algorithm, the query complexity of our algorithm indeed achieves the optimal scaling in λ for quantum search, which reconfirms the practicality of the fixed-point method. In addition, our algorithm also does not contain randomness, and compared with the existing deterministic algorithm, the query complexity can be reduced by about 1/3. Our work provides a new idea for the research on fixed-point and trial-and-error quantum search.
文摘It is a fact that imaginary numbers do not have practical significance. But the role of imaginary numbers is very broad and enormous, due to the existence of Euler’s formula. Due to Euler’s formula, imaginary numbers have been applied in many theoretical theories. One of the biggest functions of imaginary numbers is to represent changes in phase, which is indispensable in signal analysis theory. The imaginary numbers in quantum mechanics pose a greater mystery: do the imaginary numbers really exist? This question still needs further scientific development to be answered.