期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A secure identification system using coherent states 被引量:3
1
作者 何广强 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第2期371-374,共4页
A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed i... A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed into an arbitrary elliptical polarization state, To verify the identity of a communicator, a reverse procedure is performed by the receiver, For simply describing the transformation procedure, the analytical methods of Poincaré sphere and quaternion are adopted. Since quantum noise provides such a measurement uncertainty for the eavesdropping that the identity information cannot be retrieved from the elliptical polarization state, the proposed scheme is secure. 展开更多
关键词 quantum identification polarization encryption and decryption quantum noise Poincaré sphere
下载PDF
Cancelable remote quantum fingerprint templates protection scheme
2
作者 廖骎 郭迎 黄端 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第9期39-47,共9页
With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological tech... With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit(qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantum mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users' information for the fingerprint identification. 展开更多
关键词 quantum communication fingerprint identification cancelable template
下载PDF
Quantum state tomography from observable time traces in closed quantum systems
3
作者 Shuixin Xiao Yuanlong Wang +3 位作者 Qi Yu Jun Zhang Daoyi Dong Ian R.Petersen 《Control Theory and Technology》 EI CSCD 2024年第2期222-234,共13页
The task to estimate all the parameters of an unknown quantum state, also called quantum state tomography, is essential for characterizing and controlling quantum systems. In this paper, we utilize observable time tra... The task to estimate all the parameters of an unknown quantum state, also called quantum state tomography, is essential for characterizing and controlling quantum systems. In this paper, we utilize observable time traces to identify the initial quantum state of a closed quantum system, based on the state space approach in the control theory. In the informationally complete scenario, we show that with a linear regression estimation (LRE), the mean squared error (MSE) scales as , where N is the resource number. In the informationally incomplete scenario, we introduce regularization LRE to perform the state tomography task. We employ PBH test to demonstrate that closed quantum systems with only one observable are informationally incomplete and propose using observables, where d is the dimension of the quantum state, for informational completeness. Numerical examples demonstrate the effectiveness of our method. 展开更多
关键词 quantum state tomography Time trace quantum system identification
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部