搜索结果: 1-9 共查到“信息光学 Quantum”相关记录9条 . 查询时间(0.31 秒)
Position-Based Quantum Cryptography: Impossibility and Constructions
Quantum Cryptography Impossibility Constructions
2010/10/19
In this work, we study position-based cryptography in the quantum setting. The aim is to use the geographical position of a party as its only credential. On the negative side, we show that if adversar...
Thermal blinding of gated detectors in quantum cryptography
Thermal blinding gated detectors quantum cryptography
2010/10/19
It has previously been shown that the gated detectors of two commercially available quantum key
distribution (QKD) systems are blindable and controllable by an eavesdropper using continuouswave illum...
On the Existence of Loss-Tolerant Quantum Oblivious Transfer Protocols
Existence Loss-Tolerant Quantum Oblivious Transfer Protocols
2010/10/20
Oblivious Transfer is the cryptographic primitive where Alice sends one of two bits to Bob but is oblivious to the bit received. Using quantum communication we can build oblivious transfer protocols w...
Limits on Preserving Quantum Coherence using Multi-Pulse Control
Limits Preserving Quantum Coherence Multi-Pulse Control
2010/10/19
We explore the physical limits of pulsed dynamical decoupling methods for decoherence control
as determined by finite timing resources. By focusing on a decohering qubit controlled by arbitrary seque...
nse-Coding Attack on Three-Party Quantum Key Distribution Protocols
nse-Coding Attack Three-Party Quantum Key Distribution Protocols
2010/10/19
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key d...
Criteria excluding full separability of multi-qubit quantum states
Criteria excluding full separability multi-qubit quantum states
2010/10/20
We introduce a criterion to exclude full separability of quantum states. We present numerical evidence that the criterion is necessary and sufficient for the class of GHZ diagonal three-qubit states a...
Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing
Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing
2010/10/21
In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the HBB scheme presented by Hillery, Buˇzek and Berthiaume [Phys. Rev A 59, 1829 (1999)]. We ...
Information theory of quantum systems with some hydrogenic applications
information theory quantummechanics Fisher information Shannon entropy Cramér-Rao complexity LMC complexity Fisher-Shannon complexity hydrogenic systems
2010/10/20
The information-theoretic representation of quantum systems, which complements the
familiar energy description of the density-functional and wave-function-based theories, is here discussed.According ...
We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanch...