搜索结果: 91-105 共查到“信息光学”相关记录194条 . 查询时间(3.808 秒)
Position-Based Quantum Cryptography: Impossibility and Constructions
Quantum Cryptography Impossibility Constructions
2010/10/19
In this work, we study position-based cryptography in the quantum setting. The aim is to use the geographical position of a party as its only credential. On the negative side, we show that if adversar...
A qubit strongly-coupled to a resonant cavity: asymmetry of the spontaneous emission spectrum beyond the rotating wave approximation
spontaneous emission spectrum vacuum Rabi splitting qubit strongly-coupled to a cavity
2010/10/20
We investigate the spontaneous emission spectrum of a qubit in a lossy resonant cavity. We
use neither the rotating-wave approximation nor the Markov approximation. The qubit-cavity
coupling strengt...
Qubit Entanglement Dephasing Dynamics Driven by a Bath of Spins
Qubit Entanglement Dephasing Dynamics Driven Bath of Spins
2010/10/19
We study the entanglement dynamics for a two-spin system coupled to a spin environment of
different configurations by z-x type interaction. The models considered in this paper are solved both analyti...
Thermal blinding of gated detectors in quantum cryptography
Thermal blinding gated detectors quantum cryptography
2010/10/19
It has previously been shown that the gated detectors of two commercially available quantum key
distribution (QKD) systems are blindable and controllable by an eavesdropper using continuouswave illum...
On the Existence of Loss-Tolerant Quantum Oblivious Transfer Protocols
Existence Loss-Tolerant Quantum Oblivious Transfer Protocols
2010/10/20
Oblivious Transfer is the cryptographic primitive where Alice sends one of two bits to Bob but is oblivious to the bit received. Using quantum communication we can build oblivious transfer protocols w...
Limits on Preserving Quantum Coherence using Multi-Pulse Control
Limits Preserving Quantum Coherence Multi-Pulse Control
2010/10/19
We explore the physical limits of pulsed dynamical decoupling methods for decoherence control
as determined by finite timing resources. By focusing on a decohering qubit controlled by arbitrary seque...
Qubit-oscillator system under ultrastrong coupling and extreme driving
Qubit-oscillator system ultrastrong coupling extreme driving
2010/10/19
We introduce a novel approach to study a driven qubit-oscillator system in the ultrastrong coupling regime, where the ratio g/ between coupling strength and oscillator frequency approaches unity or go...
nse-Coding Attack on Three-Party Quantum Key Distribution Protocols
nse-Coding Attack Three-Party Quantum Key Distribution Protocols
2010/10/19
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key d...
In any static spacetime the quasilocal Tolman mass contained within a volume can be reduced to a Gauss-like surface integral involving the flux of a suitably defined generalized surface gravity. By in...
Criteria excluding full separability of multi-qubit quantum states
Criteria excluding full separability multi-qubit quantum states
2010/10/20
We introduce a criterion to exclude full separability of quantum states. We present numerical evidence that the criterion is necessary and sufficient for the class of GHZ diagonal three-qubit states a...
Ultralong Efficient Photon Storage Using Optical Locking
Ultralong Efficient Photon Storage Optical Locking
2010/10/18
For the last decade quantum memories have been intensively studied for potential applications to quantum information and communications using atomic and ionic ensembles. With the importance of a multi...
Beating the channel capacity limit for linear photonic superdense coding
channel capacity limit linear photonic superdense coding
2010/10/21
Dense coding is arguably the protocol that launched the field of quantum communication [1]. Today,however, more than a decade after its initial experimental realization [2], the channel capacity remai...
Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing
Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing
2010/10/21
In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the HBB scheme presented by Hillery, Buˇzek and Berthiaume [Phys. Rev A 59, 1829 (1999)]. We ...
Information theory of quantum systems with some hydrogenic applications
information theory quantummechanics Fisher information Shannon entropy Cramér-Rao complexity LMC complexity Fisher-Shannon complexity hydrogenic systems
2010/10/20
The information-theoretic representation of quantum systems, which complements the
familiar energy description of the density-functional and wave-function-based theories, is here discussed.According ...
We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanch...