欢迎登录材料期刊网

材料期刊网

高级检索

提出一个基于单光子偏振的量子密钥分配方案.在这个方案里, Alice首先制备一串任意单光子态,然后发送给Bob.Bob只需对其进行一个U操作,再发回Alice.最后Alice对单光子态进行测量,即可实现量子密钥分配.此方案需要一个无噪声信道,优点在于仅仅需要单光子态,以及局域操作和单光子偏振态的测量,这些都非常易于实现.最后其安全性也是有理论保证的.

A quantum key distribution scheme based on single-photon polarization encoding was presented. In the protocol, Alice first sends string photons to Bob at random states of four singlephoton states. Bob then does a unitary operation on it, sends it back to Alice and then a single photon is measured by Alice at last. The quantum key distribution is accomplished. The protocol needs a noiseless subspaces or subsystems. And the advantage is that it only needs single-photon states, local operations and polarization measurement. The security is garanteed theoretically.

参考文献

[1] Bennett C H,Brassard G.in Proce.of IEEE International Conference on Computers,Systems and Signal Processing[C].Bangalore,India IEEE,New York,1984,175.
[2] Ekert A K.Quantum cryptography based on Bell's theorem[J].Phys.Rev.Lett.,1991,67:661.
[3] Bennett C H.Quantum cryptography using any two nonorthogonal states[J].Phys.Rev.Left.,1992,68:3121.
[4] Bennett C H,et al.Communication via one-and two-particle operators on Einstein-Podolsky-Rosen states[J].Phys.Rev.Left.,1992,69:2881,
[5] Goldenberg L,Vaidman L.Quantum cryptography based on orthogonal states[J].Phys.Rev.Left.,1995,75:1239.
[6] Huttner B,Imoto N,Gisin N,et al.Quantum cryptography with coherent states[J].Phys.Rev.A,1995,51:1863.
[7] Koashi M,Imoto N.Quantum cryptography based on split transmission of one-bit information in two steps[J].Phys.Rev.LeTt.,1997,79:2383.
[8] BruB D.Optimal eavesdropping in quantum cryptography with six states[3].Phys.Rev.Left.,1998,81:3018.
[9] Long G L,Lin X S.Theoretically efficient high-capacity quantum-key-distribution scheme[J].Phys.Rev.A,2002,65:032302.
[10] Xue P,Li C F,Guo G C.Conditional efficient multiuser quantum cryptography network[3].Phys.Rev.A,2002,65:022317.
[11] Deng F G,Long G L.Secure direct communication with a quantum one-time pad[3].Phys.Rev.A,2004,69:052319.
[12] Wang C,Deng F G,Li Y S,Liu X S,et al.Quantum secure direct communication with high-dimension quantum superdense coding[J].Phys.Rev.A,2005,71:044305.
[13] Zhu Aidong,Zhang Shou.Quantum key distribution and controlled quantum direct communication applying product state of qutrit[3].Chinese Journal of Quantum Electronics (量子电子学报),2007,24(3):316-322 (in Chinese).
[14] Piao Guangchun,Zhang Shou.Controlled quantum dialogue based on W state[J].Chinese Journal of Quantum Electronics (量子电子学报),2007,24(3):311-315 (in Chinese).
[15] Bostr(o)m K,Felbinger T.Deterministic secure direct communication using entanglement[3].Phys.Rev.Left.,2002,89:187902.
[16] W'ojcik A.Eavesdropping on the " Ping-Pong " quantum communication protocol[3].Phys.Rev.Lett.,2003,90:157901.
[17] Cai Q Y.The " Ping-Pong " protocol can be attacked without eavesdropping[3].Phys.Rev.Lett.,2003,91:109801.
[18] Zhang Z J,Man Z X,Li Y.The improved bostrom-felbinger protocol against attacks without eavesdropping[J].Int.J.Quant.Inform.,2004,2:521.
[19] Gao M,Liang L M,Li C Z,et al.Robust quantum key distribution with two-photon polarization states[J].Phys.Lett.A,2006,359:126-128.
[20] Li Shujing,Wang Bo,Yang Xudong,et aL Controlled polarization rotation of an optical field in multi-Zeemansublevel atoms[3].Phys.Rev.A,2006,74:033821.
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%