理学 >>> 物理学 >>> 理论物理学 >>> 数学物理 电磁场理论 经典场论 相对论与引力场 量子力学 统计物理学 理论物理学其他学科
搜索结果: 1-15 共查到理论物理学 key相关记录23条 . 查询时间(0.281 秒)
Eun-Ah Kim, professor of physics in the College of Arts and Sciences, and Google researchers report the first demonstration of two-dimensional particles, called non-Abelian anyons, that are the key in...
Comment on "Semiquantum-key distribution using less than four quantum states".
We calculate an achievable secret key rate for quantum key distribution with a finite number of signals, by evaluating the min-entropy explicitly. The min-entropy can be expressed in terms of the gues...
We address continuous variable quantum key distribution (QKD) in non-Markovian lossy channels and show how the non-Markovian features may be exploited to enhance security and/or to detect the presence...
We deterministically crack the secure, statistical key exchange protocol based on feedback proposed by Pao-Lo Liu [ J. Lightwave Techology 27 (2009) pp. 5230-34]. The crack is ultimate and absolute be...
Recently Boyer and Mor pointed out the first conclusion of Lemma 1 in our original paper is not correct, and therefore, the proof of Theorem 5 based on Lemma 1 is wrong. Furthermore, they gave a direc...
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate parties do not know (or trust) the exact specification of their apparatus. We show how secure key ...
Device-independent quantum key distribution aims to provide key distribution schemes whose security is based on the laws of quantum physics but which does not require any assumptions about the intern...
We propose and experimentally investigate a fibre-based quantum key distribution system, which employs polarization qubits encoded into faint laser pulses. As a novel feature, it allows sending of cla...
We investigate a quantum key distribution (QKD) scheme which utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a mor...
Every security analysis of quantum key distribution (QKD) relies on a faithful modeling of the employed quantum states. Many photon sources, like for instance a parametric down conversion (PDC) source...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signal...
Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In...
Reconciliation is an essential part of any secret-key agreement protocol and hence of a Quantum Key Distribution (QKD) protocol, where two legitimate parties are given correlated data and want to agre...
2007Vol.47No.3pp.459-463DOI: Deterministic Quantum Key Distribution Using Two Non-orthogonal Entangled States GUO Ying1,2 and ZENG Gui-Hua2 1 Department of Communication...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...