735 research outputs found

    A Two-Step Quantum Direct Communication Protocol Using Einstein-Podolsky-Rosen Pair Block

    Full text link
    A protocol for quantum secure direct communication using blocks of EPR pairs is proposed. A set of ordered NN EPR pairs is used as a data block for sending secret message directly. The ordered NN EPR set is divided into two particle sequences, a checking sequence and a message-coding sequence. After transmitting the checking sequence, the two parties of communication check eavesdropping by measuring a fraction of particles randomly chosen, with random choice of two sets of measuring bases. After insuring the security of the quantum channel, the sender, Alice encodes the secret message directly on the message-coding sequence and send them to Bob. By combining the checking and message-coding sequences together, Bob is able to read out the encoded messages directly. The scheme is secure because an eavesdropper cannot get both sequences simultaneously. We also discuss issues in a noisy channel.Comment: 8 pages and 2 figures. To appear in Phys Rev

    Shock Diffraction by Convex Cornered Wedges for the Nonlinear Wave System

    Full text link
    We are concerned with rigorous mathematical analysis of shock diffraction by two-dimensional convex cornered wedges in compressible fluid flow governed by the nonlinear wave system. This shock diffraction problem can be formulated as a boundary value problem for second-order nonlinear partial differential equations of mixed elliptic-hyperbolic type in an unbounded domain. It can be further reformulated as a free boundary problem for nonlinear degenerate elliptic equations of second order. We establish a first global theory of existence and regularity for this shock diffraction problem. In particular, we establish that the optimal regularity for the solution is C0,1C^{0,1} across the degenerate sonic boundary. To achieve this, we develop several mathematical ideas and techniques, which are also useful for other related problems involving similar analytical difficulties.Comment: 50 pages;7 figure

    Controlled order rearrangement encryption for quantum key distribution

    Full text link
    A novel technique is devised to perform orthogonal state quantum key distribution. In this scheme, entangled parts of a quantum information carrier are sent from Alice to Bob through two quantum channels. However before the transmission, the orders of the quantum information carrier in one channel is reordered so that Eve can not steal useful information. At the receiver's end, the order of the quantum information carrier is restored. The order rearrangement operation in both parties is controlled by a prior shared control key which is used repeatedly in a quantum key distribution session.Comment: 5 pages and 2 figure

    A New Iron Pnictide Oxide (Fe2As2)(Ca5(Mg,Ti)4Oy) and a New Phase in Fe-As-Ca-Mg-Ti-O system

    Full text link
    A new layered iron arsenide oxide (Fe2As2)(Ca5(Mg,Ti)4Oy) and its structural derivative were found in the Fe-As-Ca-Mg-Ti-O system. The crystal structure of (Fe2As2)(Ca5(Mg,Ti)4Oy) is identical to that of (Fe2As2)(Ca5(Sc,Ti)4Oy), which was reported in our previous study. The lattice constants of this compound are a = 3.86(4) A and c = 41.05(2) A. In addition, another phase with a thicker blocking layer was found. The structure of the compound and its derivative was tentatively assigned through STEM observation as (Fe2As2)(Ca8(Mg,Ti)6Oy) with sextuple perovskite-type sheets divided by a rock salt layer. The interlayer Fe-Fe distance of this compound is ~30 A. The compound and its derivative exhibited bulk superconductivity, as found from magnetization and resistivity measurements.Comment: 9 pages, 7 figure

    Full-length sequence analysis of a distinct isolate of Bidens mottle virus infecting sunflower in Taiwan

    Get PDF
    The full-length genome of a potyvirus, previously known as sunflower chlorotic spot virus isolate SF-1 (SCSV-SF-1) which causes novel symptoms on sunflowers (Helianthus annuus), was sequenced and analyzed. The genome of SCSV-SF-1 is 9,741 nucleotides long, encoding a polyprotein of 3,071 amino acids containing the consensus motifs of potyviruses. Sequence comparison revealed that the 3'-terminus of SCSV-SF-1 shared over 96% similarities with isolates of Bidens mottle virus (BiMoV). However, SCSV-SF-1 has a very narrow host range, excluding the diagnostic host species for BiMoV, Bidens pilosa and Zinnia elegans. Therefore, SCSV-SF-1 is a distinct isolate of BiMoV. This is the first report of the full-length nucleotide sequence of BiMoV infecting sunflower in Taiwan

    The controlled teleportation of an arbitrary two-atom entangled state in driven cavity QED

    Full text link
    In this paper, we propose a scheme for the controlled teleportation of an arbitrary two-atom entangled state ϕ>12=agg>12+bge>12+ceg>12+dee>12|\phi>_{12}=a|gg>_{12}+b|ge>_{12}+c|eg>_{12}+d|ee>_{12} in driven cavity QED. An arbitrary two-atom entangled state can be teleported perfectly with the help of the cooperation of the third side by constructing a three-atom GHZ entangled state as the controlled channel. This scheme does not involve apparent (or direct) Bell-state measurement and is insensitive to the cavity decay and the thermal field. The probability of the success in our scheme is 1.0.Comment: 10 page

    Improved Eavesdropping Detection Strategy in Quantum Direct Communication Protocol Based on Four-particle GHZ State

    Full text link
    In order to improve the eavesdropping detection efficiency in two-step quantum direct communication protocol, an improved eavesdropping detection strategy using four-particle GHZ state is proposed, in which four-particle GHZ state is used to detect eavesdroppers. During the security analysis, the method of the entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information which eavesdropper can obtain and the interference introduced. If the eavesdroppers intend to obtain all information, the eavesdropping detection rate of the original two-step quantum direct communication protocol by using EPR pair block as detection particles is 50%; while the proposed strategy's detection rate is 88%. In the end, the security of the proposed protocol is discussed. The analysis results show that the eavesdropping detection strategy presented is more secure.Comment: 14 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:quant-ph/0308173 by different author

    DsJ(2860)D_{sJ}(2860) and DsJ(2715)D_{sJ}(2715)

    Full text link
    Recently Babar Collaboration reported a new csˉc\bar{s} state DsJ(2860)D_{sJ}(2860) and Belle Collaboration observed DsJ(2715)D_{sJ}(2715). We investigate the strong decays of the excited csˉc\bar{s} states using the 3P0^{3}P_{0} model. After comparing the theoretical decay widths and decay patterns with the available experimental data, we tend to conclude: (1) DsJ(2715)D_{sJ}(2715) is probably the 1(13D1)1^{-}(1^{3}D_{1}) csˉc\bar{s} state although the 1(23S1)1^{-}(2^{3}S_{1}) assignment is not completely excluded; (2) DsJ(2860)D_{sJ}(2860) seems unlikely to be the 1(23S1)1^{-}(2^{3}S_{1}) and 1(13D1)1^{-}(1^{3}D_{1}) candidate; (3) DsJ(2860)D_{sJ}(2860) as either a 0+(23P0)0^{+}(2^{3}P_{0}) or 3(13D3)3^{-}(1^{3}D_{3}) csˉc\bar{s} state is consistent with the experimental data; (4) experimental search of DsJ(2860)D_{sJ}(2860) in the channels DsηD_s\eta, DKDK^{*}, DKD^{*}K and DsηD_{s}^{*}\eta will be crucial to distinguish the above two possibilities.Comment: 18 pages, 7 figures, 2 tables. Some discussions added. The final version to appear at EPJ

    Improved protocols of secure quantum communication using W states

    Full text link
    Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.Comment: 8 page

    Quantum algebra in the mixed light pseudoscalar meson states

    Full text link
    In this paper, we investigate the entanglement degrees of pseudoscalar meson states via quantum algebra Y(su(3)). By making use of transition effect of generators J of Y(su(3)), we construct various transition operators in terms of J of Y(su(3)), and act them on eta-pion-eta mixing meson state. The entanglement degrees of both the initial state and final state are calculated with the help of entropy theory. The diagrams of entanglement degrees are presented. Our result shows that a state with desired entanglement degree can be achieved by acting proper chosen transition operator on an initial state. This sheds new light on the connect among quantum information, particle physics and Yangian algebra.Comment: 9 pages, 3 figure
    corecore