735 research outputs found
A Two-Step Quantum Direct Communication Protocol Using Einstein-Podolsky-Rosen Pair Block
A protocol for quantum secure direct communication using blocks of EPR pairs
is proposed. A set of ordered EPR pairs is used as a data block for sending
secret message directly. The ordered EPR set is divided into two particle
sequences, a checking sequence and a message-coding sequence. After
transmitting the checking sequence, the two parties of communication check
eavesdropping by measuring a fraction of particles randomly chosen, with random
choice of two sets of measuring bases. After insuring the security of the
quantum channel, the sender, Alice encodes the secret message directly on the
message-coding sequence and send them to Bob. By combining the checking and
message-coding sequences together, Bob is able to read out the encoded messages
directly. The scheme is secure because an eavesdropper cannot get both
sequences simultaneously. We also discuss issues in a noisy channel.Comment: 8 pages and 2 figures. To appear in Phys Rev
Shock Diffraction by Convex Cornered Wedges for the Nonlinear Wave System
We are concerned with rigorous mathematical analysis of shock diffraction by
two-dimensional convex cornered wedges in compressible fluid flow governed by
the nonlinear wave system. This shock diffraction problem can be formulated as
a boundary value problem for second-order nonlinear partial differential
equations of mixed elliptic-hyperbolic type in an unbounded domain. It can be
further reformulated as a free boundary problem for nonlinear degenerate
elliptic equations of second order. We establish a first global theory of
existence and regularity for this shock diffraction problem. In particular, we
establish that the optimal regularity for the solution is across the
degenerate sonic boundary. To achieve this, we develop several mathematical
ideas and techniques, which are also useful for other related problems
involving similar analytical difficulties.Comment: 50 pages;7 figure
Controlled order rearrangement encryption for quantum key distribution
A novel technique is devised to perform orthogonal state quantum key
distribution. In this scheme, entangled parts of a quantum information carrier
are sent from Alice to Bob through two quantum channels. However before the
transmission, the orders of the quantum information carrier in one channel is
reordered so that Eve can not steal useful information. At the receiver's end,
the order of the quantum information carrier is restored. The order
rearrangement operation in both parties is controlled by a prior shared control
key which is used repeatedly in a quantum key distribution session.Comment: 5 pages and 2 figure
A New Iron Pnictide Oxide (Fe2As2)(Ca5(Mg,Ti)4Oy) and a New Phase in Fe-As-Ca-Mg-Ti-O system
A new layered iron arsenide oxide (Fe2As2)(Ca5(Mg,Ti)4Oy) and its structural
derivative were found in the Fe-As-Ca-Mg-Ti-O system. The crystal structure of
(Fe2As2)(Ca5(Mg,Ti)4Oy) is identical to that of (Fe2As2)(Ca5(Sc,Ti)4Oy), which
was reported in our previous study. The lattice constants of this compound are
a = 3.86(4) A and c = 41.05(2) A. In addition, another phase with a thicker
blocking layer was found. The structure of the compound and its derivative was
tentatively assigned through STEM observation as (Fe2As2)(Ca8(Mg,Ti)6Oy) with
sextuple perovskite-type sheets divided by a rock salt layer. The interlayer
Fe-Fe distance of this compound is ~30 A. The compound and its derivative
exhibited bulk superconductivity, as found from magnetization and resistivity
measurements.Comment: 9 pages, 7 figure
Full-length sequence analysis of a distinct isolate of Bidens mottle virus infecting sunflower in Taiwan
The full-length genome of a potyvirus, previously known as sunflower chlorotic spot virus isolate SF-1 (SCSV-SF-1) which causes novel symptoms on sunflowers (Helianthus annuus), was sequenced and analyzed. The genome of SCSV-SF-1 is 9,741 nucleotides long, encoding a polyprotein of 3,071 amino acids containing the consensus motifs of potyviruses. Sequence comparison revealed that the 3'-terminus of SCSV-SF-1 shared over 96% similarities with isolates of Bidens mottle virus (BiMoV). However, SCSV-SF-1 has a very narrow host range, excluding the diagnostic host species for BiMoV, Bidens pilosa and Zinnia elegans. Therefore, SCSV-SF-1 is a distinct isolate of BiMoV. This is the first report of the full-length nucleotide sequence of BiMoV infecting sunflower in Taiwan
The controlled teleportation of an arbitrary two-atom entangled state in driven cavity QED
In this paper, we propose a scheme for the controlled teleportation of an
arbitrary two-atom entangled state
in driven cavity QED.
An arbitrary two-atom entangled state can be teleported perfectly with the help
of the cooperation of the third side by constructing a three-atom GHZ entangled
state as the controlled channel. This scheme does not involve apparent (or
direct) Bell-state measurement and is insensitive to the cavity decay and the
thermal field. The probability of the success in our scheme is 1.0.Comment: 10 page
Improved Eavesdropping Detection Strategy in Quantum Direct Communication Protocol Based on Four-particle GHZ State
In order to improve the eavesdropping detection efficiency in two-step
quantum direct communication protocol, an improved eavesdropping detection
strategy using four-particle GHZ state is proposed, in which four-particle GHZ
state is used to detect eavesdroppers. During the security analysis, the method
of the entropy theory is introduced, and two detection strategies are compared
quantitatively by using the constraint between the information which
eavesdropper can obtain and the interference introduced. If the eavesdroppers
intend to obtain all information, the eavesdropping detection rate of the
original two-step quantum direct communication protocol by using EPR pair block
as detection particles is 50%; while the proposed strategy's detection rate is
88%. In the end, the security of the proposed protocol is discussed. The
analysis results show that the eavesdropping detection strategy presented is
more secure.Comment: 14 pages, 3 figures. arXiv admin note: substantial text overlap with
arXiv:quant-ph/0308173 by different author
and
Recently Babar Collaboration reported a new state
and Belle Collaboration observed . We investigate the strong
decays of the excited states using the model. After
comparing the theoretical decay widths and decay patterns with the available
experimental data, we tend to conclude: (1) is probably the
state although the
assignment is not completely excluded; (2) seems unlikely to be
the and candidate; (3)
as either a or state is
consistent with the experimental data; (4) experimental search of
in the channels , , and
will be crucial to distinguish the above two possibilities.Comment: 18 pages, 7 figures, 2 tables. Some discussions added. The final
version to appear at EPJ
Improved protocols of secure quantum communication using W states
Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al.
[Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of
secure quantum communication using 3-qubit and 4-qubit symmetric W state
respectively. These two dense coding based protocols are generalized and their
efficiencies are considerably improved. Simple bounds on the qubit efficiency
of deterministic secure quantum communication (DSQC) and quantum secure direct
communication (QSDC) protocols are obtained and it is shown that dense coding
is not essential for designing of maximally efficient DSQC and QSDC protocols.
This fact is used to design maximally efficient protocols of DSQC and QSDC
using 3-qubit and 4-qubit W states.Comment: 8 page
Quantum algebra in the mixed light pseudoscalar meson states
In this paper, we investigate the entanglement degrees of pseudoscalar meson
states via quantum algebra Y(su(3)). By making use of transition effect of
generators J of Y(su(3)), we construct various transition operators in terms of
J of Y(su(3)), and act them on eta-pion-eta mixing meson state. The
entanglement degrees of both the initial state and final state are calculated
with the help of entropy theory. The diagrams of entanglement degrees are
presented. Our result shows that a state with desired entanglement degree can
be achieved by acting proper chosen transition operator on an initial state.
This sheds new light on the connect among quantum information, particle physics
and Yangian algebra.Comment: 9 pages, 3 figure
- …