29,343 research outputs found
Quantum secret sharing between m-party and n-party with six states
We propose a quantum secret sharing scheme between -party and -party
using three conjugate bases, i.e. six states. A sequence of single photons,
each of which is prepared in one of the six states, is used directly to encode
classical information in the quantum secret sharing process. In this scheme,
each of all members in group 1 choose randomly their own secret key
individually and independently, and then directly encode their respective
secret information on the states of single photons via unitary operations, then
the last one (the th member of group 1) sends of the resulting qubits
to each of group 2. By measuring their respective qubits, all members in group
2 share the secret information shared by all members in group 1. The secret
message shared by group 1 and group 2 in such a way that neither subset of each
group nor the union of a subset of group 1 and a subset of group 2 can extract
the secret message, but each whole group (all the members of each group) can.
The scheme is asymptotically 100% in efficiency. It makes the Trojan horse
attack with a multi-photon signal, the fake-signal attack with EPR pairs, the
attack with single photons, and the attack with invisible photons to be
nullification. We show that it is secure and has an advantage over the one
based on two conjugate bases. We also give the upper bounds of the average
success probabilities for dishonest agent eavesdropping encryption using the
fake-signal attack with any two-particle entangled states. This protocol is
feasible with present-day technique.Comment: 7 page
Technological innovations at the onset of the Mid-Pleistocene Climate Transition in high-latitude East Asia
The interplay between Pleistocene climatic variability and hominin adaptations to diverse terrestrial ecosystems is a key topic in human evolutionary studies. Early and Middle Pleistocene environmental change and its relation to hominin behavioural responses has been a subject of great interest in Africa and Europe, though little information is available for other key regions of the Old World, particularly from Eastern Asia. Here we examine key Early Pleistocene sites of the Nihewan Basin, in high-latitude northern China, dating between ∼1.4 to 1.0 million years ago (Ma). We compare stone tool assemblages from three Early Pleistocene sites in the Nihewan Basin, including detailed assessment of stone tool refitting sequences at the ∼1.1 Ma-old site of Cenjiawan. Increased toolmaking skills and technological innovations are evident in the Nihewan Basin at the onset of the Mid-Pleistocene Climate Transition (MPT). Examination of the lithic technology of the Nihewan sites, together with an assessment of other key Palaeolithic sites of China, indicates that toolkits show increasing diversity at the outset of the MPT and in its aftermath. The overall evidence indicates the adaptive flexibility of early hominins to ecosystem changes since the MPT, though regional abandonments are also apparent in high-latitudes, likely owing to cold and oscillating environmental conditions. The view presented here sharply contrasts with traditional arguments that stone tool technologies of China are homogeneous and continuous over the course of the Early Pleistocene.Introduction Results - Stone-tool-knapping skills recorded in the Cenjiawan assemblage - Technological comparisons of the Nihewan Basin assemblages Discussio
Probabilistic teleportation of unknown two-particle state via POVM
We propose a scheme for probabilistic teleportation of unknown two-particle
state with partly entangled four-particle state via POVM. In this scheme the
teleportation of unknown two-particle state can be realized with certain
probability by performing two Bell state measurements, a proper POVM and a
unitary transformation.Comment: 5 pages, no figur
Efficient quantum cryptography network without entanglement and quantum memory
An efficient quantum cryptography network protocol is proposed with
d-dimension polarized photons, without resorting to entanglement and quantum
memory. A server on the network, say Alice, provides the service for preparing
and measuring single photons whose initial state are |0>. The users code the
information on the single photons with some unitary operations. For preventing
the untrustworthy server Alice from eavesdropping the quantum lines, a
nonorthogonal-coding technique (decoy-photon technique) is used in the process
that the quantum signal is transmitted between the users. This protocol does
not require the servers and the users to store the quantum state and almost all
of the single photons can be used for carrying the information, which makes it
more convenient for application than others with present technology. We also
discuss the case with a faint laser pulse.Comment: 4 pages, 1 figures. It also presented a way for preparing decoy
photons without a sinigle-photon sourc
Circular quantum secret sharing
A circular quantum secret sharing protocol is proposed, which is useful and
efficient when one of the parties of secret sharing is remote to the others who
are in adjacent, especially the parties are more than three. We describe the
process of this protocol and discuss its security when the quantum information
carrying is polarized single photons running circularly. It will be shown that
entanglement is not necessary for quantum secret sharing. Moreover, the
theoretic efficiency is improved to approach 100% as almost all the instances
can be used for generating the private key, and each photon can carry one bit
of information without quantum storage. It is straightforwardly to utilize this
topological structure to complete quantum secret sharing with multi-level
two-particle entanglement in high capacity securely.Comment: 7 pages, 2 figure
Disk stars in the Milky Way detected beyond 25 kpc from its center
CONTEXT. The maximum size of the Galactic stellar disk is not yet known. Some
studies have suggested an abrupt drop-off of the stellar density of the disk at
Galactocentric distances kpc, which means that in practice no
disk stars or only very few of them should be found beyond this limit. However,
stars in the Milky Way plane are detected at larger distances. In addition to
the halo component, star counts have placed the end of the disk beyond 20 kpc,
although this has not been spectroscopically confirmed so far.
AIMS. Here, we aim to spectroscopically confirm the presence of the disk
stars up to much larger distances.
METHODS. With data from the LAMOST and SDSS-APOGEE spectroscopic surveys, we
statistically derived the maximum distance at which the metallicity
distribution of stars in the Galactic plane is distinct from that of the halo
populations.
RESULTS. Our analysis reveals the presence of disk stars at R>26 kpc (99.7%
C.L.) and even at R>31 kpc (95.4% C.L.).Comment: 4 pages, accepted to be published in A&A-Letter
Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state
We present a scheme for symmetric multiparty quantum state sharing of an
arbitrary -qubit state with Greenberger-Horne-Zeilinger states following
some ideas from the controlled teleportation [Phys. Rev. A \textbf{72}, 02338
(2005)]. The sender Alice performs Bell-state measurements on her
particles and the controllers need only to take some single-photon product
measurements on their photons independently, not Bell-state measurements, which
makes this scheme more convenient than the latter. Also it does not require the
parties to perform a controlled-NOT gate on the photons for reconstructing the
unknown -qubit state and it is an optimal one as its efficiency for qubits
approaches the maximal value.Comment: 6 pages, no figures; It simplifies the process for sharing an
arbitrary m-qubit state in Phys. Rev. A 72, 022338 (2005) (quant-ph/0501129
LDA+Gutzwiller Method for Correlated Electron Systems: Formalism and Its Applications
We introduce in detail our newly developed \textit{ab initio} LDA+Gutzwiller
method, in which the Gutzwiller variational approach is naturally incorporated
with the density functional theory (DFT) through the "Gutzwiller density
functional theory (GDFT)" (which is a generalization of original Kohn-Sham
formalism). This method can be used for ground state determination of electron
systems ranging from weakly correlated metal to strongly correlated insulators
with long-range ordering. We will show that its quality for ground state is as
high as that by dynamic mean field theory (DMFT), and yet it is computationally
much cheaper. In additions, the method is fully variational, the charge-density
self-consistency can be naturally achieved, and the quantities, such as total
energy, linear response, can be accurately obtained similar to LDA-type
calculations. Applications on several typical systems are presented, and the
characteristic aspects of this new method are clarified. The obtained results
using LDA+Gutzwiller are in better agreement with existing experiments,
suggesting significant improvements over LDA or LDA+U.Comment: 20 pages, 11 figure
- …