29,144 research outputs found
Quantum secret sharing between m-party and n-party with six states
We propose a quantum secret sharing scheme between -party and -party
using three conjugate bases, i.e. six states. A sequence of single photons,
each of which is prepared in one of the six states, is used directly to encode
classical information in the quantum secret sharing process. In this scheme,
each of all members in group 1 choose randomly their own secret key
individually and independently, and then directly encode their respective
secret information on the states of single photons via unitary operations, then
the last one (the th member of group 1) sends of the resulting qubits
to each of group 2. By measuring their respective qubits, all members in group
2 share the secret information shared by all members in group 1. The secret
message shared by group 1 and group 2 in such a way that neither subset of each
group nor the union of a subset of group 1 and a subset of group 2 can extract
the secret message, but each whole group (all the members of each group) can.
The scheme is asymptotically 100% in efficiency. It makes the Trojan horse
attack with a multi-photon signal, the fake-signal attack with EPR pairs, the
attack with single photons, and the attack with invisible photons to be
nullification. We show that it is secure and has an advantage over the one
based on two conjugate bases. We also give the upper bounds of the average
success probabilities for dishonest agent eavesdropping encryption using the
fake-signal attack with any two-particle entangled states. This protocol is
feasible with present-day technique.Comment: 7 page
Efficient quantum cryptography network without entanglement and quantum memory
An efficient quantum cryptography network protocol is proposed with
d-dimension polarized photons, without resorting to entanglement and quantum
memory. A server on the network, say Alice, provides the service for preparing
and measuring single photons whose initial state are |0>. The users code the
information on the single photons with some unitary operations. For preventing
the untrustworthy server Alice from eavesdropping the quantum lines, a
nonorthogonal-coding technique (decoy-photon technique) is used in the process
that the quantum signal is transmitted between the users. This protocol does
not require the servers and the users to store the quantum state and almost all
of the single photons can be used for carrying the information, which makes it
more convenient for application than others with present technology. We also
discuss the case with a faint laser pulse.Comment: 4 pages, 1 figures. It also presented a way for preparing decoy
photons without a sinigle-photon sourc
Circular quantum secret sharing
A circular quantum secret sharing protocol is proposed, which is useful and
efficient when one of the parties of secret sharing is remote to the others who
are in adjacent, especially the parties are more than three. We describe the
process of this protocol and discuss its security when the quantum information
carrying is polarized single photons running circularly. It will be shown that
entanglement is not necessary for quantum secret sharing. Moreover, the
theoretic efficiency is improved to approach 100% as almost all the instances
can be used for generating the private key, and each photon can carry one bit
of information without quantum storage. It is straightforwardly to utilize this
topological structure to complete quantum secret sharing with multi-level
two-particle entanglement in high capacity securely.Comment: 7 pages, 2 figure
Period halving of Persistent Currents in Mesoscopic Mobius ladders
We investigate the period halving of persistent currents(PCs) of
non-interacting electrons in isolated mesoscopic M\"{o}bius ladders without
disorder, pierced by Aharonov-Bhom flux. The mechanisms of the period halving
effect depend on the parity of the number of electrons as well as on the
interchain hopping. Although the data of PCs in mesoscopic systems are
sample-specific, some simple rules are found in the canonical ensemble average,
such as all the odd harmonics of the PCs disappear, and the signals of even
harmonics are non-negative. {PACS number(s): 73.23.Ra, 73.23.-b, 68.65.-k}Comment: 6 Pages with 3 EPS figure
Flux rope, hyperbolic flux tube, and late EUV phases in a non-eruptive circular-ribbon flare
We present a detailed study of a confined circular flare dynamics associated
with 3 UV late phases in order to understand more precisely which topological
elements are present and how they constrain the dynamics of the flare. We
perform a non-linear force free field extrapolation of the confined flare
observed with the HMI and AIA instruments onboard SDO. From the 3D magnetic
field we compute the squashing factor and we analyse its distribution.
Conjointly, we analyse the AIA EUV light curves and images in order to identify
the post-flare loops, their temporal and thermal evolution. By combining both
analysis we are able to propose a detailed scenario that explains the dynamics
of the flare. Our topological analysis shows that in addition to a null-point
topology with the fan separatrix, the spine lines and its surrounding
Quasi-Separatix Layers halo (typical for a circular flare), a flux rope and its
hyperbolic flux tube (HFT) are enclosed below the null. By comparing the
magnetic field topology and the EUV post-flare loops we obtain an almost
perfect match 1) between the footpoints of the separatrices and the EUV
1600~\AA{} ribbons and 2) between the HFT's field line footpoints and bright
spots observed inside the circular ribbons. We showed, for the first time in a
confined flare, that magnetic reconnection occured initially at the HFT, below
the flux rope. Reconnection at the null point between the flux rope and the
overlying field is only initiated in a second phase. In addition, we showed
that the EUV late phase observed after the main flare episode are caused by the
cooling loops of different length which have all reconnected at the null point
during the impulsive phase.Comment: Astronomy & Astrophysics, in pres
Study on the mechanism of open-flavor strong decays
The open-flavor strong decays are studied based on the interaction of
potential quark model. The decay process is related to the s-channel
contribution of the same scalar confinment and one-gluon-exchange(OGE)
interaction in the quark model. After we adopt the prescription of massive
gluons in time-like region from the lattice calculation, the approximation of
four-fermion interaction is applied. The numerical calculation is performed to
the meson decays in , , light flavor sector. The analysis of the
ratios of and show
that the scalar interaction should be dominant in the open-flavor decays
Quantum secure direct communication network with superdense coding and decoy photons
A quantum secure direct communication network scheme is proposed with quantum
superdense coding and decoy photons. The servers on a passive optical network
prepare and measure the quantum signal, i.e., a sequence of the -dimensional
Bell states. After confirming the security of the photons received from the
receiver, the sender codes his secret message on them directly. For preventing
a dishonest server from eavesdropping, some decoy photons prepared by measuring
one photon in the Bell states are used to replace some original photons. One of
the users on the network can communicate any other one. This scheme has the
advantage of high capacity, and it is more convenient than others as only a
sequence of photons is transmitted in quantum line.Comment: 6 pages, 2 figur
Parity independence of the zero-bias conductance peak in a nanowire based topological superconductor-quantum dot hybrid device
We explore the signatures of Majorana fermions in a nanowire based
topological superconductor-quantum dot-topological superconductor hybrid device
by charge transport measurements. The device is made from an epitaxially grown
InSb nanowire with two superconductor Nb contacts on a Si/SiO substrate. At
low temperatures, a quantum dot is formed in the segment of the InSb nanowire
between the two Nb contacts and the two Nb contacted segments of the InSb
nanowire show superconductivity due to the proximity effect. At zero magnetic
field, well defined Coulomb diamonds and the Kondo effect are observed in the
charge stability diagram measurements in the Coulomb blockade regime of the
quantum dot. Under the application of a finite, sufficiently strong magnetic
field, a zero-bias conductance peak structure is observed in the same Coulomb
blockade regime. It is found that the zero-bias conductance peak is present in
many consecutive Coulomb diamonds, irrespective of the even-odd parity of the
quasi-particle occupation number in the quantum dot. In addition, we find that
the zero-bias conductance peak is in most cases accompanied by two differential
conductance peaks, forming a triple-peak structure, and the separation between
the two side peaks in bias voltage shows oscillations closely correlated to the
background Coulomb conductance oscillations of the device. The observed
zero-bias conductance peak and the associated triple-peak structure are in line
with the signatures of Majorana fermion physics in a nanowire based topological
superconductor-quantum dot-topological superconductor system, in which the two
Majorana bound states adjacent to the quantum dot are hybridized into a pair of
quasi-particle states with finite energies and the other two Majorana bound
states remain as the zero-energy modes located at the two ends of the entire
InSb nanowire.Comment: 6 pages, 4 figure
- …