28,807 research outputs found

    Quantum secret sharing between m-party and n-party with six states

    Full text link
    We propose a quantum secret sharing scheme between mm-party and nn-party using three conjugate bases, i.e. six states. A sequence of single photons, each of which is prepared in one of the six states, is used directly to encode classical information in the quantum secret sharing process. In this scheme, each of all mm members in group 1 choose randomly their own secret key individually and independently, and then directly encode their respective secret information on the states of single photons via unitary operations, then the last one (the mmth member of group 1) sends 1/n1/n of the resulting qubits to each of group 2. By measuring their respective qubits, all members in group 2 share the secret information shared by all members in group 1. The secret message shared by group 1 and group 2 in such a way that neither subset of each group nor the union of a subset of group 1 and a subset of group 2 can extract the secret message, but each whole group (all the members of each group) can. The scheme is asymptotically 100% in efficiency. It makes the Trojan horse attack with a multi-photon signal, the fake-signal attack with EPR pairs, the attack with single photons, and the attack with invisible photons to be nullification. We show that it is secure and has an advantage over the one based on two conjugate bases. We also give the upper bounds of the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states. This protocol is feasible with present-day technique.Comment: 7 page

    Efficient quantum cryptography network without entanglement and quantum memory

    Full text link
    An efficient quantum cryptography network protocol is proposed with d-dimension polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0>. The users code the information on the single photons with some unitary operations. For preventing the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique (decoy-photon technique) is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum state and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.Comment: 4 pages, 1 figures. It also presented a way for preparing decoy photons without a sinigle-photon sourc

    Circular quantum secret sharing

    Full text link
    A circular quantum secret sharing protocol is proposed, which is useful and efficient when one of the parties of secret sharing is remote to the others who are in adjacent, especially the parties are more than three. We describe the process of this protocol and discuss its security when the quantum information carrying is polarized single photons running circularly. It will be shown that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as almost all the instances can be used for generating the private key, and each photon can carry one bit of information without quantum storage. It is straightforwardly to utilize this topological structure to complete quantum secret sharing with multi-level two-particle entanglement in high capacity securely.Comment: 7 pages, 2 figure

    Period halving of Persistent Currents in Mesoscopic Mobius ladders

    Full text link
    We investigate the period halving of persistent currents(PCs) of non-interacting electrons in isolated mesoscopic M\"{o}bius ladders without disorder, pierced by Aharonov-Bhom flux. The mechanisms of the period halving effect depend on the parity of the number of electrons as well as on the interchain hopping. Although the data of PCs in mesoscopic systems are sample-specific, some simple rules are found in the canonical ensemble average, such as all the odd harmonics of the PCs disappear, and the signals of even harmonics are non-negative. {PACS number(s): 73.23.Ra, 73.23.-b, 68.65.-k}Comment: 6 Pages with 3 EPS figure

    Flux rope, hyperbolic flux tube, and late EUV phases in a non-eruptive circular-ribbon flare

    Get PDF
    We present a detailed study of a confined circular flare dynamics associated with 3 UV late phases in order to understand more precisely which topological elements are present and how they constrain the dynamics of the flare. We perform a non-linear force free field extrapolation of the confined flare observed with the HMI and AIA instruments onboard SDO. From the 3D magnetic field we compute the squashing factor and we analyse its distribution. Conjointly, we analyse the AIA EUV light curves and images in order to identify the post-flare loops, their temporal and thermal evolution. By combining both analysis we are able to propose a detailed scenario that explains the dynamics of the flare. Our topological analysis shows that in addition to a null-point topology with the fan separatrix, the spine lines and its surrounding Quasi-Separatix Layers halo (typical for a circular flare), a flux rope and its hyperbolic flux tube (HFT) are enclosed below the null. By comparing the magnetic field topology and the EUV post-flare loops we obtain an almost perfect match 1) between the footpoints of the separatrices and the EUV 1600~\AA{} ribbons and 2) between the HFT's field line footpoints and bright spots observed inside the circular ribbons. We showed, for the first time in a confined flare, that magnetic reconnection occured initially at the HFT, below the flux rope. Reconnection at the null point between the flux rope and the overlying field is only initiated in a second phase. In addition, we showed that the EUV late phase observed after the main flare episode are caused by the cooling loops of different length which have all reconnected at the null point during the impulsive phase.Comment: Astronomy & Astrophysics, in pres

    Study on the mechanism of open-flavor strong decays

    Full text link
    The open-flavor strong decays are studied based on the interaction of potential quark model. The decay process is related to the s-channel contribution of the same scalar confinment and one-gluon-exchange(OGE) interaction in the quark model. After we adopt the prescription of massive gluons in time-like region from the lattice calculation, the approximation of four-fermion interaction is applied. The numerical calculation is performed to the meson decays in uu, dd, ss light flavor sector. The analysis of the D/SD/S ratios of b1ωπb_1\rightarrow \omega \pi and a1ρπa_1\rightarrow \rho \pi show that the scalar interaction should be dominant in the open-flavor decays

    Quantum secure direct communication network with superdense coding and decoy photons

    Full text link
    A quantum secure direct communication network scheme is proposed with quantum superdense coding and decoy photons. The servers on a passive optical network prepare and measure the quantum signal, i.e., a sequence of the dd-dimensional Bell states. After confirming the security of the photons received from the receiver, the sender codes his secret message on them directly. For preventing a dishonest server from eavesdropping, some decoy photons prepared by measuring one photon in the Bell states are used to replace some original photons. One of the users on the network can communicate any other one. This scheme has the advantage of high capacity, and it is more convenient than others as only a sequence of photons is transmitted in quantum line.Comment: 6 pages, 2 figur

    Parity independence of the zero-bias conductance peak in a nanowire based topological superconductor-quantum dot hybrid device

    Full text link
    We explore the signatures of Majorana fermions in a nanowire based topological superconductor-quantum dot-topological superconductor hybrid device by charge transport measurements. The device is made from an epitaxially grown InSb nanowire with two superconductor Nb contacts on a Si/SiO2_2 substrate. At low temperatures, a quantum dot is formed in the segment of the InSb nanowire between the two Nb contacts and the two Nb contacted segments of the InSb nanowire show superconductivity due to the proximity effect. At zero magnetic field, well defined Coulomb diamonds and the Kondo effect are observed in the charge stability diagram measurements in the Coulomb blockade regime of the quantum dot. Under the application of a finite, sufficiently strong magnetic field, a zero-bias conductance peak structure is observed in the same Coulomb blockade regime. It is found that the zero-bias conductance peak is present in many consecutive Coulomb diamonds, irrespective of the even-odd parity of the quasi-particle occupation number in the quantum dot. In addition, we find that the zero-bias conductance peak is in most cases accompanied by two differential conductance peaks, forming a triple-peak structure, and the separation between the two side peaks in bias voltage shows oscillations closely correlated to the background Coulomb conductance oscillations of the device. The observed zero-bias conductance peak and the associated triple-peak structure are in line with the signatures of Majorana fermion physics in a nanowire based topological superconductor-quantum dot-topological superconductor system, in which the two Majorana bound states adjacent to the quantum dot are hybridized into a pair of quasi-particle states with finite energies and the other two Majorana bound states remain as the zero-energy modes located at the two ends of the entire InSb nanowire.Comment: 6 pages, 4 figure
    corecore