4,398 research outputs found
Weak Decays of Doubly Heavy Baryons:
The weak decays of a spin- doubly charm baryon () to a
spin- singly charm baryon () and a light vector meson ()
are studied under a phenomenological scheme. The contributions are classified
into different topological diagrams, among which the short distance ones are
calculated under the factorization hypothesis, and the long distance
contributions are modelled as final-state interactions (FSIs) which are
estimated with the one-particle-exchange model. In calculation the topological
contributions tend to fall in a hierarchy. The branching fractions or decay
widths are estimated, and it indicates that
and can be used as candidate
decays for searching and . Some decays that are
mainly activated by the long distance effects are found, observation on which
in future experiments can help to understand the role of FSIs in charm baryon
decays.Comment: 29 pages, 5 figures, 7 tables; version published in EPJ
A verifiable quantum key agreement protocol based on six-qubit cluster states
Quantum key agreement requires all participants to recover the shared key
together, so it is crucial to resist the participant attack. In this paper, we
propose a verifiable multi-party quantum key agreement protocol based on the
six-qubit cluster states. A verifiable distributor who preserves some
subsequences of the six-qubit cluster states is introduced into this protocol,
thus the participants can not obtain the shared key in advance. Besides, the
correctness and simultaneity of the shared key are guaranteed by the trusted
design combiner and homomorphic hash function. Furthermore, the security
analysis shows that the new protocol can resist the external and internal
attacks.Comment: 9 pages, 2 figure
A quantum secret sharing scheme with verifiable function
In the threshold quantum secret sharing scheme, it is
difficult to ensure that internal participants are honest. In this paper, a
verifiable threshold quantum secret sharing scheme is
designed combined with classical secret sharing scheme. First of all, the
distributor uses the asymmetric binary polynomials to generate the shares and
sends them to each participant. Secondly, the distributor sends the initial
quantum state with the secret to the first participant, and each participant
performs unitary operation that using the mutually unbiased bases on the
obtained dimension single bit quantum state ( is a large odd prime
number). In this process, distributor can randomly check the participants, and
find out the internal fraudsters by unitary inverse operation gradually upward.
Then the secret is reconstructed after all other participants simultaneously
public transmission. Security analysis show that this scheme can resist both
external and internal attacks
- …