期刊文献+
共找到2,074篇文章
< 1 2 104 >
每页显示 20 50 100
The Emergence of Time from Quantum Information Dynamics
1
作者 Logan Nye 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1981-2006,共26页
This paper presents a novel framework for understanding time as an emergent phenomenon arising from quantum information dynamics. We propose that the flow of time and its directional arrow are intrinsically linked to ... This paper presents a novel framework for understanding time as an emergent phenomenon arising from quantum information dynamics. We propose that the flow of time and its directional arrow are intrinsically linked to the growth of quantum complexity and the evolution of entanglement entropy in physical systems. By integrating principles from quantum mechanics, information theory, and holography, we develop a comprehensive theory that explains how time can emerge from timeless quantum processes. Our approach unifies concepts from quantum mechanics, general relativity, and thermodynamics, providing new perspectives on longstanding puzzles such as the black hole information paradox and the arrow of time. We derive modified Friedmann equations that incorporate quantum information measures, offering novel insights into cosmic evolution and the nature of dark energy. The paper presents a series of experimental proposals to test key aspects of this theory, ranging from quantum simulations to cosmological observations. Our framework suggests a deeply information-theoretic view of the universe, challenging our understanding of the nature of reality and opening new avenues for technological applications in quantum computing and sensing. This work contributes to the ongoing quest for a unified theory of quantum gravity and information, potentially with far-reaching implications for our understanding of space, time, and the fundamental structure of the cosmos. 展开更多
关键词 TIME ENTROPY EMERGENCE Black Hole information Paradox Complexity ENTANGLEMENT quantum information
在线阅读 下载PDF
Influence of Quantum Information Technology on International Security
2
作者 ZHAO Dongqian 《International Relations and Diplomacy》 2024年第1期26-33,共8页
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic... Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance. 展开更多
关键词 quantum information technology quantum communication quantum computing international security
在线阅读 下载PDF
Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability 被引量:3
3
作者 张盛 王剑 唐朝京 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期33-40,共8页
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-sp... Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency. 展开更多
关键词 quantum cryptography quantum counterfactuality quantum information
在线阅读 下载PDF
Schemes for Splitting Quantum Information with Four-Particle Genuine Entangled States 被引量:3
4
作者 詹佑邦 张群永 王郁武 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第5期847-851,共5页
We propose two schemes for splitting single- and two-qubit states by using four-particle genuine entangled state as the quantum channel. After the sender performs Bell-basis (or three-partite GHZ- basis) measurement... We propose two schemes for splitting single- and two-qubit states by using four-particle genuine entangled state as the quantum channel. After the sender performs Bell-basis (or three-partite GHZ- basis) measurements on her particles, and the cooperators operate single-particle measurements on their particles, the state receiver can reconstruct the original state of the sender by applying the appropriate unitary operation. In particular, in the scheme for splitting two-qubit state, the receiver needs to introduce an auxiliary particle and carries out a C-NOT operation. 展开更多
关键词 splitting quantum information four-particle genuine entangled state Bell-basis measurement GHZ-basis measurement controlled-NOT operation
在线阅读 下载PDF
Controlled Teleportation of Multi-qutrit Quantum Information by Swapping Entanglement 被引量:3
5
作者 YANG Jie LIU Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第2期338-342,共5页
We present a scheme for teleporting multi-qutrit quantum information from a sender to a receiver via the control of many agents in a network. Agents's control parameters are obtained via quantum entanglement swapping... We present a scheme for teleporting multi-qutrit quantum information from a sender to a receiver via the control of many agents in a network. Agents's control parameters are obtained via quantum entanglement swapping. In our scheme, Zhang and Man's QSS protocol [Phys. Rev. A 72 (2005) 022303] based on Bell-state entanglement swapping is generalized to a qutrit case. Our scheme owns the advantage of having higher code capacity and better security than the work [Commun. Theor. Phys. 44 (2005) 847] on controlled teleportation for multi-qubit. 展开更多
关键词 controlled teleportation multi-qutrit quantum information entanglement swapping
在线阅读 下载PDF
Scheme for splitting quantum information via W states in cavity QED systems 被引量:2
6
作者 于希梅 顾永建 +1 位作者 马丽珍 周邦安 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第2期462-466,共5页
Assisted by multipartite entanglement, Quantum information may be split so that the original qubit can be reconstructed if and only if the recipients cooperate. This paper proposes an experimentally feasible scheme fo... Assisted by multipartite entanglement, Quantum information may be split so that the original qubit can be reconstructed if and only if the recipients cooperate. This paper proposes an experimentally feasible scheme for splitting quantum information via W-type entangled states in cavity QED systems, where three-level Rydberg atoms interact with nonresonant cavities. Since W-type states are used as the quantum channel and the cavities are only virtually excited, the scheme is easy to implement and robust against decoherence, and the dependence on the quality factor of the cavities is greatly reduced. 展开更多
关键词 splitting quantum information W-type states cavity QED
在线阅读 下载PDF
Controlled Teleportation of Multi-qudit Quantum Information by Entanglement Swapping 被引量:2
7
作者 DONG Jian TENG Jian-Fu WANG Shu-Yan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第5期823-827,共5页
In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping ... In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping of maximally d-dimensional EPR pair. In our scheme, Yang's qutrit controlled teleportation protocol [Commun. Theor. Phys. 49 (2008) 338] based on Bell-state entanglement swapping is generalized to the qudit case. The scheme of multi-qudit owns the advantage of having higher code capacity and better security than that of multi-qutrit. 展开更多
关键词 quantum controlled teleportation multi-qudit quantum information EPR pair entanglement swapping
在线阅读 下载PDF
Tripartite Splitting Arbitrary 2-Qubit Quantum Information by Using Two Asymmetric W States 被引量:2
8
作者 PAN Gui-Xia LIU Yi-Min +1 位作者 WANG Zhang-Yin ZHANG Zhan-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第2期227-231,共5页
In this paper we propose a tripartite scheme for splitting an arbitrary 2-qubit quantum information by using two asymmetric W states as the quantum channel. In the schemem if the two recipients collaborate together, t... In this paper we propose a tripartite scheme for splitting an arbitrary 2-qubit quantum information by using two asymmetric W states as the quantum channel. In the schemem if the two recipients collaborate together, they can deterministically recover the quantum information by performing first a 4-qubit collective unitary operation and then two single-qubit unitary operations. In addition, since the asymmetric W states are employed as the quantum channel, the scheme is robust against decoherence. 展开更多
关键词 quantum information splitting arbitrary n-qubit quantum information asymmetric W state
在线阅读 下载PDF
Hierarchical and probabilistic quantum information splitting of an arbitrary two-qubit state via two cluster states 被引量:1
9
作者 Wen-Ming Guo Lei-Ru Qin 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第11期382-389,共8页
Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit stat... Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit state. In this scheme, the sender transmits the two-qubit secret state to three agents who are divided into two grades with two Bell-state measurements,and broadcasts the measurement results via a classical channel. One agent is in the upper grade and two agents are in the lower grade. The agent in the upper grade only needs to cooperate with one of the other two agents to recover the secret state but both of the agents in the lower grade need help from all of the agents. Every agent who wants to recover the secret state needs to introduce two ancillary qubits and performs a positive operator-valued measurement(POVM) instead of the usual projective measurement. Moreover, due to the symmetry of the cluster state, we extend this protocol to multiparty agents. 展开更多
关键词 cluster state hierarchical quantum information splitting positive operator-valued measurement (POVM)
在线阅读 下载PDF
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
10
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers ALGORITHM Post-quantum cryptography
在线阅读 下载PDF
Speeding up transmissions of unknown quantum information along Ising-type quantum channels
11
作者 W J Guo L F Wei 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第1期125-130,共6页
Quantum teleportation with entanglement channels and a series of two-qubit SWAP gates between the nearestneighbor qubits are usually utilized to achieve the transfers of unknown quantum state from the sender to the di... Quantum teleportation with entanglement channels and a series of two-qubit SWAP gates between the nearestneighbor qubits are usually utilized to achieve the transfers of unknown quantum state from the sender to the distant receiver. In this paper, by simplifying the usual SWAP gates we propose an approach to speed up the transmissions of unknown quantum information, specifically including the single-qubit unknown state and two-qubit unknown entangled ones,by a series of entangling and disentangling operations between the remote qubits with distant interactions. The generic proposal is demonstrated specifically with experimentally-existing Ising-type quantum channels without transverse interaction; liquid NMR-molecules driven by global radio frequency electromagnetic pulses and capacitively-coupled Josephson circuits driven by local microwave pulses. The proposal should be particularly useful to set up the connections between the distant qubits in a chip of quantum computing. 展开更多
关键词 unknown quantum information transfers Ising-type quantum chains NMR molecules superconducting circuits
在线阅读 下载PDF
Scalable Quantum Information Transfer between Individual Nitrogen-Vacancy Centers by a Hybrid Quantum Interface
12
作者 裴培 黄鹤飞 +1 位作者 郭彦青 宋鹤 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第2期9-12,共4页
We develop a design of a hybrid quantum interface for quantum information transfer (QIT), adopting a nanome- chanical resonator as the intermedium, which is magnetically coupled with individual nitrogen-vacancy cent... We develop a design of a hybrid quantum interface for quantum information transfer (QIT), adopting a nanome- chanical resonator as the intermedium, which is magnetically coupled with individual nitrogen-vacancy centers as the solid qubits, while eapacitively coupled with a coplanar waveguide resonator as the quantum data bus. We describe the Hamiltonian of the model, and analytically demonstrate the QIT for both the resonant interaction and large detuning cases. The hybrid quantum interface allows for QIT between arbitrarily selected individual nitrogen-vacancy centers, and has advantages of the sealability and controllability. Our methods open an alter- native perspective for implementing QIT, which is important during quantum storing or processing procedures in quantum computing. 展开更多
关键词 of for is in Scalable quantum information Transfer between Individual Nitrogen-Vacancy Centers by a Hybrid quantum Interface by
在线阅读 下载PDF
Bidirectional transfer of quantum information for unknown photons via cross-Kerr nonlinearity and photon-number-resolving measurement
13
作者 Jino Heo Chang-Ho Hong +1 位作者 Dong-Hoon Lee Hyung-Jin Yang 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第2期82-92,共11页
We propose an arbitrary controlled-unitary (CU) gate and a bidirectional transfer scheme of quantum information (BTQI) for unknown photons. The proposed CU gate utilizes quantum non-demolition photon-number-resolv... We propose an arbitrary controlled-unitary (CU) gate and a bidirectional transfer scheme of quantum information (BTQI) for unknown photons. The proposed CU gate utilizes quantum non-demolition photon-number-resolving measure- ment based on the weak cross-Kerr nonlinearities (XKNLs) and two quantum bus beams; the proposed CU gate consists of consecutive operations of a controlled-path gate and a gathering-path gate. It is almost deterministic and is feasible with current technology when a strong amplitude of the coherent state and weak XKNLs are employed. Compared with the existing optical multi-qubit or controlled gates, which utilize XKNLs and homodyne detectors, the proposed CU gate can increase experimental realization feasibility and enhance robustness against decoherence. According to the CU gate, we present a BTQI scheme in which the two unknown states of photons between two parties (Alice and Bob) are mutually swapped by transferring only a single photon. Consequently, by using the proposed CU gate, it is possible to experimentally implement the BTQI scheme with a certain probability of success. 展开更多
关键词 cross-Kerr nonlinearity quantum non-demolition photon-number-resolving measurement bidirec-tional transfer of quantum information
在线阅读 下载PDF
General Theory of Decoy-State Quantum Cryptography with Dark Count Rate Fluctuation
14
作者 高翔 孙仕海 梁林梅 《Chinese Physics Letters》 SCIE CAS CSCD 2009年第10期32-35,共4页
The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical ke... The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical key generation rate in the presence of fluctuation of the dark count rate, and compare the result with the result of the decoy-state without fluctuation. It is found that the key generation rate and maximal secure distance will be decreased under the influence of the fluctuation of the dark count rate. 展开更多
关键词 Computational physics Electronics and devices Optics quantum optics and lasers quantum information and quantum mechanics
在线阅读 下载PDF
Probabilistic and Hierarchical Quantum Information Splitting Based on the Non-Maximally Entangled Cluster State
15
作者 Gang Xu Rui-Ting Shan +2 位作者 Xiu-Bo Chen Mianxiong Dong Yu-Ling Chen 《Computers, Materials & Continua》 SCIE EI 2021年第10期339-349,共11页
With the emergence of classical communication security problems,quantum communication has been studied more extensively.In this paper,a novel probabilistic hierarchical quantum information splitting protocol is design... With the emergence of classical communication security problems,quantum communication has been studied more extensively.In this paper,a novel probabilistic hierarchical quantum information splitting protocol is designed by using a non-maximally entangled four-qubit cluster state.Firstly,the sender Alice splits and teleports an arbitrary one-qubit secret state invisibly to three remote agents Bob,Charlie,and David.One agent David is in high grade,the other two agents Bob and Charlie are in low grade.Secondly,the receiver in high grade needs the assistance of one agent in low grade,while the receiver in low grade needs the aid of all agents.While introducing an ancillary qubit,the receiver’s state can be inferred from the POVM measurement result of the ancillary qubit.Finally,with the help of other agents,the receiver can recover the secret state probabilistically by performing certain unitary operation on his own qubit.In addition,the security of the protocol under eavesdropping attacks is analyzed.In this proposed protocol,the agents need only single-qubit measurements to achieve probabilistic hierarchical quantum information splitting,which has appealing advantages in actual experiments.Such a probabilistic hierarchical quantum information splitting protocol hierarchical is expected to be more practical in multipartite quantum cryptography. 展开更多
关键词 Cluster state hierarchical quantum information splitting PROBABILISTIC non-maximally entangled states
在线阅读 下载PDF
A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
16
作者 赵楠 朱畅华 权东晓 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期22-26,共5页
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep... We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information. 展开更多
关键词 A Novel Basis Splitting Eavesdropping Scheme in quantum cryptography Based on the BB84 Protocol BB
在线阅读 下载PDF
Quality of correlation in quantum information
17
作者 崔景云 曾天海 娄乐生 《Journal of Beijing Institute of Technology》 EI CAS 2016年第1期115-119,共5页
A strong and stable correlation in quantum information is of high quality for quantum information processing.We define two quantities,selective average correlation and ripple coefficient,to evaluate the quality of cor... A strong and stable correlation in quantum information is of high quality for quantum information processing.We define two quantities,selective average correlation and ripple coefficient,to evaluate the quality of correlation in quantum information in a time interval.As a new communication channel,Heisenberg spin chains are widely investigated.We select a two-qubit Heisenberg XXZs pin chain with Dzyaloshinskii-Moriya interaction in an inhomogeneous magnetic field as an example,and use the two quantities to evaluate the qualities of the correlation in quantum information with different measures.The result shows that,if the time evolutions are similar,there needs only evaluating one of them to know when the correlation has high quality for quantum information processing. 展开更多
关键词 correlation in quantum information quantum information processing selective average correlation ripple coefficient
在线阅读 下载PDF
On Security of Quantum Cryptography by Probabilistic Analysis
18
作者 Jianzhong Zhao 《Journal of Quantum Information Science》 CAS 2022年第4期91-98,共8页
The existing quantum cryptography is a classical cryptography in nature and basically insecure because of its classical (conventional) bits, classical encryption algorithm and classical (public) channel. A novel topic... The existing quantum cryptography is a classical cryptography in nature and basically insecure because of its classical (conventional) bits, classical encryption algorithm and classical (public) channel. A novel topic about successful communication between the legitimate users, Alice and Bob, is discussed with probability of solution uniqueness of Bob’s decryption equation. We find, by probabilistic analysis, that success of communication between Alice and Bob is probabilistic with a probability bigger than 1/2. It is also novel to define insecurity of the quantum cryptography by probability of solution uniqueness of the search equation of Eve, the eavesdropper. The probability of Eve’s success to find the plain-text of Alice (and Bob) is greater than 1/2, and so the quantum cryptography is seriously insecure. 展开更多
关键词 quantum cryptography Classical cryptography Fundamental Equations Unique Solution PROBABILITY Insecure
在线阅读 下载PDF
Quantum Cryptography-A Theoretical Overview
19
作者 Pratik Roy Saptarshi Sahoo +1 位作者 Amit Kumar Mandal Indranil Basu 《Journal of Quantum Computing》 2021年第4期151-160,共10页
Quantum Key Distribution seems very promising as it offers unconditional security,that’s why it is being implemented by the tech giants of the networking industry and government.Having quantum phenomenon as a backbon... Quantum Key Distribution seems very promising as it offers unconditional security,that’s why it is being implemented by the tech giants of the networking industry and government.Having quantum phenomenon as a backbone,QKD protocols become indecipherable.Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication.This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography. 展开更多
关键词 quantum information quantum cryptography quantum entanglement
在线阅读 下载PDF
Many-Agent Controlled Teleportation of Multi-qubit Quantum Information via Quantum Entanglement Swapping 被引量:14
20
作者 ZHANG Zhan-Jun LIU Yi-Min MAN Zhong-Xiao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第5X期847-850,共4页
We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information... We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information receiver can the unknown states in the sender's qubits be fully reconstructed in the receiver's qubits. In our method, agents's control parameters are obtained via quantum entanglement swapping. As the realization of the many-agent controlled teleportation is concerned, compared to the recent method [G.P. Yang, et al., Phys. Rev. A 70 (2004) 022329], our present method considerably reduces the preparation difficulty of initial states and the identification difficulty of entangled states, moreover, it does not need local Hadamard operations and it is more feasible in technology. 展开更多
关键词 quantum teleportation quantum information quantum entanglement swapping
在线阅读 下载PDF
上一页 1 2 104 下一页 到第
使用帮助 返回顶部