The biggest obstacle for long distance quantum communication is the channel loss and the channel noise on photons. In this paper,a method to solve this problem was analyzed using inspection and power insertion (IPI). ...The biggest obstacle for long distance quantum communication is the channel loss and the channel noise on photons. In this paper,a method to solve this problem was analyzed using inspection and power insertion (IPI). It is proved that quantum communication may be established over arbitrarily long distance using this technology. The amount of resources required is a polynomial function of the dis-tance. IPI is proposed as a general technique to prolong quantum secure direct communication where secret messages are transmitted directly over a quantum channel.展开更多
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable(CV) quantum key distribution(QKD). The calculation shows that secret key can b...In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable(CV) quantum key distribution(QKD). The calculation shows that secret key can be distilled with a Gaussian quantum discord state against entangling cloner attack. Secret key rate is increased with the increasing of quantum discord for CV QKD with the Gaussian quantum discord state. Although the calculated results point out that secret key rate using the Gaussian quantum discord state is lower than that using squeezed state and coherent state at the same energy level, we demonstrate that the Gaussian quantum discord, which only involving quantum correlation without the existence of entanglement, may provide a new resource for realizing CV QKD.展开更多
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the f...A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.展开更多
A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical i...A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.展开更多
A new quantum communication scheme based on entanglement swapping is presented. Simplified calculation symbols are adopted to realize the process. Quantum key distribution and quantum secure direct communication can b...A new quantum communication scheme based on entanglement swapping is presented. Simplified calculation symbols are adopted to realize the process. Quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. Two legitimate communicators can secretly share four certain key bits and four random key bits via three EPR pairs (quantum channels).展开更多
Because of the quantization noise introduced during the compression,super-resolution reconstruction(SRR)techniques are complicated for the compressed images.This paper aims to incorporate the prior knowledge of discre...Because of the quantization noise introduced during the compression,super-resolution reconstruction(SRR)techniques are complicated for the compressed images.This paper aims to incorporate the prior knowledge of discrete cosine transform(DCT)coefficients into modeling the quantization noise.The spatial covariance matrix of the quantization noise is estimated by utilizing the Laplacian distribution of the alternating current(AC)coefficients.After estimating the spatial joint covariance of overall noises for the imaging system,we propose a general Bayesian framework to enhance the resolution for compressed images.Experiments demonstrate the effectiveness of the proposed algorithm and show the superiority to previous methods in objective and subjective aspects.展开更多
A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys...A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.展开更多
基金Supported by the National Basic Research Program of China (Grant No.2006CB921106)National Natural Science Foundation of China (Grant No.10325521)Key Project of Ministry of Education of China (Grant No.306020)
文摘The biggest obstacle for long distance quantum communication is the channel loss and the channel noise on photons. In this paper,a method to solve this problem was analyzed using inspection and power insertion (IPI). It is proved that quantum communication may be established over arbitrarily long distance using this technology. The amount of resources required is a polynomial function of the dis-tance. IPI is proposed as a general technique to prolong quantum secure direct communication where secret messages are transmitted directly over a quantum channel.
基金supported by the National Basic Research Program of China(2010CB923103)the National Natural Science Foundation of China(11174188,61121064)+1 种基金Shanxi Scholarship Council of China(2012-010)Program for the Outstanding Innovative Teams of Higher Learning Institutions of Shanxi
文摘In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable(CV) quantum key distribution(QKD). The calculation shows that secret key can be distilled with a Gaussian quantum discord state against entangling cloner attack. Secret key rate is increased with the increasing of quantum discord for CV QKD with the Gaussian quantum discord state. Although the calculated results point out that secret key rate using the Gaussian quantum discord state is lower than that using squeezed state and coherent state at the same energy level, we demonstrate that the Gaussian quantum discord, which only involving quantum correlation without the existence of entanglement, may provide a new resource for realizing CV QKD.
文摘A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.
基金The project supported by the National Fundamental Research Program under Grant No. 2006CB0L0106, National Natural Science Foundation of China under Grant Nos. 60433050, 10325521, and 10447106, and the SRFDP Program of Education Ministry of China and Beijing Education Committee under Grant No. XK100270454
文摘A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.
基金The project supported by National Natural Science Foundation of China under Grant No. 60472017
文摘A new quantum communication scheme based on entanglement swapping is presented. Simplified calculation symbols are adopted to realize the process. Quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. Two legitimate communicators can secretly share four certain key bits and four random key bits via three EPR pairs (quantum channels).
基金The Advanced Research of Shanghai Technical Committee(No.03DZ05020)
文摘Because of the quantization noise introduced during the compression,super-resolution reconstruction(SRR)techniques are complicated for the compressed images.This paper aims to incorporate the prior knowledge of discrete cosine transform(DCT)coefficients into modeling the quantization noise.The spatial covariance matrix of the quantization noise is estimated by utilizing the Laplacian distribution of the alternating current(AC)coefficients.After estimating the spatial joint covariance of overall noises for the imaging system,we propose a general Bayesian framework to enhance the resolution for compressed images.Experiments demonstrate the effectiveness of the proposed algorithm and show the superiority to previous methods in objective and subjective aspects.
文摘A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.