搜索筛选:
搜索耗时0.0839秒,为你在为你在102,285,761篇论文里面共找到 37 篇相符的论文内容
发布年度:
[期刊论文] 作者:YANG Yu-Guang,WEN Qiao-Yan,
来源:理论物理通讯:英文版 年份:2009
We present a(t,n)threshold multiparty controlled quantum teleportation protocol of an arbitrary m-qubitquantum state between two remote parties.The unknown...
[期刊论文] 作者:TONG Xin,WEN Qiao-yan,
来源:中国邮电高校学报(英文版) 年份:2007
...
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan,
来源:中国物理(英文版) 年份:2007
An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3(×)3 Hilbert space is presented. The sender, Alice, disorders the o...
,Economical multiparty simultaneous quantum identity authentication based on Greenberger-Horne-Zeili
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan,
来源:中国物理B(英文版) 年份:2009
...
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan,
来源:中国物理B(英文版) 年份:2008
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons.A polarized single photon sequence runs circularly a...
,Improving the security of secure deterministic communication scheme based on quantum remote state p
[期刊论文] 作者:Qin Su-Juan,Wen Qiao-Yan,
来源:中国物理B(英文版) 年份:2010
...
[期刊论文] 作者:Wang Tian-Yin,Wen Qiao-Yan,
来源:中国物理B(英文版) 年份:2010
...
[期刊论文] 作者:Wang Tian-Yin,Wen Qiao-Yan,
来源:中国物理B(英文版) 年份:2011
...
[期刊论文] 作者:ZHANG Jie,WEN Qiao-yan,,
来源:The Journal of China Universities of Posts and Telecommunica 年份:2013
Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic im...
[期刊论文] 作者:QIN Su-Juan,WEN Qiao-Yan,MENG,
来源:理论物理通讯:英文版 年份:2009
We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protoco...
[期刊论文] 作者:GUO Fen-zhuo,WEN Qiao-yan,ZHU,
来源:中国邮电高校学报 年份:2004
...
[期刊论文] 作者:LI Yu-ying,WEN Qiao-yan,LI Li-,
来源:中国邮电高校学报(英文版) 年份:2004
The chaotic ant swarm algorithm (CAS) is an optimization algorithm based on swarm intelligence theory, and it is inspired by the chaotic and self-organizing beh...
[期刊论文] 作者:GAO Fei,WEN Qiao-yan,ZHU Fu-ch,
来源:中国邮电高校学报(英文版) 年份:2004
In this paper two Quantum Key Distribution (QKD) protocols are proposed, which combined BBS4 protocol and EPR protocol subtly. In our protocols, entangled parti...
[期刊论文] 作者:Chen Xiu-Bo,Wen Qiao-Yan,Zhu Fu-Chen,
来源:中国物理(英文版) 年份:2006
This paper proposes a scheme for teleporting a kind of essential three-particle non-symmetric entangled state,which is much more valuable than a GHZ and W state...
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan,Zhu Fu-Chen,
来源:中国物理(英文版) 年份:2007
In this paper an efficient quantum secure direct communication (QSDC) scheme with authentication is presented,which is based on quantum entanglement and polariz...
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan,Zhu Fu-Chen,
来源:中国物理(英文版) 年份:2006
A conclusive teleportation protocol of a d-dimensional two-particle unknown quantum state using three ddimensional particles in an arbitrary pure state is propo...
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan,Zhu Fu-Chen,
来源:中国物理(英文版) 年份:2007
An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the n( )n(n ≥ 3) Hilbert space is presented. In this protocol,...
[期刊论文] 作者:Wang Tian-Yin,Wen Qiao-Yan,Zhu Fu-Chen,
来源:中国物理B(英文版) 年份:2009
...
[期刊论文] 作者:Gao Fei,Wen Qiao-Yan,Zhu Fu-Chen,
来源:中国物理B(英文版) 年份:2008
The quantum secure direct communication(QSDC)protocol with a random basis and order is analysed and an effective attack,i.e.teleportation attack,is presented.An...
[期刊论文] 作者:Yang Yu-Guang,Cao Wei-Feng,Wen Qiao-Yan,
来源:中国物理B(英文版) 年份:2010
...
相关搜索: