搜索筛选:
搜索耗时0.0839秒,为你在为你在102,285,761篇论文里面共找到 37 篇相符的论文内容
类      型:
[期刊论文] 作者:YANG Yu-Guang,WEN Qiao-Yan, 来源:理论物理通讯:英文版 年份:2009
We present a(t,n)threshold multiparty controlled quantum teleportation protocol of an arbitrary m-qubitquantum state between two remote parties.The unknown...
[期刊论文] 作者:TONG Xin,WEN Qiao-yan, 来源:中国邮电高校学报(英文版) 年份:2007
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan, 来源:中国物理(英文版) 年份:2007
An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3(×)3 Hilbert space is presented. The sender, Alice, disorders the o...
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan, 来源:中国物理B(英文版) 年份:2009
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan, 来源:中国物理B(英文版) 年份:2008
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons.A polarized single photon sequence runs circularly a...
[期刊论文] 作者:Qin Su-Juan,Wen Qiao-Yan, 来源:中国物理B(英文版) 年份:2010
[期刊论文] 作者:Wang Tian-Yin,Wen Qiao-Yan, 来源:中国物理B(英文版) 年份:2010
[期刊论文] 作者:Wang Tian-Yin,Wen Qiao-Yan, 来源:中国物理B(英文版) 年份:2011
[期刊论文] 作者:ZHANG Jie,WEN Qiao-yan,, 来源:The Journal of China Universities of Posts and Telecommunica 年份:2013
Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic im...
[期刊论文] 作者:QIN Su-Juan,WEN Qiao-Yan,MENG, 来源:理论物理通讯:英文版 年份:2009
We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protoco...
[期刊论文] 作者:GUO Fen-zhuo,WEN Qiao-yan,ZHU, 来源:中国邮电高校学报 年份:2004
[期刊论文] 作者:LI Yu-ying,WEN Qiao-yan,LI Li-, 来源:中国邮电高校学报(英文版) 年份:2004
The chaotic ant swarm algorithm (CAS) is an optimization algorithm based on swarm intelligence theory, and it is inspired by the chaotic and self-organizing beh...
[期刊论文] 作者:GAO Fei,WEN Qiao-yan,ZHU Fu-ch, 来源:中国邮电高校学报(英文版) 年份:2004
In this paper two Quantum Key Distribution (QKD) protocols are proposed, which combined BBS4 protocol and EPR protocol subtly. In our protocols, entangled parti...
[期刊论文] 作者:Chen Xiu-Bo,Wen Qiao-Yan,Zhu Fu-Chen, 来源:中国物理(英文版) 年份:2006
This paper proposes a scheme for teleporting a kind of essential three-particle non-symmetric entangled state,which is much more valuable than a GHZ and W state...
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan,Zhu Fu-Chen, 来源:中国物理(英文版) 年份:2007
In this paper an efficient quantum secure direct communication (QSDC) scheme with authentication is presented,which is based on quantum entanglement and polariz...
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan,Zhu Fu-Chen, 来源:中国物理(英文版) 年份:2006
A conclusive teleportation protocol of a d-dimensional two-particle unknown quantum state using three ddimensional particles in an arbitrary pure state is propo...
[期刊论文] 作者:Yang Yu-Guang,Wen Qiao-Yan,Zhu Fu-Chen, 来源:中国物理(英文版) 年份:2007
An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the n( )n(n ≥ 3) Hilbert space is presented. In this protocol,...
[期刊论文] 作者:Wang Tian-Yin,Wen Qiao-Yan,Zhu Fu-Chen, 来源:中国物理B(英文版) 年份:2009
[期刊论文] 作者:Gao Fei,Wen Qiao-Yan,Zhu Fu-Chen, 来源:中国物理B(英文版) 年份:2008
The quantum secure direct communication(QSDC)protocol with a random basis and order is analysed and an effective attack,i.e.teleportation attack,is presented.An...
[期刊论文] 作者:Yang Yu-Guang,Cao Wei-Feng,Wen Qiao-Yan, 来源:中国物理B(英文版) 年份:2010
相关搜索: