搜索筛选:
搜索耗时0.0848秒,为你在为你在102,285,761篇论文里面共找到 27 篇相符的论文内容
类      型:
[期刊论文] 作者:GUO Ying,ZENG Gui-Hua, 来源:理论物理通讯:英文版 年份:2007
用二个 non-orthogonalentangled 状态的一个确定的量钥匙分发计划被建议。在建议计划,通信员由与二个随机、秘密的极化角度交换一个旅行光子分享关键信息。分布式的钥匙的安...
[期刊论文] 作者:LI Yuan ZENG Gui-Hua, 来源:理论物理通讯:英文版 年份:2008
In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize...
[期刊论文] 作者:GUO Ying ZENG Gui-Hua, 来源:理论物理通讯:英文版 年份:2006
当在量信号处理的时间变量是分离的时, Fouriertransform 在 Galois 域 F_2 上在 n 元组的向量空间存在,它在量信号的调查起一个重要作用。由使用 Fourier 变换,编码理论的量的...
[期刊论文] 作者:HE Guang-Qiang ZENG Gui-Hua, 来源:理论物理通讯:英文版 年份:2006
[期刊论文] 作者:He Guang-Qiang,Zeng Gui-Hua, 来源:中国物理(英文版) 年份:2006
This paper proposes a deterministic quantum key distribution scheme based on Gaussian-modulated continuous variable EPR correlations. This scheme can implement...
[期刊论文] 作者:He Guang-Qiang,Zeng Gui-Hua, 来源:中国物理(英文版) 年份:2005
Aquantum idetification scheme including registration and identification phases is proposed.The user’ passwords are transmitted by qubit string and recorded as...
[期刊论文] 作者:Zhou Nan-Run,Zeng Gui-Hua, 来源:中国物理(英文版) 年份:2005
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation.System extension and bit-swapping are introduced int...
[期刊论文] 作者:Li Yuan,Zeng Gui-Hua, 来源:中国物理(英文版) 年份:2007
In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme base...
[期刊论文] 作者:He Guang-Qiang,Zeng Gui-Hua, 来源:中国物理(英文版) 年份:2006
A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization stat...
[期刊论文] 作者:Wang Hui-Song,Zeng Gui-Hua, 来源:中国物理B(英文版) 年份:2008
In this paper,the effect of imperfect channel state information at the receiver, which is caused by noise and other interference, on the multi-access channel ca...
[期刊论文] 作者:YAO Jun,ZENG Gui-hua, 来源:上海交通大学学报(英文版) 年份:2006
Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold gr...
[期刊论文] 作者:XIONG Jin,ZENG Gui-Hua, 来源:中国物理快报(英文版) 年份:2005
We derive an expression of the interaction between a quantum cavity field and an ultracold A-type three-level atom in which two upper levels are coupled by a co...
[期刊论文] 作者:LIU Jing-neng,ZENG Gui-hua, 来源:上海交通大学学报(英文版) 年份:2012
[期刊论文] 作者:XIAO Jun-fang,ZENG Gui-hua, 来源:上海交通大学学报(英文版) 年份:2009
Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitable way used in WSN. But k......
[期刊论文] 作者:GUO Ying,ZENG Gui-Hua,Moon Ho, 来源:理论物理通讯:英文版 年份:2008
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quan- tum states from different senders to a distance receiver...
[期刊论文] 作者:Guo Ying,Chen Zhi-Gang,Zeng Gui-Hua, 来源:中国物理(英文版) 年份:2007
Based on the techniques of the quantum remote state preparation via a deterministic way, this paper proposes a quantum communication scheme to distribute the se...
[期刊论文] 作者:Zhu Jun,He Guang-Qiang,Zeng Gui-Hua, 来源:中国物理(英文版) 年份:2007
In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky- Rosen (EPR) pairs is investigated. A...
[期刊论文] 作者:Li Yuan,Zeng Gui-Hua,Moon Ho-Lee, 来源:中国物理B(英文版) 年份:2009
In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes....
[期刊论文] 作者:XIONG Jin,ZENG Gui-Hua,ZHOU Nan-Run, 来源:中国物理快报(英文版) 年份:2005
We find that second-order coherence as well as a Hanbury-Brown-Twiss intensity interferometer may provide an optimal approach for eavesdropping detection in the...
[期刊论文] 作者:GUO Ying,ZENG Gui-Hua,CHEN Zhi-Gang, 来源:中国物理快报(英文版) 年份:2007
A quantum secret sharing scheme is proposed by making use of quantum registers.In the proposed scheme,secret message state is encoded into multipartite entangle...
相关搜索: