In this paper, we study the unconditional security of the so-called measurement-device-independent quantum key distribution (MDIQKD) with the basis-dependent flaw in the context of phase encoding schemes. We propose t...
详细信息
In this paper, we study the unconditional security of the so-called measurement-device-independent quantum key distribution (MDIQKD) with the basis-dependent flaw in the context of phase encoding schemes. We propose two schemes for the phase encoding: The first one employs a phase locking technique with the use of non-phase-randomized coherent pulses, and the second one uses conversion of standard Bennett-Brassard 1984 (BB84) phase encoding pulses into polarization modes. We prove the unconditional security of these schemes and we also simulate the key generation rate based on simple device models that accommodate imperfections. Our simulation results show the feasibility of these schemes with current technologies and highlight the importance of the state preparation with good fidelity between the density matrices in the two bases. Since the basis-dependent flaw is a problem not only for MDIQKD but also for standard quantum key distribution (QKD), our work highlights the importance of an accurate signal source in practical QKD systems.
This paper presents a new 3-d data hiding scheme. By using geometry images, we transform the 3-d data hiding problem into the 2-d image data hiding problem where efficient algorithms can be applied. A modified LSB emb...
详细信息
Achieving global asymptotic stabilization of rigid-body attitude is impossible using smooth feedback due to topological obstructions. In this paper, we propose a hybrid feedback that coordinates a "synergistic&qu...
详细信息
Achieving global asymptotic stabilization of rigid-body attitude is impossible using smooth feedback;however, this obstruction can be overcome using a hybrid controller that coordinates a "synergistic" famil...
详细信息
We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher, who wishes to reach the object by querying sensors placed in the pl...
详细信息
We study the existence of absolutely maximally entangled (AME) states in quantum mechanics and its applications to quantum information. AME states are characterized by being maximally entangled for all bipartitions of...
详细信息
We study the existence of absolutely maximally entangled (AME) states in quantum mechanics and its applications to quantum information. AME states are characterized by being maximally entangled for all bipartitions of the system and exhibit genuine multipartite entanglement. With such states, we present a parallel teleportation protocol which teleports multiple quantum states between groups of senders and receivers. The notable features of this protocol are that (i) the partition into senders and receivers can be chosen after the state has been distributed, and (ii) one group has to perform joint quantum operations while the parties of the other group only have to act locally on their system. We also prove the equivalence between pure state quantum secret sharing schemes and AME states with an even number of parties.
In this paper,we derive in time domain the constitutive equation and relevant properties of the fractional order weighted distributed parameter Maxwell *** weight function can be replaced by the Fourier series,which l...
详细信息
In this paper,we derive in time domain the constitutive equation and relevant properties of the fractional order weighted distributed parameter Maxwell *** weight function can be replaced by the Fourier series,which leads to three types of fractional order distributed parameter *** inverse Laplace transformand asymptotic properties
This paper describes the implementation of Wavelet Transform and Spectral Energy analysis on samples of simulated voltage and current waveforms obtained from PSCAD/EMTDC for each of the all possible fault scenarios in...
详细信息
This paper presents modeling of the 500 kV transmission line located between Bang-Saphan 2 (BSP2) and Chom-Bung (CBG) substations, Thailand. The network is modeled based on the transient simulation program- PSCAD/EMTD...
详细信息
In this paper a new identification method for non-linear hybrid systems that have mixed continuous and discrete states by using fuzzy clustering and principal component analysis is described. The method first determin...
详细信息
暂无评论