Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Yangyang, Fei"'
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-11 (2021)
Abstract Quantum random number generator (QRNG) relies on the intrinsic randomness of quantum mechanics to produce true random numbers which are important in information processing tasks. Due to the presence of the superposition state, a quantum comp
Externí odkaz:
https://doaj.org/article/5453bcecd2fa49edbb19a7bd7db3001c
To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the th
Externí odkaz:
http://arxiv.org/abs/1507.06528
Publikováno v:
Entropy, Vol 24, Iss 10, p 1428 (2022)
The variational quantum algorithm (VQA) is a hybrid classical–quantum algorithm. It can actually run in an intermediate-scale quantum device where the number of available qubits is too limited to perform quantum error correction, so it is one of th
Externí odkaz:
https://doaj.org/article/0fe8589148d34a0482ced605da9fe2ba
Publikováno v:
Entropy, Vol 24, Iss 7, p 955 (2022)
In this paper, we consider the optimization of the quantum circuit for discrete logarithm of binary elliptic curves under a constrained connectivity, focusing on the resource expenditure and the optimal design for quantum operations such as the addit
Externí odkaz:
https://doaj.org/article/eabee561ad424d53afdff292f3554340
Publikováno v:
IEEE Transactions on Services Computing. 16:773-786
Publikováno v:
Optical Engineering. 60
Based on the intrinsic randomness of quantum mechanics, quantum random number generators (QRNGs) can produce true random numbers in theory. However, in realistic scenarios, the physical devices of QRNGs may have imperfections or be controlled by some
Publikováno v:
Quantum Information Processing. 20
Solving algebraic equations over GF(2) is a problem which has a wide range of applications, including NP-Hard problems and problems related to cryptography. The existing mature algorithms are difficult to solve large-scale problems. Inspired by Schon
Publikováno v:
Optik. 170:368-375
We propose a modified attack on the calibration stage of polarized-based passive-basis-choice BB84 quantum key distribution (QKD) systems, where the activation windows of the detectors are scanned independently, by exploiting the wavelength-dependent
Publikováno v:
Optics Communications. 419:83-89
The temperature of the semiconductor diode increases under strong light illumination whether thermoelectric cooler is installed or not, which changes the output wavelength of the laser (Lee M. S. et al., 2017). However, other characteristics also var
Publikováno v:
The European Physical Journal D. 72
Decoy state method is widely used in practical quantum key distribution (QKD) systems to substantially extend the secure communication distance. Detector efficiency mismatch (DEM), which exists between practical detectors, effects the security of pra