Quantum Private Comparison via Cavity QED
|
|
- Camilla Berry
- 5 years ago
- Views:
Transcription
1 Commun. Theor. Phys. 67 (2017) Vol. 67, No. 2, February 1, 2017 Quantum Prvate Comparson va Cavty QED Tan-Yu Ye ( 叶天语 ) College of Informaton and Electronc Engneerng, Zhejang Gongshang Unversty, Hangzhou , Chna (Receved August 18, 2016; revsed manuscrpt receved October 9, 2016) Abstract The frst quantum prvate comparson (QPC) protocol va cavty quantum electrodynamcs (QED) s proposed n ths paper by makng full use of the evoluton law of atom va cavty QED, where the thrd party (TP) s allowed to msbehave on hs own but cannot conspre wth ether of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the ntal quantum resource, and only needs sngle-atom measurements for two users. Both the untary operatons and the quantum entanglement swappng operaton are not necessary for the proposed protocol. The proposed protocol can compare the equalty of one bt from each user n each round comparson wth one two-atom product state. The proposed protocol can resst both the outsde attack and the partcpant attack. Partcularly, t can prevent TP from knowng two users secrets. Furthermore, the qubt effcency of the proposed protocol s as hgh as 50%. PACS numbers: Dd, Hk, Pp DOI: / /67/2/147 Key words: quantum prvate comparson (QPC), thrd party (TP), cavty quantum electrodynamcs (QED), product state, partcpant attack 1 Introducton In the past two decades, quantum nformaton processng had greatly aroused the nterest of researchers throughout the world and ganed consderable developments. Quantum cryptography, whch was frst proposed by Bennett and Brassard [1] n 1984, s the development outcome of quantum nformaton processng n the realm of cryptography. It can attan uncondtonal securty on the bass of quantum mechancs prncples such as the Hesenberg uncertanty prncple, the quantum no-clonng theorem and so on, and has greatly attracted the attentons of many researchers. Up to now, t has establshed many branches, such as quantum key dstrbuton (QKD), [1 10] quantum secret sharng (QSS), [11 15] quantum secure drect communcaton (QSDC), [16 24] quantum dalogue (QD), [25 31] quantum teleportaton (QT) [32 37] etc. Quantum prvate comparson (QPC), whch was frst suggested by Yang et al. [38] n 2009, s another nterestng branch of quantum cryptography. It ams to compare the equalty of secrets from dfferent users wthout leakng them out on the bass of quantum mechancs prncples. As ponted out by Lo [39] that t s mpossble to securely evaluate the equalty functon n a two-party scenaro, QPC always requres some addtonal assumptons such as a thrd party (TP), etc. In recent years, QPC has been greatly developed so that dfferent quantum states and dfferent quantum technologes have been utlzed to construct dfferent knds of QPC protocols. There are QPC protocols wth sngle partcles, [40 43] Bell states, [38,42,44 52] GHZ states, [53 56] W states, [52,57 58] cluster states, [59 60] χ-type entangled states. [61 63] There are QPC protocols requrng the untary operatons [38,40,43,45,53 54,57,59 60,62] and QPC protocols requrng the quantum entanglement swappng operaton. [44,50 52,55,61] At present, the physcal systems for realzng quantum nformaton processng manly nclude cavty quantum electrodynamcs (QED), on trap, nuclear magnetc resonance, quantum dot, superconductng system wth Josephson effect, etc. [64] Many works, such as entanglement detecton, [65] Bell-state analyss, [66 67] entanglement concentraton, [68 71] entanglement purfcaton, [72] entanglement generaton [71,73 74] and quantum repeater, [75] have been realzed va these physcal systems. Cavty QED can guarantee a hgh level of coherence so that t s an deal canddate for the experment of quantum nformaton processng. [64] Cavty QED has become one of the most promsng physcal systems due to ts unque contrbuton. Based on the above analyss, followng some deas n the protocol of Ref. [46], we put forward the frst QPC protocol va cavty QED by makng full use of the evoluton law of atom va cavty QED. Dfferent from the standard sem-honest TP frst proposed by Chen et al., [53] n our protocol, TP s assumed to be a more practcal thrd party. That s, TP s allowed to msbehave on hs own but cannot conspre wth ether of the two users. Smlar to the protocol of Ref. [41], our protocol adopts product states rather than entangled states as the ntal quantum resource. Unlke the protocols of Refs. [38,40,43,45,53 54,57,59-60,62], our protocol does not need the untary operatons. Unlke the protocols of Refs. [44,50 52,55,61], our protocol does not need the quantum entanglement swappng operaton. Supported by the Natonal Natural Scence Foundaton of Chna under Grant No E-mal: happyyty@alyun.com c 2017 Chnese Physcal Socety and IOP Publshng Ltd
2 148 Communcatons n Theoretcal Physcs Vol. 67 The rest of ths paper s organzed as follows. Secton 2 ntroduces the model of cavty QED. Secton 3 llustrates the QPC protocol va cavty QED. Secton 4 analyzes ts correctness, securty and qubt effcency. Secton 5 dscusses ts comparson wth some prevous QPC protocols. Secton 6 gves the concluson. 2 Model of Cavty QED Drven by a classcal feld, two dentcal two-level atoms can smultaneously nteract wth a sngle-mode cavty. The nteracton Hamltonan between the sngle-mode cavty and the atoms under the rotatng-wave approxmaton can be depcted as [73 74,76 77] 2 H = ω 0 S Z + ω a a a + [g(a S j + as j ) j=1 + Ω(S j e wt + S j e wt )] (1) Here, S Z = (1/2) 2 j=1 ( e j e j g j g j ), S j = g j e j and S j = e j g j, where g j and e j are the ground and excted states of the j-th atom, respectvely. g s the atomcavty couplng strength. a and a are the annhlaton and creaton operators for the cavty mode, respectvely. ω 0, ω a, ω, and Ω are the atomc transton frequency, the cavty frequency, the classcal feld frequency and the Rab frequency, respectvely. t s the nteracton tme. Gven that ω = ω 0, the evoluton operator of the system n the nteracton pcture can be expressed as [73 74,76 77] U(t) = e H0t e Het, (2) where H 0 = Ω 2 j=1 (S j + S j ), and H e s the effectve Hamltonan. Consderng the large detunng case δ g (δ s the detunng between ω 0 and ω a ) and the strong drvng regme Ω δ, g, there s no energy exchange between the atomc system and the cavty. As a result, the effects of cavty decay and thermal feld are erased. Consequently, the effectve nteracton Hamltonan H e n the nteracton pcture can be descrbed as [73 74,76 77] [ 2 H e = (λ/2) ( e j e j + g j g j ) + 2 j=1,j=1, j (S S j + S S j + H.C.) ] where λ = g 2 /2δ. When two atoms are sent nto the above cavty smultaneously, drven by a classcal feld, they nteract wth t. If the nteracton tme and the Rab frequency are made to satsfy λt = π/4 and Ωt = π, two atoms wll have the followng evoluton: 2 gg jk 2 e π/4 ( gg jk ee jk ), (4) 2 ge jk 2 e π/4 ( ge jk eg jk ), (5) 2 eg jk 2 e π/4 ( eg jk ge jk ), (6) 2 ee jk 2 e π/4 ( ee jk gg jk ). (7) (3) 3 QPC Protocol va Cavty QED Two users, Alce and Bob, want to know whether ther secrets are equal or not under the help of TP, who s allowed to msbehave on hs own but cannot conspre wth ether of them. Assume that X and Y are Alce and Bob s secrets, respectvely, where X = L 1 j=0 x j2 j, Y = L 1 j=0 y j2 j, x j, y j {0, 1}. Alce and Bob share two common key sequences K A and K B ndvdual wth length L through the QKD protocols [1 10] beforehand. Here, KA, K B {0, 1}, where KA s the -th bt of K A, KB s the -th bt of K B, and = 1, 2,..., L. The QPC protocol va cavty QED s constructed as follows: Step 1 Alce (Bob) dvdes the bnary representaton of X(Y ) nto L groups G 1 A, G2 A,..., GL A (G1 B, G2 B,..., GL B ), where each group contans one bnary bt. Step 2 TP prepares a quantum state sequence composed of L product states, each of whch s randomly n one of the four states { gg, ge, eg, ee }. Ths quantum state sequence s denoted as S = [SaS 1 b 1, S2 asb 2,..., SL a Sb L ]. Here, the subscrpts a, b represent two atoms n one product state, whle the superscrpts 1, 2,..., L denote the orders of product states n S. Step 3 TP sends SaS b ( = 1, 2,..., L) nto the snglemode cavty descrbed above. Drven by a classcal feld, the two atoms Sa and Sb smultaneously nteract wth the sngle-mode cavty. TP chooses the Rab frequency and the nteracton tme to satsfy Ωt = π and λt = π/4. As a result, SaS b wll undergo the evoluton as shown n formulas (4) (7). Obvously, Sa and Sb become entangled together after the evoluton. After they fly out the snglemode cavty, TP pcks up Sa and Sb to form sequences S a and S b, respectvely. That s, S a = [Sa, 1 Sa, 2..., Sa L ] and S b = [Sb 1, S2 b,..., SL b ]. For securty check, TP prepares two sets of sample sngle atoms D a and D b randomly n one of the four states { g, e, +, }. Here, ± = (1/ 2)( g ± e ). Note that { g, e } s denoted as Z bass whle { +, } s denoted as X bass. Then, TP randomly nserts D a (D b ) nto S a (S b ) to form a new sequence S a(s b ). Fnally, TP sends S a(s b ) to Alce (Bob). After confrmng that Alce (Bob) has receved S a(s b ), TP tells Alce (Bob) the postons and the preparaton bass of sample sngle atoms from D a (D b ). Then, Alce (Bob) measures the sample sngle atoms n S a(s b ) wth the bass TP told and tells TP her (hs) measurement results. By comparng the ntal states of sample sngle atoms n S a(s b ) wth Alce s (Bob s) measurement results, TP can judge whether the quantum channel s secure or not durng the transmsson of S a(s b ). If the error rate s unreasonably hgh, the communcaton s stopped; otherwse, Alce (Bob) drops out the sample sngle atoms n
3 No. 2 Communcatons n Theoretcal Physcs 149 S a(s b ) to recover S a(s b ), and goes to the next step. Fg. 1 The flow chart of the proposed QPC protocol,takng SaS b for example. (a) TP prepares quantum product state SaS b as the quantum carrer. Here, the sold ellpse denotes a partcpant, whle the sold rectangle denotes the quantum state preparaton operaton; (b) TP sends atom Sa(S b) nto cavty QED for evoluton, and transmts t to Alce (Bob) after t fles out cavty QED. Here, the sold crcle denotes cavty QED, whle the sold lne wth an arrow denotes the quantum state transmsson operaton; (c) Alce (Bob) measures atom Sa(S b) wth Z bass, computes RA(R B) and sends RA(R B) to TP. Here, the dotted rectangle, the dotted crcle and the dotted lne wth an arrow denote the quantum measurement operaton wth Z bass, the classcal computaton operaton and the classcal nformaton transmsson operaton, respectvely; (d) TP computes R, and sends R to Alce and Bob; (e) Alce and Bob compute R. Step 4 For the -th ( from 1 to L) round comparson, Alce (Bob) measures atom Sa(S b ) wth Z bass. The measurement result of Sa(S b ) s coded wth one classcal bt whch s represented by MA (M B ). Concretely speakng, f the measurement result of Sa(S b ) s g, M A (M B ) wll be 0; otherwse, f the measurement result of Sa(S b ) s e, MA (M B ) wll be 1. Then, Alce (Bob) computes RA = G A M A K A (R B = G B M B K B ). Here, s the module 2 operaton. Fnally, Alce (Bob) tells TP RA (R B ) publcly. Step 5 TP transforms SaS b prepared n Step 2 nto one classcal bt MT accordng to ts ntal state. Concretely speakng, f the ntal state of SaS b s gg or ee, M T wll be 0; otherwse, f the ntal state of SaS b s ge or eg, MT wll be 1. That s, M T represents the party of Sa and Sb prepared by TP. Then, TP computes R = RA R B M T, and tells R to Alce and Bob publcly. Step 6 After recevng R, both Alce and Bob compute R = R KA K B. They termnate the protocol and conclude that X Y as long as they fnd out that R 0; otherwse, they set = + 1 and repeat the protocol from step 4. If they fnd out that R = 0 for all n the end, they wll conclude that X = Y. Now t concludes the descrpton of our protocol. For clarty, we further gve out the flow chart of our protocol n Fg. 1, takng SaS b for example. It should be emphaszed that n ths knd of dsspatve system, the effects of cavty decay and thermal feld are of great concerns. In order to erase the effects of cavty decay and thermal feld, we need to use the large detunng case and the strong drvng regme. That s, δ should be chosen to satsfy δ g and Ω should be chosen to satsfy Ω δ, g. In ths way, there s no energy exchange between the atomc system and the cavty. In addton, n order to make our protocol work well, formulas (4) (7) should be establshed frst. Therefore, both of λt = π/4 and Ωt = π should be also satsfed. 4 Analyss In ths secton, we analyze our protocol on three aspects ncludng the correctness of ts output, the securty and the qubt effcency. 4.1 Correctness In our protocol, under the help of TP, Alce and Bob compare the equalty of G A and G B n the -th round comparson by usng the evoluton law of SaS b va cavty QED. Here, G A s the -th bt of Alce s secret X, G B s the -th bt of Bob s secret Y, and SaS b s the -th product state n S prepared by TP. For convenence, we use IS to denote the ntal state of SaS b prepared by TP. Accordngly, MT s the one-bt classcal code of IS. Accordng to the descrpton of our protocol, t s apparent that MA s the one-bt classcal code of the Z bass measurement result of Sa after evoluton n cavty QED, and MB s the one-bt classcal code of the Z bass measurement result of Sb, after evoluton n cavty QED. Moreover, t follows that RA = G A M A K A, R B = G B M B K B, R = RA R B M T and R = R KA K B, where K A s the -th bt of K A, and KB s the -th bt of K B. The relatonshps of these essental varables n our protocol are further shown n Table 1. Accordng to formulas (4) (7) or Table 1, t s easy to get that MA M B M T = 0. Consequently, we obtan R = R K A K B = (R A R B M T ) K A K B
4 150 Communcatons n Theoretcal Physcs Vol. 67 = ((G A M A K A) (G B M B K B) M T ) K A K B = (G A G B) (M A M B M T ) = G A G B. (8) Accordng to formula (8), f R = 0, we wll get that G A = G B ; otherwse, we wll get that G A G B. It can be concluded now that the correctness of the output of our protocol s valdated. Table 1 The relatonshps of essental varables n the proposed QPC protocol (G A s the -th bt of Alce s secret X, and G B s the -th bt of Bob s secret Y ; IS denotes the ntal state of SaS b prepared by TP, and MT s the one-bt classcal code of IS ; SaS b after evoluton s the state of IS after evoluton n cavty QED; MA s the one-bt classcal code of the Z bass measurement result of Sa after evoluton n cavty QED, and MB s the one-bt classcal code of the Z bass measurement result of Sb after evoluton n cavty QED; KA s the -th bt of K A, and KB s the -th bt of K B; RA = G A MA K A, RB = G B MB KB, R = RA RB MT and R = R KA KB.) G A G B IS M T S as b (after evoluton) M A M B K A, K B R A R B R R 0 0 gg 0 gg 0 0 0, , , , ee 1 1 0, , , , ge 1 ge 0 1 0, , , , eg 1 0 0, , , , eg 1 ge 0 1 0, , , , eg 1 0 0, , , , ee 0 gg 0 0 0, , , , ee 1 1 0, , , , gg 0 gg 0 0 0, , , , ee 1 1 0, , , , ge 1 ge 0 1 0, ,
5 No. 2 Communcatons n Theoretcal Physcs 151 Table 1 (contnued) 1, , eg 1 0 0, , , , eg 1 ge 0 1 0, , , , eg 1 0 0, , , , ee 0 gg 0 0 0, , , , ee 1 1 0, , , , gg 0 gg 0 0 0, , , , ee 1 1 0, , , , ge 1 ge 0 1 0, , , , eg 1 0 0, , , , eg 1 ge 0 1 0, , , , eg 1 0 0, , , , ee 0 gg 0 0 0, , , , ee 1 1 0, , , , gg 0 gg 0 0 0, ,
6 152 Communcatons n Theoretcal Physcs Vol. 67 Table 1 (contnued) 1, , ee 1 1 0, , , , ge 1 ge 0 1 0, , , , eg 1 0 0, , , , eg 1 ge 0 1 0, , , , eg 1 0 0, , , , ee 0 gg 0 0 0, , , , ee 1 1 0, , , , Note that smlar to the QPC protocol of Ref. [46], our protocol utlzes the party of two atoms to accomplsh the equalty comparson of prvate secrets. Concretely speakng, n the -th round comparson, G A s encrypted wth MA and K A to derve R A, and G B s encrypted wth M B and KB to derve R B. Here, M A, K A, M B and K B play the role of one-tme-pad key. After dong the calculatons of R = RA R B M T and R = R KA K B, we get the XOR value of G A and G B, as shown n formula (8). As a result, the equalty comparson result of G A and G B can be easly obtaned. It s obvous that formula (8) reles deeply on the XOR relaton of MA, M B and M T,.e., MA M B M T = 0. Actually, M A M B essentally mples the party of two atoms Sa and Sb after evoluton va cavty QED, whle MT represents the party of S a and Sb before evoluton va cavty QED. Accordng to formulas (4) (7), the party of Sa and Sb keeps unchanged durng the evoluton va cavty QED so that MA M B M T = 0 s easly establshed, whch guarantees the correctness of the equalty comparson result of G A and G B. It can be concluded now that the party of two atoms Sa and Sb s utlzed to accomplsh the equalty comparson of G A and G B. Apparently, n the whole equalty comparson process of G A and G B, our protocol employs nether the untary operatons nor the quantum entanglement swappng operaton. 4.2 Securty The securty towards both the outsde attack and the partcpant attack s dscussed n ths secton. () Outsde Attack We analyze the outsde attack accordng to each step of our protocol. As for steps 1, 2, and 6, an outsde eavesdropper has no chance to launch an attack, snce there s not any quantum transmsson or classcal transmsson n these steps. As for step 3, there are quantum transmssons as TP sends S a(s b ) to Alce (Bob). An outsde eavesdropper may try to obtan the two users secrets by performng the ntercept-resend attack, the measure-resend attack, the entangle-measure attack, etc. Fortunately, the sample sngle atoms randomly n one of the four states { g, e, +, } are used to detect the outsde attack. Ths securty check method s equvalent to the decoy pho-
7 No. 2 Communcatons n Theoretcal Physcs 153 ton technology, [78 79] whch has been valdated n detal n Refs. [28 29]. Note that the decoy photon technology can be regarded as a varant of the BB84 securty check method, [1] whch has also been valdated n Ref. [80]. Therefore, the attacks from an outsde eavesdropper are nvald n ths step. As for step 4, Alce (Bob) tells TP RA (R B ), publcly. Apparently, G A (G B ) s encrypted wth K A (K B ) n ths step. However, an outsde eavesdropper has no knowledge about KA (K B ). In ths case, she stll has no access to G A (G B ), even though she hears R A (R B ) from Alce (Bob). As for step 5, TP tells R to Alce and Bob publcly. It can be derved that R = R A R B M T = (G A M A K A) (G B M B K B) M T = (G A K A) (G B K B). (9) Even though she hears R from TP, an outsde eavesdropper stll cannot extract anythng useful about G A or G B n ths step, as she has no access to K A and K B. It can be concluded now that our protocol has a hgh level of securty towards the outsde attack. () Partcpant Attack Partcpant attack s a knd of attack from a dshonest partcpant. As suggested by Gao et al., [81] partcpant attack s generally more powerful than outsde attack so that t should be pad more attenton to. Two cases of partcpant attack ncludng the attack from a dshonest user and the attack from TP are analyzed here. Case 1 The attack from a dshonest user In our protocol, Alce role s smlar to Bob s. Wthout loss of generalty, Alce s assumed to be the dshonest user who wants to obtan the secret of the other user. In step 3, Alce may want to ntercept S b TP sends to Bob. However, as she has no knowledge about the postons and the preparaton bass of sample sngle atoms from D b, she wll nevtably leave her trace and be caught as an outsde attacker f she launches ths attack. In step 4, Alce may hear RB from Bob. S a and Sb become entangled together after the evoluton va cavty QED n step 3. Snce Alce does not know the ntal product state of SaS b prepared by TP n step 2, she has no knowledge about the entangled state composed by Sa and Sb after the evoluton. Accordng to formulas (4) (7), she cannot correctly deduce MB from M A. The only thng she can do s to randomly guess the true value of MB. Because G B s encrypted wth M B, she cannot know G B at all. In step 5, Alce hears R from TP. Accordng to formula (8), she can obtan G B by computng G R A. However, our protocol has to be termnated as long as Alce and Bob fnd out that R 0 for certan. Therefore, Alce can know all the G B where R = 0 has been derved and only obtan at most 1 bt of the G B where 0 R has been derved. Case 2 The attack from TP In our protocol, TP s allowed to try hs best to obtan the secrets from two users wthout consprng wth ether of Alce and Bob. In step 4, Alce (Bob) tells TP RA (R B ) publcly. Snce TP has no access to KA (K B ) he stll cannot extract G A (G B ) from R A (R B ). In step 6, both Alce and Bob do not tell TP R. However, once the protocol s termnated by Alce and Bob n the mddle, TP naturally knows that X Y. Ths case happens wth the probablty of 1 (1/2) L 1. Or f the protocol s not termnated by Alce and Bob untl G L A and G L B are compared, TP has to randomly guess the comparson result between X and Y. Ths case happens wth the probablty of (1/2) L 1. It can be concluded that TP knows the exact comparson result between X and Y (.e. X Y ) wth the probablty of 1 (1/2) L Qubt Effcency The qubt effcency η e here s defned as η e = n c /n q, where n c and n q are the number of compared classcal bts and the number of consumed qubts n each round comparson, respectvely. [14 15] In our protocol, one twoatom product state can be used to compare one classcal bt from each user. Therefore, the qubt effcency of our protocol s 50%. 5 Dscusson We dscuss the comparson between our protocol and some prevous QPC protocols [38,41,46,52 53,58,60] n ths secton. The comparson result s summarzed n Table 2. Here, the symbol n s the comparson tmes on the condton that Alce and Bob s secrets are dentcal. From Table 2, we can conclude that the advantage of our protocol les n havng the followng features smultaneously: () It employs two-partcle product states as the ntal quantum resource, whch are much easer to prepare than entangled states; () It only needs to perform sngle-atom measurements, whch are easer to accomplsh than Bell state measurements; () It does not requre the untary operatons or the quantum entanglement swappng operaton; (v) It can be automatcally halted once Alce and Bob dscover the nequalty of ther secrets n the mddle, whch means that not all the secrets are necessary to be compared when ther secrets are not dentcal; (v) It has a hgh qubt effcency equal to 50%. It should be emphaszed that our protocol needs the use of QKD method to guarantee the securty, just as
8 154 Communcatons n Theoretcal Physcs Vol. 67 analyzed n Subsec Lkewse, the QPC protocol of Ref. [38] uses the hash functon to guarantee the securty. In fact, the QPC protocol n Ref. [53] s not secure, snce Alce and Bob can perform the ntercept-resend attack to obtan each other s secret wthout beng dscovered, just as ponted out by Ref. [54]. The QPC protocol n Ref. [46] s also not secure when TP s a more practcal thrd party who tres hs best to extract useful nformaton about two users secrets wth actve attacks, just as ponted out by Refs. [47 49]. When TP s a more practcal thrd party than the one assumed, the QPC protocols n Refs. [53,60] have the smlar securty loophole nduced by TP to that n Ref. [46] ndcated above. Actually, n ths case, the QKD method can be utlzed to guarantee the securty of the QPC protocols n Refs. [46,53,60]. In addton, dfferent from the QPC protocols n Refs. [38,41,46,52 53,58,60], our protocol s realzed va cavty QED, thus t can make full use of the evoluton law of atom va cavty QED. Actually, our protocol s the frst QPC protocol va cavty QED. Table 2 Comparson between our protocol and some prevous QPC protocols. Ref. [38] Ref. [41] Ref. [46] Ref. [52] Ref. [53] Ref. [58] Ref. [60] Our protocol Intal Bell Two-partcle Bell entangled Four-partcle GHZ Three-partcle Four-partcle Two-atom quantum entangled product states W entangled entangled W entangled cluster product resource states state states and states states entangled state Bell entangled states states Quantum Bell state Sngle- Sngle- Bell state Sngle- Sngle- Sngle- Snglepartcle partcle partcle partcle partcle atom measure- measure- measure- measure- measure- measure- measure- measure- measurement ments ments ments ments ments ements ments ments (except that for securty check) Use of QKD No (Use of Yes No Yes No Yes No Yes method Hash functon nstead) Use of Yes No No No Yes No Yes No untary operatons Use of No No No Yes No No No No entanglement swappng TP s No Yes Yes Yes Yes Yes (wth the Yes Yes (wth the knowledge probablty of probablty of about the 1 (1/2) L 1 ) 1 (1/2) L 1 ) comparson result Bt number L 1 1 L 1 1 L 1 compared each round Comparson 1 L L 1 L L 1 L tmes n Qubt eff- 25% 50% 50% 33% 33% 33% 25% 50% cency η e 6 Concluson In ths paper, by makng full use of the evoluton law of atom va cavty QED, we propose the frst QPC protocol va cavty QED. Here, TP s allowed to msbehave on hs own but cannot conspre wth ether of the two users. Our protocol adopts two-atom product states rather than entangled states as the ntal quantum resource, and only needs sngle-atom measurements for two users. It needs nether the untary operatons nor the quantum entanglement swappng operaton. It can compare the equalty of one bt from each user n each round comparson wth one two-atom product state. It can resst both the outsde attack and the partcpant attack. Partcularly, t can pre-
9 No. 2 Communcatons n Theoretcal Physcs 155 vent TP from knowng two users secrets. Moreover, ts qubt effcency s as hgh as 50%. Acknowledgements The author would lke to thank the anonymous revewers for ther valuable comments that help enhancng the qualty of ths paper. Complance wth ethcal standards Conflct of nterest: The authors declare that they have no conflct of nterest. References [1] C.H. Bennett and G. Brassard, Proc. IEEE Int. Conf. Computers, Systems and Sgnal Processng, IEEE Press, Bangalore (1984) [2] A.K. Ekert, Phys. Rev. Lett. 67 (1991) 661. [3] C.H. Bennett, G. Brassard, and N.D. Mermn, Phys. Rev. Lett. 68 (1992) 557. [4] A. Cabello, Phys. Rev. Lett. 85 (2000) [5] F.G. Deng and G.L. Long, Phys. Rev. A 68 (2003) [6] F.G. Deng and G.L. Long, Phys. Rev. A 70 (2004) [7] X.L. Su, Chn. Sc. Bull. 59 (2014) [8] C.M. Zhang, X.T. Song, P. Treevryanupab, et al., Chn. Sc. Bull. 59 (2014) [9] D.X. Quan, C.H. Zhu, S.Q. Lu, and C.X. Pe, Chn. Phys. B 24 (2015) [10] C.M. Zhang, M. L, Z.Q. Yn, et al., Sc. Chna-Phys. Mech. Astron. 58 (2015) [11] M. Hllery, V. Buzek, and A. Berthaume, Phys. Rev. A 59 (1999) [12] A. Karlsson, M. Koash, and N. Imoto, Phys. Rev. A 59 (1999) 162. [13] L. Xao, G.L. Long, F.G. Deng, and J.W. Pan, Phys. Rev. A 69 (2004) [14] J. Ln and T. Hwang, Opt. Commun. 284 (2011) [15] J.H. Chen, K.C. Lee, and T. Hwang, Int. J. Mod. Phys. C 20 (1999) [16] G.L. Long and X.S. Lu, Phys. Rev. A 65 (2002) [17] K. Bostrom and T. Felbnger, Phys. Rev. Lett. 89 (2002) [18] F.G. Deng, G.L. Long, and X.S. Lu, Phys. Rev. A 68 (2003) [19] F.G. Deng and G.L. Long, Phys. Rev. A 69 (2004) [20] C. Wang, F.G. Deng, Y.S. L, et al., Phys. Rev. A 71 (2005) [21] C. Wang, F.G. Deng, and G.L. Long, Opt. Commun. 253 (2005) 15; C. Wang, F.G. Deng, and G.L. Long, Opt. Commun. 262 (2006) 134. [22] Y. Chang, S.B. Zhang, L.L. Yan, and G.H. Han, Chn. Phys. B 24 (2015) [23] X.F. Zou and D.W. Qu, Sc. Chna-Phys. Mech. Astron. 57 (2014) [24] Y. Chang, C.X. Xu, S.B. Zhang, et al., Chn. Sc. Bull. 59 (2014) [25] Z.J. Zhang and Z.X. Man, (2004). [26] Z.J. Zhang and Z.X. Man, (2004). [27] B.A. Nguyen, Phys. Lett. A 328 (2004) 6. [28] Y. Chen, Z.X. Man, and Y.J. Xa, Chn. Phys. Lett. 24 (2007) 19. [29] T.Y. Ye and L.Z. Jang, Chn. Phys. Lett. 30 (2013) [30] C. Zheng and G.F. Long, Sc. Chna-Phys. Mech. Astron. 57 (2014) [31] T.Y. Ye, Sc. Chna-Phys. Mech. Astron. 58 (2015) [32] C.H. Bennett, G. Brassard, C. Crepeau, et al., Phys. Rev. Lett. 70 (1993) [33] V.N. Gorbachev, A.I. Trublko, and A.A. Rodchkna, Phys. Lett. A 314 (2003) 267. [34] Z.J. Zhang and X.M. Zhong, Phys. Lett. A 341 (2005) 55. [35] J. Dong and J.F. Teng, Eur. Phys. J. D 49 (2008) 129. [36] X.B. Chen, G. Xu, Y.X. Yang, and Q.Y. Wen, Opt. Commun. 283 (2010) [37] J. Heo, C.H. Hong, J.I. Lm, and H.J. Yang, Chn. Phys. B 24 (2015) [38] Y.G. Yang and Q.Y. Wen, J. Phys. A: Math. Theor. 42 (2009) ; Y.G. Yang and Q.Y. Wen, J. Phys. A: Math. Theor. 43 (2010) [39] H.K. Lo, Phys. Rev. A 56 (1997) [40] Y.G. Yang, W.F. Gao, and Q.Y. Wen, Phys. Scr. 80 (2009) [41] Y.G. Yang, J. Xa, X. Ja, L. Sh, and H. Zhang, Int. J. Quantum Inf. 10 (2012) [42] X.B. Chen, Y. Su, X.X. Nu, and Y.X. Yang, Quantum Inf. Process. 13 (2014) 101. [43] B. Lu, F. Gao, H.Y. Ja, et al., Quantum Inf. Process. 12 (2013) 887. [44] W. Lu, Y.B. Wang, and W. Cu, Commun. Theor. Phys. 57 (2012) 583. [45] W. Z, F.Z. Guo, Y. Luo, et al., Int. J. Theor. Phys. 52 (2013) [46] H.Y. Tseng, J. Ln, and T. Hwang, Quantum Inf. Process. 11 (2012) 373. [47] C. Wang, G. Xu, and Y.X. Yang, Int. J. Quantum Inf. 11 (2013) [48] Y.G. Yang, J. Xa, X. Ja, and H. Zhang, Quantum Inf. Process. 12 (2013) 877. [49] W.W. Zhang and K.J. Zhang, Quantum Inf. Process. 12 (2013) [50] J. Ln, C.W. Yang, and T. Hwang, Quantum Inf. Process. 13 (2014) 239. [51] B. Zhang, X.T. Lu, J. Wang, and C.J. Tang, Quantum Inf. Process. 14 (2015) 4593.
10 156 Communcatons n Theoretcal Physcs Vol. 67 [52] J. L, H.F. Zhou, L. Ja, and T.T. Zhang, Int. J. Theor. Phys. 53 (2014) [53] X.B. Chen, G. Xu, X.X. Nu, et al., Opt. Commun. 283 (2010) [54] J. Ln, H.Y. Tseng, and T. Hwang, Opt. Commun. 284 (2011) [55] W. Lu and Y.B. Wang, Int. J. Theor. Phys. 51 (2012) [56] Y.J. Chang, C.W. Tsa, and T. Hwang, Quantum Inf. Process. 12 (2013) [57] W. Lu, Y.B. Wang, and Z.T. Jang, Opt. Commun. 284 (2011) [58] W.W. Zhang, D. L, and Y.B. L, Int. J. Theor. Phys. 53 (2014) [59] G.A. Xu, X.B. Chen, Z.H. We, et al., Int. J. Quantum Inf. 10 (2012) [60] Z.W. Sun and D.Y. Long, Int. J. Theor. Phys. 52 (2013) 212. [61] W. Lu, Y.B. Wang, Z.T. Jang, and Y.Z. Cao, Int. J. Theor. Phys. 51 (2012) 69. [62] W. Lu, Y.B. Wang, Z.T. Jang, et al., Int. J. Theor. Phys. 51 (2012) [63] S. Ln, G.D. Guo, and X.F. Lu, Int. J. Theor. Phys. 52 (2013) [64] J. Shu, Quantum State Preparaton and Quantum Informaton Processng n Cavty QED, Unversty of Scence and Technology of Chna, Hefe (2007) 19. [65] L. Zhou and Y.B. Sheng, Phys. Rev. A 90 (2014) [66] L. Zhou and Y.B. Sheng, Phys. Rev. A 92 (2015) [67] T.J. Wang and C. Wang, Sc. Rep. 6 (2016) [68] Y.B. Sheng, L. Zhou, L. Wang, and S.M. Zhao, Quantum Inf. Process. 12 (2013) [69] Y.B. Sheng, J. Lu, S.Y. Zhao, and L. Zhou, Chn. Sc. Bull. 58 (2013) [70] C. Cao, H. Dng, Y. L, et al., Quantum Inf. Process. 14 (2015) [71] C. Cao, T.J. Wang, R. Zhang, and C. Wang, Laser Phys. Lett. 12 (2015) [72] Y.B. Sheng, S.Y. Zhao, J. Lu, and L. Zhou, Quantum Inf. Process. 13 (2014) 881. [73] S.B. Zheng and G.C. Guo, Phys. Rev. Lett. 85 (2000) [74] S.B. Zheng, Phys. Rev. A 68 (2003) [75] T. L and F.G. Deng, Sc. Rep. 5 (2015) [76] C.J. Shan, J.B. Lu, T. Chen, et al., Int. J. Theor. Phys. 49 (2010) 334. [77] C.J. Shan, J.B. Lu, W.W. Cheng, et al., Mod. Phys. Lett. B 23 (2009) [78] C.Y. L, H.Y. Zhou, Y. Wang, and F.G. Deng, Chn. Phys. Lett. 22 (2005) [79] C.Y. L, X.H. L, F.G. Deng, et al., Chn. Phys. Lett. 23 (2006) [80] P.W. Shor and J. Preskll, Phys. Rev. Lett. 85 (2000) 441. [81] F. Gao, S.J. Qn, Q.Y. Wen, and F.C. Zhu, Quantum Inf. Comput. 7 (2007) 329.
The Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationTwo-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State
Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang
More informationFault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States
Commun. Theor. Phys. 63 (015) 431 438 Vol. 63, No. 4, April 1, 015 Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States YE Tian-Yu
More informationEfficient many-party controlled teleportation of multi-qubit quantum information via entanglement
Effcent many-party controlled teleportaton of mult-qut quantum nformaton va entanglement Chu-Png Yang, Shh-I Chu, Syuan Han Physcal Revew A, 24 Presentng: Vctora Tchoudakov Motvaton Teleportaton va the
More informationComments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards
Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com
More informationDynamics of a Superconducting Qubit Coupled to an LC Resonator
Dynamcs of a Superconductng Qubt Coupled to an LC Resonator Y Yang Abstract: We nvestgate the dynamcs of a current-based Josephson juncton quantum bt or qubt coupled to an LC resonator. The Hamltonan of
More informationQuantum Secure Direct Communication with Authentication Expansion Using Single Photons
Commun. Theor. Phys. (Beijing, China) 54 (2010) pp. 829 834 c Chinese Physical Society and IOP Publishing Ltd Vol. 54, No. 5, November 15, 2010 Quantum Secure Direct Communication with Authentication Expansion
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationHigh-Order Hamilton s Principle and the Hamilton s Principle of High-Order Lagrangian Function
Commun. Theor. Phys. Bejng, Chna 49 008 pp. 97 30 c Chnese Physcal Socety Vol. 49, No., February 15, 008 Hgh-Orer Hamlton s Prncple an the Hamlton s Prncple of Hgh-Orer Lagrangan Functon ZHAO Hong-Xa an
More informationComment on An arbitrated quantum signature scheme. with fast signing and verifying
Comment on n arbtrated quantum sgnature scheme wth fast sgnng and verfyng Y-Png Luo and Tzonelh Hwang * Department of Computer cence and Informaton Engneerng, Natonal Cheng ung Unversty, No, Unversty Rd,
More informationUniqueness of Weak Solutions to the 3D Ginzburg- Landau Model for Superconductivity
Int. Journal of Math. Analyss, Vol. 6, 212, no. 22, 195-114 Unqueness of Weak Solutons to the 3D Gnzburg- Landau Model for Superconductvty Jshan Fan Department of Appled Mathematcs Nanjng Forestry Unversty
More informationarxiv:quant-ph/ Jul 2002
Lnear optcs mplementaton of general two-photon proectve measurement Andrze Grudka* and Anton Wóck** Faculty of Physcs, Adam Mckewcz Unversty, arxv:quant-ph/ 9 Jul PXOWRZVNDR]QDRODQG Abstract We wll present
More informationExercises of Chapter 2
Exercses of Chapter Chuang-Cheh Ln Department of Computer Scence and Informaton Engneerng, Natonal Chung Cheng Unversty, Mng-Hsung, Chay 61, Tawan. Exercse.6. Suppose that we ndependently roll two standard
More informationBidirectional quantum teleportation and secure direct communication via entanglement swapping
Bidirectional quantum teleportation and secure direct communication via entanglement swapping Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International
More informationSolution 1 for USTC class Physics of Quantum Information
Soluton 1 for 017 018 USTC class Physcs of Quantum Informaton Shua Zhao, Xn-Yu Xu and Ka Chen Natonal Laboratory for Physcal Scences at Mcroscale and Department of Modern Physcs, Unversty of Scence and
More informationQuantum secure circuit evaluation
Scence n Chna Ser. F Informaton Scences 2004 Vol.47 No.6 717 727 717 Quantum secure crcut evaluaton CHEN Huanhuan, LI Bn & ZHUANG Zhenquan Department of Electronc Scence and Technology, Unversty of Scence
More informationSolution 1 for USTC class Physics of Quantum Information
Soluton 1 for 018 019 USTC class Physcs of Quantum Informaton Shua Zhao, Xn-Yu Xu and Ka Chen Natonal Laboratory for Physcal Scences at Mcroscale and Department of Modern Physcs, Unversty of Scence and
More informationA New Evolutionary Computation Based Approach for Learning Bayesian Network
Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationErrors in Nobel Prize for Physics (7) Improper Schrodinger Equation and Dirac Equation
Errors n Nobel Prze for Physcs (7) Improper Schrodnger Equaton and Drac Equaton u Yuhua (CNOOC Research Insttute, E-mal:fuyh945@sna.com) Abstract: One of the reasons for 933 Nobel Prze for physcs s for
More informationOn the correction of the h-index for career length
1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat
More informationSupplemental document
Electronc Supplementary Materal (ESI) for Physcal Chemstry Chemcal Physcs. Ths journal s the Owner Socetes 01 Supplemental document Behnam Nkoobakht School of Chemstry, The Unversty of Sydney, Sydney,
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationA Hybrid Variational Iteration Method for Blasius Equation
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method
More informationEfficient controlled quantum secure direct communication based on GHZ-like states
Efficient controlled quantum secure direct communication based on GHZ-like states Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International
More informationThe optimal delay of the second test is therefore approximately 210 hours earlier than =2.
THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple
More informationa b a In case b 0, a being divisible by b is the same as to say that
Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :
More informationCanonical transformations
Canoncal transformatons November 23, 2014 Recall that we have defned a symplectc transformaton to be any lnear transformaton M A B leavng the symplectc form nvarant, Ω AB M A CM B DΩ CD Coordnate transformatons,
More informationCircular Semi-Quantum Secret Sharing Using Single Particles
Commun. Theor. Phys. 70 (018) 661 671 Vol. 70 No. 6 December 1 018 Circular Semi-Quantum Secret Sharing Using Single Particles Chong-Qiang Ye ( 叶崇强 ) and Tian-Yu Ye ( 叶天语 ) College of Information & Electronic
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationC/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1
C/CS/Phy9 Problem Set 3 Solutons Out: Oct, 8 Suppose you have two qubts n some arbtrary entangled state ψ You apply the teleportaton protocol to each of the qubts separately What s the resultng state obtaned
More informationA how to guide to second quantization method.
Phys. 67 (Graduate Quantum Mechancs Sprng 2009 Prof. Pu K. Lam. Verson 3 (4/3/2009 A how to gude to second quantzaton method. -> Second quantzaton s a mathematcal notaton desgned to handle dentcal partcle
More informationAn Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States
Commun. Theor. Phys. 65 (2016) 705 710 Vol. 65, No. 6, June 1, 2016 An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Shu-Jiang Xu (Å ), 1, Xiu-Bo
More informationSnce h( q^; q) = hq ~ and h( p^ ; p) = hp, one can wrte ~ h hq hp = hq ~hp ~ (7) the uncertanty relaton for an arbtrary state. The states that mnmze t
8.5: Many-body phenomena n condensed matter and atomc physcs Last moded: September, 003 Lecture. Squeezed States In ths lecture we shall contnue the dscusson of coherent states, focusng on ther propertes
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationA Note on Bound for Jensen-Shannon Divergence by Jeffreys
OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of
More informationSusceptibility and Inverted Hysteresis Loop of Prussian Blue Analogs with Orthorhombic Structure
Commun. Theor. Phys. 58 (202) 772 776 Vol. 58, No. 5, November 5, 202 Susceptblty and Inverted Hysteress Loop of Prussan Blue Analogs wth Orthorhombc Structure GUO An-Bang (ÁËǑ) and JIANG We ( å) School
More information763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1.
7636S ADVANCED QUANTUM MECHANICS Soluton Set 1 Sprng 013 1 Warm-up Show that the egenvalues of a Hermtan operator  are real and that the egenkets correspondng to dfferent egenvalues are orthogonal (b)
More informationTransfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system
Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng
More informationarxiv:quant-ph/ v1 10 Apr 2006
Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification
More informationThe Quadratic Trigonometric Bézier Curve with Single Shape Parameter
J. Basc. Appl. Sc. Res., (3541-546, 01 01, TextRoad Publcaton ISSN 090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com The Quadratc Trgonometrc Bézer Curve wth Sngle Shape Parameter Uzma
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationOne-sided finite-difference approximations suitable for use with Richardson extrapolation
Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,
More informationarxiv: v2 [quant-ph] 9 Nov 2011
Intercept-resend attacks on Semiquantum secret sharing and the Improvements arxiv:1106.4908v2 [quant-ph] 9 Nov 2011 Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, and Tzonelih Hwang Abstract Recently, Li et
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationThis model contains two bonds per unit cell (one along the x-direction and the other along y). So we can rewrite the Hamiltonian as:
1 Problem set #1 1.1. A one-band model on a square lattce Fg. 1 Consder a square lattce wth only nearest-neghbor hoppngs (as shown n the fgure above): H t, j a a j (1.1) where,j stands for nearest neghbors
More informationarxiv:quant-ph/ v2 2 Jan 2007
Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationNon-interacting Spin-1/2 Particles in Non-commuting External Magnetic Fields
EJTP 6, No. 0 009) 43 56 Electronc Journal of Theoretcal Physcs Non-nteractng Spn-1/ Partcles n Non-commutng External Magnetc Felds Kunle Adegoke Physcs Department, Obafem Awolowo Unversty, Ile-Ife, Ngera
More informationON MECHANICS WITH VARIABLE NONCOMMUTATIVITY
ON MECHANICS WITH VARIABLE NONCOMMUTATIVITY CIPRIAN ACATRINEI Natonal Insttute of Nuclear Physcs and Engneerng P.O. Box MG-6, 07725-Bucharest, Romana E-mal: acatrne@theory.npne.ro. Receved March 6, 2008
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationMultiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State
Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure
More informationValuated Binary Tree: A New Approach in Study of Integers
Internatonal Journal of Scentfc Innovatve Mathematcal Research (IJSIMR) Volume 4, Issue 3, March 6, PP 63-67 ISS 347-37X (Prnt) & ISS 347-34 (Onlne) wwwarcournalsorg Valuated Bnary Tree: A ew Approach
More informationSUPPLEMENTARY INFORMATION
do: 0.08/nature09 I. Resonant absorpton of XUV pulses n Kr + usng the reduced densty matrx approach The quantum beats nvestgated n ths paper are the result of nterference between two exctaton paths of
More informationA QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL for SENDING A QUANTUM STATE and ITS SECURITY ANALYSIS
6th WSEAS Internatonal Conference on Informaton Securty and Prvacy, Tenerfe, Span, December 14-16, 27 91 A QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL for SENDING A QUANTUM STATE and ITS SECURITY ANALYSIS
More informationSingle-Qubit Operation Sharing with Bell and W Product States
Commun. Theor. Phys. 60 (013) 165 170 Vol. 60, No., August 15, 013 Single-Qubit Operation Sharing with Bell and W Product States JI Qi-Bin ( É), 1 LIU Yi-Min ( ), LIU Xian-Song ( Ø), 1 YIN Xiao-Feng (
More informationA CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS
Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs
More informationYong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )
Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often
More informationAmusing Properties of Odd Numbers Derived From Valuated Binary Tree
IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree
More informationAmplification and Relaxation of Electron Spin Polarization in Semiconductor Devices
Amplfcaton and Relaxaton of Electron Spn Polarzaton n Semconductor Devces Yury V. Pershn and Vladmr Prvman Center for Quantum Devce Technology, Clarkson Unversty, Potsdam, New York 13699-570, USA Spn Relaxaton
More informationIntroduction to Algorithms
Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of
More informationEPR Paradox and the Physical Meaning of an Experiment in Quantum Mechanics. Vesselin C. Noninski
EPR Paradox and the Physcal Meanng of an Experment n Quantum Mechancs Vesseln C Nonnsk vesselnnonnsk@verzonnet Abstract It s shown that there s one purely determnstc outcome when measurement s made on
More informationDensity matrix. c α (t)φ α (q)
Densty matrx Note: ths s supplementary materal. I strongly recommend that you read t for your own nterest. I beleve t wll help wth understandng the quantum ensembles, but t s not necessary to know t n
More informationarxiv:quant-ph/ v1 30 Oct 2006
Probablstc clonng wth supplementary nformaton contaned n the quantum states of two auxlary systems arxv:quant-ph/061045v1 30 Oct 006 Lvjun L, Daowen Qu Department of Computer Scence, Zhongshan Unversty,
More informationSystem in Weibull Distribution
Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co
More informationQuantum secret sharing based on quantum error-correcting codes
Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,
More informationCase A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.
THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty
More informationCOS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013
COS 511: heoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 15 Scrbe: Jemng Mao Aprl 1, 013 1 Bref revew 1.1 Learnng wth expert advce Last tme, we started to talk about learnng wth expert advce.
More informationChapter - 2. Distribution System Power Flow Analysis
Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load
More informationIntroduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:
CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More informationQuantum Particle Motion in Physical Space
Adv. Studes Theor. Phys., Vol. 8, 014, no. 1, 7-34 HIKARI Ltd, www.-hkar.co http://dx.do.org/10.1988/astp.014.311136 Quantu Partcle Moton n Physcal Space A. Yu. Saarn Dept. of Physcs, Saara State Techncal
More informationON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION
Advanced Mathematcal Models & Applcatons Vol.3, No.3, 2018, pp.215-222 ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EUATION
More informationCHAPTER 14 GENERAL PERTURBATION THEORY
CHAPTER 4 GENERAL PERTURBATION THEORY 4 Introducton A partcle n orbt around a pont mass or a sphercally symmetrc mass dstrbuton s movng n a gravtatonal potental of the form GM / r In ths potental t moves
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More informationThis column is a continuation of our previous column
Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard
More informationarxiv:quant-ph/ Feb 2000
Entanglement measures and the Hlbert-Schmdt dstance Masanao Ozawa School of Informatcs and Scences, Nagoya Unversty, Chkusa-ku, Nagoya 464-86, Japan Abstract arxv:quant-ph/236 3 Feb 2 In order to construct
More informationHigh resolution entropy stable scheme for shallow water equations
Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal
More information12. The Hamilton-Jacobi Equation Michael Fowler
1. The Hamlton-Jacob Equaton Mchael Fowler Back to Confguraton Space We ve establshed that the acton, regarded as a functon of ts coordnate endponts and tme, satsfes ( ) ( ) S q, t / t+ H qpt,, = 0, and
More informationUncertainty and auto-correlation in. Measurement
Uncertanty and auto-correlaton n arxv:1707.03276v2 [physcs.data-an] 30 Dec 2017 Measurement Markus Schebl Federal Offce of Metrology and Surveyng (BEV), 1160 Venna, Austra E-mal: markus.schebl@bev.gv.at
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More informationA Fast Computer Aided Design Method for Filters
2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationWavelet chaotic neural networks and their application to continuous function optimization
Vol., No.3, 04-09 (009) do:0.436/ns.009.307 Natural Scence Wavelet chaotc neural networks and ther applcaton to contnuous functon optmzaton Ja-Ha Zhang, Yao-Qun Xu College of Electrcal and Automatc Engneerng,
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More informationPh 219a/CS 219a. Exercises Due: Wednesday 23 October 2013
1 Ph 219a/CS 219a Exercses Due: Wednesday 23 October 2013 1.1 How far apart are two quantum states? Consder two quantum states descrbed by densty operators ρ and ρ n an N-dmensonal Hlbert space, and consder
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationOnline Appendix. t=1 (p t w)q t. Then the first order condition shows that
Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate
More informationCS286r Assign One. Answer Key
CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,
More informationThe non-negativity of probabilities and the collapse of state
The non-negatvty of probabltes and the collapse of state Slobodan Prvanovć Insttute of Physcs, P.O. Box 57, 11080 Belgrade, Serba Abstract The dynamcal equaton, beng the combnaton of Schrödnger and Louvlle
More informationThe Feynman path integral
The Feynman path ntegral Aprl 3, 205 Hesenberg and Schrödnger pctures The Schrödnger wave functon places the tme dependence of a physcal system n the state, ψ, t, where the state s a vector n Hlbert space
More informationMarkov Chain Monte Carlo Lecture 6
where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationNUMERICAL DIFFERENTIATION
NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the
More informationECEN 5005 Crystals, Nanocrystals and Device Applications Class 19 Group Theory For Crystals
ECEN 5005 Crystals, Nanocrystals and Devce Applcatons Class 9 Group Theory For Crystals Dee Dagram Radatve Transton Probablty Wgner-Ecart Theorem Selecton Rule Dee Dagram Expermentally determned energy
More informationPhysics 5153 Classical Mechanics. Principle of Virtual Work-1
P. Guterrez 1 Introducton Physcs 5153 Classcal Mechancs Prncple of Vrtual Work The frst varatonal prncple we encounter n mechancs s the prncple of vrtual work. It establshes the equlbrum condton of a mechancal
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More information