首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
Not all unitary operations upon a set of qubits can be implemented by sequential interactions between each qubit and an ancillary system. We analyze the specific case of sequential quantum cloning, 1-->M, and prove that the minimal dimension D of the ancilla grows linearly with the number of clones M. In particular, we obtain D=2M for symmetric universal quantum cloning and D=M+1 for symmetric phase-covariant cloning. Furthermore, we provide a recipe for the required ancilla-qubit interactions in each step of the sequential procedure for both cases.  相似文献   

2.
We analyze the asymptotic dynamics of quantum systems resulting from large numbers of iterations of random unitary operations. Although, in general, these quantum operations cannot be diagonalized it is shown that their resulting asymptotic dynamics is described by a diagonalizable superoperator. We prove that this asymptotic dynamics takes place in a typically low dimensional attractor space which is independent of the probability distribution of the unitary operations applied. This vector space is spanned by all eigenvectors of the unitary operations involved which are associated with eigenvalues of unit modulus. Implications for possible asymptotic dynamics of iterated random unitary operations are presented and exemplified in an example involving random controlled-not operations acting on two qubits.  相似文献   

3.
We show that a unitary operation (quantum circuit) secretly chosen from a finite set of unitary operations can be determined with certainty by sequentially applying only a finite amount of runs of the unknown circuit. No entanglement or joint quantum operations are required in our scheme. We further show that our scheme is optimal in the sense that the number of the runs is minimal when discriminating only two unitary operations.  相似文献   

4.
We generalize the unitary-operation-based deterministic secure quantum communication (UODSQC) model (protocol) to describe the conventional deterministic secure quantum communication (DSQC) protocols in which unitary operations are usually utilized for encoding or decoding message. However, it is found that unitary operation for message encoding or decoding is not required and can be replaced with classical operation in DSQC. So the classical-operation-based deterministic secure quantum communication (CODSQC) model (protocol) is put forward. Then the rigorous mathematical analysis to explain the reason why classical operations can replace unitary operations to encode or decode secret deterministic message is given. Although unitary operations are still possibly needed in the whole communication of CODSQC model (protocol), those used for message encoding or decoding are omitted and replaced with classical operations in CODSQC model (protocol). As a result, the CODSQC model (protocol) is simpler and even more robust than the UODSQC one.  相似文献   

5.
We show that any two different unitary operations acting on an arbitrary multipartite quantum system can be perfectly distinguished by local operations and classical communication when a finite number of runs is allowed. Intuitively, this result indicates that the lost identity of a nonlocal unitary operation can be recovered locally. No entanglement between distant parties is required.  相似文献   

6.
We present two protocols for the controlled remote implementation of quantum operations between three-party high-dimensional systems. Firstly, the controlled teleportation of an arbitrary unitary operation by bidirectional quantum state teleportaion (BQST) with high-dimensional systems is considered. Then, instead of using the BQST method, a protocol for controlled remote implementation of partially unknown operations belonging to some restricted sets in high-dimensional systems is proposed. It is shown that, in these protocols, if and only if the controller would like to help the sender with the remote operations, the controlled remote implementation of quantum operations for high-dimensional systems can be completed.  相似文献   

7.
We show that no distillation protocol for Gaussian quantum states exists that relies on (i) arbitrary local unitary operations that preserve the Gaussian character of the state and (ii) homodyne detection together with classical communication and postprocessing by means of local Gaussian unitary operations on two symmetric identically prepared copies. This is in contrast to the finite-dimensional case, where entanglement can be distilled in an iterative protocol using two copies at a time. The ramifications for the distribution of Gaussian states over large distances will be outlined. We also comment on the generality of the approach and sketch the most general form of a Gaussian local operation with classical communication in a bipartite setting.  相似文献   

8.
We investigate the problem of teleportation of unitary operations by unidirectional control-state telepor-ration and propose a scheme called unidirectional quantum remote control. The scheme is based on the isomorphism between operation and state. It allows us to store a unitary operation in a control state, thereby teleportatSon of the unitary operation can be implemented by unidirectional teleportation of the control-state. We find that the probability of success for implementing an arbitrary unitary operation on arbitrary A~-qubit state by unidirectional control-state teleportation is 4^-M, and 2M ebits and 4M cbits are consumed in each teleportation.  相似文献   

9.
We investigate the problem of teleportation of unitary operations by unidirectional control-state telepor-tation and propose a scheme called unidirectional quantum remote control. The scheme is based on the isomorphismbetween operation and state. It allows us to store a unitary operation in a control state, thereby teleportation of theunitary operation can be implemented by unidirectional teleportation of the control-state. We find that the probabilityof success for implementing an arbitrary unitary operation on arbitrary M-qubit state by unidirectional control-stateteleportation is 4-M, and 2M ebits and 4M cbits are consumed in each teleportation.  相似文献   

10.
We present a simple quantum circuit that allows for the universal and deterministic manipulation of the quantum state of confined harmonic oscillators. The scheme is based on the selective interactions of the referred oscillator with an auxiliary three-level system and a classical external driving source, and enables any unitary operations on Fock states, two by two. One circuit is equivalent to a single qubit unitary logical gate on Fock states qubits. Sequences of similar protocols allow for complete, deterministic, and state-independent manipulation of the harmonic oscillator quantum state.  相似文献   

11.
We provide an analytic way to implement any arbitrary two-qubit unitary operation, given an entangling two-qubit gate together with local gates. This is shown to provide explicit construction of a universal quantum circuit that exactly simulates arbitrary two-qubit operations in SU(4). Each block in this circuit is given in a closed form solution. We also provide a uniform upper bound of the applications of the given entangling gates, and find that exactly half of all the controlled-unitary gates satisfy the same upper bound as the CNOT gate. These results allow for the efficient implementation of operations in SU(4) required for both quantum computation and quantum simulation.  相似文献   

12.
13.
Symmetrically evolving discrete quantum walk results in dynamic localization with zero mean displacement when the standard evolution operations are replaced by a temporal disorder evolution operation. In this work we show that the quantum ratchet action, that is, a directed transport in standard or disordered discrete‐time quantum walk can be realized by introducing a pawl like effect realized by using a fixed coin operation at marked positions that is, different from the ones used for evolution at other positions. We also show that the combination of standard and disordered evolution operations can be optimized to get the mean displacement of order ∝ t (number of walk steps). This model of quantum ratchet in quantum walk is defined using only a set of entangling unitary operators resulting in the coherent quantum transport.  相似文献   

14.
We propose a protocol for multiparty quantum secret sharing of secure direct communication using single photons. In this protocol, random phase shift operations instead of some special discrete unitary operations used usually are employed to realize the sharing controls. The security of this protocol with respect to various kinds of attacks is discussed. Due to the complete randomicity of the phase shift characterizing the unitary operations, the security of secret sharing is therefore enhanced.  相似文献   

15.
王郁武  韦相和  朱兆辉 《物理学报》2013,62(16):160302-160302
提出一种量子投票协议, 协议基于非对称量子通道受控量子局域幺正操作隐形传输(quantum operation teleportation, QOT). 由公正机构CA提供的零知识证明的量子身份认证, 保证选民身份认证的匿名性. 计票机构Bob制造高维Greenberger-Horne-Zeilinger 纠缠态建立一个高维量子通信信道. 选民对低维的量子选票进行局域幺正操作的量子投票, 是通过非对称基的测量和监票机构Charlie的辅助测量隐形传输的. Bob在Charlie帮助下可以通过幺正操作结果得到投票结果. 与其他一般的QOT量子投票协议相比, 该协议利用量子信息与传输的量子信道不同维, 使单粒子信息不能被窃取、防止伪造.选举过程由于有Charlie的监督, 使得投票公正和不可抵赖.由于量子局域幺正操作隐形传输的成功概率是1, 使量子投票的可靠性得以保证. 关键词: 量子投票 高维GHZ纠缠态 非对称基测量 量子操作隐形传输  相似文献   

16.
The coherence-breaking channels play a significant role in quantum information theory. We study the coherence-breaking channels and give a method to amend the coherence-breaking channels by applying unitary operations. For given incoherent channel Φ, we give necessary and sufficient conditions for the channel to be a coherence-breaking channel and amend it via unitary operations. For qubit incoherent channels Φ that are not coherence-breaking ones, we consider the mapping Φ °Φ and present the conditions for coherence-breaking and channel amendment as well.  相似文献   

17.
We present a new scheme for deterministically realizing the mutual interchange of quantum information between two distant parties via selected quantum states as the shared entangled resource. We first show the symmetric bidirectional remote state preparation (BRSP), where two single-qubit quantum states will be simultaneously exchanged in a deterministic manner provided that each of the users performs single-qubit von Neumann measurements with proper measurement bases as well as appropriate unitary operations, depending essentially on the outcomes of the prior measurements. Then we consider to extend the symmetric protocol to an asymmetric case, in which BRSP of a general single-qubit state and an arbitrary two-qubit state is investigated successfully. The necessary quantum operations and the employed quantum resources are feasible according to the present technology, resulting in that this protocol may be realizable in the realm of current physical experiment.  相似文献   

18.
We discuss an implementation of quantum Zeno dynamics in a cavity quantum electrodynamics experiment. By performing repeated unitary operations on atoms coupled to the field, we restrict the field evolution in chosen subspaces of the total Hilbert space. This procedure leads to promising methods for tailoring nonclassical states. We propose to realize "tweezers" picking a coherent field at a point in phase space and moving it towards an arbitrary final position without affecting other nonoverlapping coherent components. These effects could be observed with a state-of-the-art apparatus.  相似文献   

19.
The implementation of a quantum computer requires the realization of a large number of N-qubit unitary operations which represent the possible oracles or which are part of the quantum algorithm. Until now there have been no standard ways to uniformly generate whole classes of N-qubit gates. We develop a method to generate arbitrary controlled phase-shift operations with a single network of one-qubit and two-qubit operations. This kind of network can be adapted to various physical implementations of quantum computing and is suitable to realize the Deutsch-Jozsa algorithm as well as Grover's search algorithm.  相似文献   

20.
A scalable protocol for multiparty quantum secret splitting with collective eavesdropping-check is proposed by using Einstein-Podolsky-Rosen pairs. We analyze the security of this protocol and prove that it can stand against some possible attacks in an ideal condition. Meanwhile, this protocol utilizes quantum dense coding to achieve a high intrinsic efficiency and source capacity. Moreover, only Bell-state measurement and local unitary operations are required, which makes this protocol more convenient from an applied point of view.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号