首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Given the Mayers–Lo–Chau (MLC) no-go theorem, unconditionally secure quantum bit commitment (QBC) is impossible and hence quantum oblivious transfer (QOT) based on QBC is insecure. In this paper, we propose a secure all-or-nothing QOT protocol and a one-out-of-two QOT protocol respectively. The unique merit of the proposed protocols lies in that it is not based on QBC but based on an untrusted third party. Moreover, the proposed protocols do not violate Lo's no-go theorem so that their security can be achieved.  相似文献   

2.
量子隐形传态的杰出安全特性使其在未来的通讯领域充满潜力.量子力学的不确定性原理和不可克隆定理禁止对量子态进行直接复制,因此,量子隐形传态将量子态划分为经典和量子两部分,信息分别经由经典和量子通道从发送者Alice传递给远方的接收者Bob,根据这两种信息,Bob实行相应操作就可以以一定的几率重建初始传送态.利用一般意义的隐形传态方案,提出一种简便的新方法实现了一个N粒子任意态的概率传态.方法采用N个非最大纠缠的三粒子GHZ态作为量子通道,避免了引入额外的辅助粒子.为了实现传态,Alice将所有粒子分成N份,对第i份的粒子对(i,xi)实行Bell测量并将结果通过经典通道通知Bob,Bob对粒子(yi,zi)进行相应的操作就可以完成第i个粒子信息的传送.当完成N次相似的重复操作后,Bob就可以准确地重建初始传送态.文中以Bell态测量为基本手段,重复的操作同时也降低了实验难度,作为一个特例,文中给出了一个两粒子任意态的传态方案.  相似文献   

3.

Fusing the ideas of remote implementation of quantum operation and bidirectional controlled teleportation, we propose a protocol of cyclic controlled remote implementation for three partially unknown quantum operation using seven-qubit cluster state as the quantum channel. Suppose there are three observers Alice, Bob and Charlie, each of them has been given a partially unknown quantum operation. We show that how to realize the cyclic controlled remote implementation of quantum operations where under control of the controller David, Alice can remotely apply her operation on Bob’s qubit, and Bob can remotely apply his operation on Charlie’s qubit, at the same time Charlie can also remotely apply his operation on Alice’s qubit. It is shown that only the senders Alice, Bob, Charlie and the controller David collaborate with each other, the cyclic controlled remote implementation of partially unknown quantum operations can be realized successfully without bidirectional teleportation. So our protocol is safer, resource-efficient and potentially applicable.

  相似文献   

4.
利用三粒子纠缠态建立量子隐形传态网络的探讨   总被引:10,自引:0,他引:10       下载免费PDF全文
周小清  邬云文 《物理学报》2007,56(4):1881-1887
利用W态纠缠源可以产生三纠缠粒子,用这些相互纠缠的粒子作为量子信道,再辅以经典信道传送Bell基联合测量信息和von Neumann测量信息,便可实现量子隐形传态网络.基于上述思想,研究了三纠缠粒子量子隐形传态网络的物理基础,得到了基于三粒子W 关键词: 量子通信 量子隐形传态 W态')" href="#">W态  相似文献   

5.
The enhancement of teleportation fidelity by weak measurement or quantum measurement reversal is investigated. One qubit of a maximally entangled state undergoes the amplitude damping, and the subsequent application of weak measurement or quantum measurement reversal could improve the teleportation fidelity beyond the classical region. The improvement could not be attributed to the increasing of entanglement, quantum discord, classical correlation or total correlation. We declare that it should be owed to the probabilistic nature of the method.  相似文献   

6.
What classical resources are required to simulate quantum correlations? For the simplest and most important case of local projective measurements on an entangled Bell pair state, we show that exact simulation is possible using local hidden variables augmented by just one bit of classical communication. Certain quantum teleportation experiments, which teleport a single qubit, therefore admit a local hidden variables model.  相似文献   

7.
Quantum bit commitment is insecure in the standard non-relativistic quantum cryptographic framework, essentially because Alice can exploit quantum steering to defer making her commitment. Two assumptions in this framework are that: (a) Alice knows the ensembles of evidence E corresponding to either commitment; and (b) system E is quantum rather than classical. Here, we show how relaxing assumption (a) or (b) can render her malicious steering operation indeterminable or inexistent, respectively. Finally, we present a secure protocol that relaxes both assumptions in a quantum teleportation setting. Without appeal to an ontological framework, we argue that the protocol’s security entails the reality of the quantum state, provided retrocausality is excluded.  相似文献   

8.

We investigate that the average fidelity of the standard quantum teleportation communication protocol when the quantum channel is affected by different local collective noise environments frequently encountered in real quantum communication protocol. We show that the quantum teleportation efficiency can be enhanced when the noise is unavoidable by choose the fit Bell state as the quantum channel, especially we can get perfect quantum teleportation efficiency under the local collective Pauli σy noise environment. Our work can shed some light on the application of practical standard quantum teleportation communication protocol.

  相似文献   

9.
We prove a theorem which shows that a collection of experimental data of probabilistic weights related to decisions with respect to situations and their disjunction cannot be modeled within a classical probabilistic weight structure in case the experimental data contain the effect referred to as the ‘disjunction effect’ in psychology. We identify different experimental situations in psychology, more specifically in concept theory and in decision theory, and in economics (namely situations where Savage’s Sure-Thing Principle is violated) where the disjunction effect appears and we point out the common nature of the effect. We analyze how our theorem constitutes a no-go theorem for classical probabilistic weight structures for common experimental data when the disjunction effect is affecting the values of these data. We put forward a simple geometric criterion that reveals the non classicality of the considered probabilistic weights and we illustrate our geometrical criterion by means of experimentally measured membership weights of items with respect to pairs of concepts and their disjunctions. The violation of the classical probabilistic weight structure is very analogous to the violation of the well-known Bell inequalities studied in quantum mechanics. The no-go theorem we prove in the present article with respect to the collection of experimental data we consider has a status analogous to the well known no-go theorems for hidden variable theories in quantum mechanics with respect to experimental data obtained in quantum laboratories. Our analysis puts forward a strong argument in favor of the validity of using the quantum formalism for modeling the considered psychological experimental data as considered in this paper.  相似文献   

10.

We propose a scheme for teleportation of an arbitrary two-qubit state by using a Bell state as the quantum channel working together with an auxiliary qubit. Our scheme needs less entanglement resource, but at the cost of shortening teleportation distance. This is because that in order to successfully recover the teleported state, both sender and receiver need to implement quantum-gate operations on the shared auxiliary qubit. So, the auxiliary qubit must be close to both sender and receiver. Otherwise, the sender and receiver cannot carry out quantum-gate operations on it. Thus, our scheme is invalid for long-distance teleportation. But for short-distance teleportation, our scheme is an optimal choice because it requires less entanglement resource. From a practical point of view, our scheme is very promising for application in quantum teleportation on chip.

  相似文献   

11.
We consider the remote implementation of an arbitrary unitary operation on one qubit of a pure two-qubit entangled state with 100% efficiency via entanglement swapping in detail, then directly generalize this protocol from two-qubit to N-qubit entangled states. The overall classical information and distributed entanglement cost required for this quantum remote control protocol is less than the bi-directional quantum state teleportation method.  相似文献   

12.
The scheme for probabilistic teleportation of an arbitrary three-particle state is proposed. By using single qubit gate and three two-qubit gates, efficient quantum logic networks for probabilistic teleportation of an arbitrary three-particle state are constructed.  相似文献   

13.
The scheme for probabilistic teleportation of an arbitrary three-particle state is proposed. By using single qubit gate and three two-qubit gates, efficient quantum logic networks for probabilistic teleportation of an arbitrary three-particle state are constructed.  相似文献   

14.

A scheme of circular controlled quantum teleportation, which is a novel version of bidirectional controlled quantum teleportation, is proposed using a specific genuine seven-qubit entangled state as quantum channel, and then it is generalized to the scene with a general genuine seven-qubit entangled state as channel. This means that with the control of the supervisor Daniel while Alice teleportates an unknown qubit state to Bob, Bob can also teleportate an unknown qubit state to Charlie and Charlie can also teleportate an unknown qubit state to Alice circularly, simultaneously. Compared with the BCQT schemes proposed before, the intrinsic efficiency of our scheme is optimal.

  相似文献   

15.
王美玉  闫凤利 《中国物理 B》2011,20(12):120309-120309
In this paper, we investigate perfect quantum teleportation and dense coding by using an 2N-qubit W state channel. In the quantum teleportation scheme, an unknown N-qubit entangled state can be perfectly teleported. One ebit of entanglement and two bits of classical communication are consumed in the teleportation process, just like when using the Bell state channel. While N+1 bits of classical information can be transmitted by only sending N particles in the dense coding protocol.  相似文献   

16.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

17.
In this paper, we show that some special mixed quantum resource experience the same property of pure entanglement such as Bell state for quantum teleportation. It is shown that one mixed state and three bits of classical communication cost can be used to teleport one unknown qubit compared with two bits via pure resources. The schemes are easily implement with model physical techniques. Moreover, these resources are also optimal and typical for faithfully remotely prepare an arbitrary qubit, two-qubit and three-qubit states with mixed quantum resources. Our schemes are completed as same as those with pure quantum entanglement resources except only 1 bit additional classical communication cost required. The success probability is independent of the form of the mixed resources.  相似文献   

18.

We give a meta-logical interpretation of the entanglement mechanism of quantum space-time in terms of the sequent calculus of a quantum sub-structural logic. This meta-logical picture is based mainly on the two meta-rules cut and EPR, and on the new meta-theorem “teleportation” (TEL), built by the use of the above meta-rules, both performed in parallel. The proof of (TEL)-theorem fairly reproduces the protocol of quantum teleportation. In the framework of space-time entanglement, the conclusion of the (TEL)-theorem is that the entangled space-time can convey the quantum teleportation of an unknown quantum state. We also introduce two new structural rules: the Hadamard (H)-rule and the CNOT-rule, the latter being used, together with the cut, in the proof of the new theorem “Entanglement” (ENT).

  相似文献   

19.
We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks; i.e., the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of bounded-quantum storage; however, we consider an explicit noise model inspired by present-day technology. To illustrate the power of this new model, we show that a protocol for oblivious transfer is secure for any amount of quantum-storage noise, as long as honest players can perform perfect quantum operations. Our model also allows us to show the security of protocols that cope with noise in the operations of the honest players and achieve more advanced tasks such as secure identification.  相似文献   

20.
In this paper, we propose a protocol to deterministically teleport an unknown mixed state of qubit by utilizing a maximally bipartite entangled state of qubits as quantum channel. Ira non-maximally entangled bipartite pure state is employed as quantum channel, the unknown mixed quantum state of qubit can be teleported with 1 -√ 1- C^2 probability, where C is the concurrence of the quantum channel. The protocol can also be generalized to teleport a mixed state of qudit or a multipartite mixed state. More important purpose is that, on the basis of the protocol, the teleportation of an arbitrary multipartite (pure or mixed) quantum state can be decomposed into the teleportation of each subsystem by employing separate entangled states as quantum channels. In the case of deterministic teleportation, Bob only needs to perform unitary transformations on his single particles in order to recover the initial teleported multipartite quantum state.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号