首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 515 毫秒
1.
A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence coding, local collective unitary operations, and entanglement swapping. In this protocol, during the process of trans- mission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using symmetric two-dimensional states. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping.  相似文献   

2.
A deterministic secure quantum communication scheme using entanglement swapping is proposed. The sender prepares four-particle genuine entangled states and sends two particles in each state to the receiver and remains the rest particles. If the quantum channel is secure, they begin to communicate. After their four-particle projective measurements, the receiver can obtain the secret information according to his measurement outcomes and classical information from the sender. Using entanglement swapping, there are no particles carrying secret information to be transmitted.  相似文献   

3.
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states.  相似文献   

4.
A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable.  相似文献   

5.
In this paper, a new controlled secure direct communication protocol based on a maximally seven-qubit entangled state is proposed. the outcomes of measurement is performed by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability.In this scheme,by using entanglement swapping, no qubits carrying secret messages are transmitted.Therefore, the protocol is completely secure.  相似文献   

6.
In this paper, we firstly propose a new simple method to calculate entanglement swapping of χ-type entangled states, and then present a novel quantum steganography protocol with large payload. The new protocol adopts entanglement swapping to build up the hidden channel within quantum secure direct communication with χ-type entangled states for securely transmitting secret messages. Comparing with the previous quantum steganographies, the capacity of the hidden channel is much higher, which is increased to eight bits. Meanwhile, due to the quantum uncertainty theorem and the no-cloning theorem its imperceptibility is proved to be great in the analysis, and its security is also analyzed in detail, which is proved that intercept-resend attack, measurement-resend attack, ancilla attack, man-in-the-middle attack or even Dos(Denial of Service) attack couldn't threaten it. As a result, the protocol can be applied in various fields of quantum communication.  相似文献   

7.
薛正远  易佑民  曹卓良 《中国物理》2006,15(7):1421-1424
We investigate schemes for quantum secret sharing and quantum dense coding via tripartite entangled states. We present a scheme for sharing classical information via entanglement swapping using two tripartite entangled GHZ states. In order to throw light upon the security affairs of the quantum dense coding protocol, we also suggest a secure quantum dense coding scheme via W state by analogy with the theory of sharing information among involved users.  相似文献   

8.
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication(QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.  相似文献   

9.
Entanglement swapping for four-qubit cluster-class states is studied. It is shown that a four-qubit cluster state (maximally entangled) can be obtained with a certain probability from two four-qubit cluster-class states by entanglement swapping. The probability is related to the smallest superposition coefficient of the cluster-class states (when all the moduli of amplitudes are equivalent, they are the usual cluster states and the probability hits to one). Two examples for the applications of the entanglement swapping are also presented. One is quantum teleportation of an arbitrary two-qubit state via a quantum repeater, in which the success probability can be improved by the entanglement swapping when the quantum channels are general cluster-class states (partially entangled). The other is quantum key distribution, in which a secret random sequence of bits (a “key”) can be efficiently established between two distant parties by the entanglement swapping of two groups of cluster states.  相似文献   

10.
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making use of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.  相似文献   

11.
A continuous variable quantum key distribution protocol with entanglement swapping of quasi-Bell entangled coherent states is proposed. As the preliminary step, a sender shares quasi-Bell entangled coherent states with a receiver. After their measurements to distinguish the cases of a zero response, a nonzero even-photon response and an odd-photon response, two legitimate participants fulfill the task of key distribution. The correlations resulting from entanglement swapping of quasi-Bell entangled coherent states and the order rearrangement of transmitted states provide the possibility to protect secret key distribution. In the ideal channel, the success probability increases with the amplitude of the coherent state, and approaches unity when the amplitude of the coherent state is larger than two. However, in the loss channel, the decoherence will introduce error in the generated key, and the error rate increases with the amplitude of the coherent state. When the amplitude of the coherent state is smaller than 0.2 (or so), the error rate approaches zero, although the success probability is less than 0.5 in this case.  相似文献   

12.
In this paper, we propose a novel quantum steganography protocol based on quantum secure direct communication. By using entanglement swapping of Bell states, the protocol builds up hidden channel within the improved ping-pong protocol to transmit secret messages. Comparing with the previous quantum steganographies, its capacity of hidden channel is increased to four times, and the superposition channel can transmit more information than the original quantum channel. Imperceptibility of the hidden channel in this protocol is good, since its possibility of detection can be arbitrarily reduced by increasing the Bell state's number. Security of the secret messages is also proved to be reliable regardless of whether the hidden channel has been detected or not. In addition, our protocol has various applications in quantum communication.  相似文献   

13.
Quantum Secret Sharing with Two-Particle Entangled States   总被引:1,自引:0,他引:1       下载免费PDF全文
We present a new protocol for the quantum secret sharing (QSS) task among multiparties with two-particle entangled states. In our scheme, the secret is split among a number of participatlng partners and the reconstruction requires collaboration of all the authorized partners. Instead of multiparticle Greenberger-Horne-Zeillnger states, only two-particle entangled states are employed in this scheme. By local operations and individual measurements on either of the two entangled particles, each authorized partner obtains a sequence of secret bits shared with other authorized partners. This protocol can be experimentally realized using only linear optical elements and simple entanglement source. It is scalable in practice.  相似文献   

14.
刘佳丽  施荣华  石金晶  吕格莉  郭迎 《中国物理 B》2016,25(8):80306-080306
A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations(corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed.An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank.  相似文献   

15.
This paper has proposed a generalized quantum state sharing protocol of an arbitrary two-particle state using non-maximally GHZ states and generalized Bell state measurement.The sender Alice performs two-particle generalized Bell state measurements on her two particles in the state sharing process and the controller takes measurements on his particles and transfers the quantum information to the receiver with entanglement swapping by the cooperation of the other agents.It is found that the use of nonmaximally entangled state in quantum state sharing has enabled the secure sharing of the quantum state.  相似文献   

16.
潘长宁  方卯发 《中国物理》2007,16(5):1225-1228
We propose an effective scheme for the entanglement concentration of a four-particle state via entanglement swapping in an ion trap. Taking the maximally entangled state after concentration as a quantum channel, we can faithfully and determinatively teleport quantum entangled states from Alice to Bob without the joint Bell-state measurement. In the process of constructing the quantum channel, we adopt entanglement swapping to avoid the decrease of entanglement during the distribution of particles. Thus our scheme provides a new prospect for quantum teleportation over a longer distance. Furthermore, the success probability of our scheme is 1.0.  相似文献   

17.
We consider the remote implementation of an arbitrary unitary operation on one qubit of a pure two-qubit entangled state with 100% efficiency via entanglement swapping in detail, then directly generalize this protocol from two-qubit to N-qubit entangled states. The overall classical information and distributed entanglement cost required for this quantum remote control protocol is less than the bi-directional quantum state teleportation method.  相似文献   

18.
We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements.  相似文献   

19.
The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum tele- portation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entan- glement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay.  相似文献   

20.
Many quantum communication schemes rely on the resource of entanglement. For example, quantum teleportation is the transfer of arbitrary quantum states through a classical communication channel using shared entanglement. Entanglement, however, is in general not easy to produce on demand. The bottom line of this work is that a particular kind of entanglement, namely that based on continuous quantum variables, can be created relatively easily. Only squeezers and beam splitters are required to entangle arbitrarily many electromagnetic modes. Similarly, other relevant operations in quantum communication protocols become feasible in the continuous‐variable setting. For instance, measurements in the maximally entangled basis of arbitrarily many modes can be accomplished via linear optics and efficient homodyne detections. In the first two chapters, some basics of quantum optics and quantum information theory are presented. These results are then needed in Chapter III, where we characterize continuous‐variable entanglement and show how to make it. The members of a family of multi‐mode states are found to be truly multi‐party entangled with respect to all their modes. These states also violate multi‐party inequalities imposed by local realism, as we demonstrate for some members of the family. Further, we discuss how to measure and verify multi‐party continuous‐variable entanglement. Various quantum communication protocols based on the continuous‐variable entangled states are discussed and developed in Chapter IV. These include the teleportation of entanglement (entanglement swapping) as a test for genuine quantum teleportation. It is shown how to optimize the performance of continuous‐variable entanglement swapping. We highlight the similarities and differences between continuous‐variable entanglement swapping and entanglement swapping with discrete variables. Chapter IV also contains a few remarks on quantum dense coding, quantum error correction, and entanglement distillation with continuous variables, and in addition a review of quantum cryptographic schemes based on continuous variables. Finally, in Chapter V, we consider a multi‐party generalization of quantum teleportation. This so‐called telecloning means that arbitrary quantum states are transferred not only to a single receiver, but to several. However, due to the quantum mechanical no‐cloning theorem, arbitrary quantum states cannot be perfectly copied. We present a protocol that enables telecloning of arbitrary coherent states with the optimal quality allowed by quantum theory. The entangled states needed in this scheme are again producible with squeezed light and beam splitters. Although the telecloning scheme may also be used for "local'' cloning of coherent states, we show that cloning coherent states locally can be achieved in an optimal fashion without entanglement. It only requires a phase‐insensitive amplifier and beam splitters.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号