共查询到20条相似文献,搜索用时 390 毫秒
1.
Ling-Ling Zhang You-Bang Zhan Qun-Yong Zhang 《International Journal of Theoretical Physics》2009,48(10):2971-2976
We present a controlled quantum secure direct communication protocol by using cluster states via swapping quantum entanglement
and local unitary operation. In the present scheme, the sender transmit the secret message to the receiver directly and the
secret message can only be recovered by the receiver under the permission of the controller. 相似文献
2.
A scheme for quantum state sharing of an arbitrary m-qudit state is proposed with two-qudit entanglements and generalized Bell-state (GBS) measurements. In this scheme, the sender Alice should perform m two-particle GBS measurements on her 2m qudits, and the controllers also take GBS measurements on their qudits and transfer their quantum information to the receiver with entanglement swapping if the agents cooperate. We discuss two topological structures for this quantum state sharing scheme, a dispersive one and a circular one. The former is better at the aspect of security than the latter as it requires the number of the agents who should cooperate for recovering the quantum secret larger than the other one. 相似文献
3.
A secure quantum key distribution protocol is proposed to distribute the three-dimensional secret message in a two-way quantum channel based on the entanglement of two-qutrit quantum system. The present protocol has an advantage over transmitting directly the secret message with large capacity since the distributed message has been imposed on nonorthogonal two-qutrit-entangled states by the sender using the superdense coding via local unitary operations. The security is ensured by the entanglement of the two-qutrit quantum system and the secure transmission of the traveling-particle sequence in the lossless and noiseless channel. 相似文献
4.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitarytransformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication. 相似文献
5.
Multiparty Quantum Secret Sharing of Quantum States Using Entanglement States 总被引:4,自引:0,他引:4 下载免费PDF全文
A multi-partite-controlled quantum secret sharing scheme using several non-orthogonal entanglement states is presented with unconditional security. In this scheme, the participants share the secret quantum state by exchanging the secret polarization angles of the disordered travel particles. The security of the secret quantum state is also guaranteed by the non-orthogonal multi-partite-controlled entanglement states, the participants' secret polarizations, and the disorder of the travelling particles. Moreover, the present scheme is secure against the particle-number splitting attack and the intercept-and-resend attack. It may be still secure even if the distributed quantum state is embedded in a not-so-weak coherent-state pulse. 相似文献
6.
《中国科学:物理学 力学 天文学(英文版)》2010,(11)
This paper has proposed a generalized quantum state sharing protocol of an arbitrary two-particle state using non-maximally GHZ states and generalized Bell state measurement.The sender Alice performs two-particle generalized Bell state measurements on her two particles in the state sharing process and the controller takes measurements on his particles and transfers the quantum information to the receiver with entanglement swapping by the cooperation of the other agents.It is found that the use of nonmaximally entangled state in quantum state sharing has enabled the secure sharing of the quantum state. 相似文献
7.
8.
9.
Gan Gao 《Optics Communications》2008,281(4):876-879
We propose a quantum key distribution (QKD) scheme based on entanglement swapping. In this scheme, the methods to form secret keys are so interesting. By comparing initial Bell state and outcome of entanglement swapping, the secret keys between Alice and Bob are generated involuntarily. 相似文献
10.
A five-qubit entangled state is constructed with the four-qubit genuine entangled state. As one of its applications, a controlled deterministic secure quantum communication scheme is proposed. Firstly, the supervisor prepares the five-qubit entangled state and distributes uniformly the four qubits to two users and keeps the rest one for control function. Then the receiver can perform jointly projective measurement on the encoded qubits from the sender to decrypt the secret information. The two-step security test ensures the security of the communication. Moreover, quantum dense coding is applied to enhance the capacity of quantum channel. The communication is realized under the control of the supervisor. 相似文献
11.
XIU Xiao-Ming DONG Li GAO Ya-Jun CHI Feng 《理论物理通讯》2009,51(3):429-432
The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the receiver. The receiver performs the unitary transformations and makes projective measurements on his particles to obtain the secret information. Using teleportation, the transmission of three-qubit secret information can be completed in each quantum channel 相似文献
12.
A protocol for quantum secure direct communication by using entangled qutrits and swapping quantum entanglement is proposed. In this protocol, a set of ordered two-qutrit entangled states is used as quantum information channels for sending secret messages directly. During the process of transmission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using usual two-dimensional Bell-basis states as quantum channel. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping. 相似文献
13.
In this paper, a new controlled secure direct communication protocol based on a maximally seven-qubit entangled state is proposed. the outcomes of measurement is performed by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability.In this scheme,by using entanglement swapping, no qubits carrying secret messages are transmitted.Therefore, the protocol is completely secure. 相似文献
14.
Su-Juan Qin Qiao-Yan Wen Song Lin Fen-Zhuo Guo Fu-Chen Zhu 《Optics Communications》2009,282(19):4017-4019
The security of a deterministic secure quantum communication using four-particle genuine entangled state and entanglement swapping [X.M. Xiu, H.K. Dong, L. Dong, Y.J. Cao, F. Chi, Opt. Commun. 282 (2009) 2457] is analyzed. It is shown that an eavesdropper can entangle an ancilla without introducing any error in the security test utilizing a speciality of the four-particle genuine entangled state. Moreover, the eavesdropper can distill a quarter of the secret information from her entangled ancilla. Finally, a simple improvement to resist this attack is proposed. 相似文献
15.
Zhigang Chen Xiaoping Lou Ying Guo 《International Journal of Theoretical Physics》2013,52(9):3141-3149
Motivated by hybrid entanglement swapping, a cooperative protocol for quantum anonymous transmission is proposed. In the protocol, three pairs of hybrid-entangled photons are deployed in the small-scale quantum network, where a photon is traveling from one random participant to another. After performing by entanglement swapping among all participants, the anonymous transmission system is established in a cooperative way. Analysis shows that the proposed scheme achieves the secure anonymity for both sender and receiver. In addition, it can transmit quantum message with high efficiency. 相似文献
16.
An efficient high-capacity quantum secret sharing scheme is proposed following some ideas in quantum dense coding with two-photon entanglement. The message sender, Alice prepares and measures the two-photon entangled states, and the two agents, Bob and Charlie code their information on their photons with four local unitary operations, which makes this scheme more convenient for the agents than others. This scheme has a high intrinsic efficiency for qubits and a high capacity. 相似文献
17.
Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology. 相似文献
18.
提出一种把量子隐形传态、最佳普适量子比特翻转和最佳普适量子克隆三者结合起来的量子比特普适远程翻转和克隆方案.当发送者和处于不同地点的三个接收者共享一个特定的四粒子纠缠态作为量子信道时,通过发送者的Bell基测量、经典通信和各个接收者的局域幺正变换,一个接收者能够以2/3的最佳保真度得到一份原未知量子比特的正交补态,另外两个接收者能够分别以5/6的最佳保真度得到原未知量子比特的一份拷贝.此方案用较少的量子纠缠资源同时完成了未知量子比特的普适远程翻转和克隆,且其保真度分别达到了最佳.实现此方案的关键在于构造出发送者和接收者共享的特定四粒子纠缠态作为量子信道,分析了此特殊四粒子态内在的纠缠结构. 相似文献
19.
We present a controlled quantum secure direct communication protocol that uses a 2-dimensional Greenberger–Horne–Zeilinger (GHZ) entangled state and a 3-dimensional Bell-basis state and employs the high-dimensional quantum superdense coding, local collective unitary operations and entanglement swapping. The proposed protocol is secure and of high source capacity. It can effectively protect the communication against a destroying-travel-qubit-type attack. With this protocol, the information transmission is greatly increased. This protocol can also be modified, so that it can be used in a multi-party control system. 相似文献
20.
Based on the idea of dense coding of three-photon entangled state and qubit transmission in blocks, we present a multiparty controlled quantum secret direct communication scheme by using Greenberger-Horne-Zeilinger state. In the present scheme, the sender transmits three bits of secret message to the receiver directly and the secret message can only be recovered by the receiver under the permission of all the controllers. All three-photon entangled states are used to transmit the secret message except those chosen for eavesdropping check and the present scheme has a high source capacity because Greenberger-Horne-Zeilinger state forms a large Hilbert space. 相似文献