首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
~~Implementation of a multiple round quantum dense coding using nuclear magnetic resonance1. Bennett, C. H., Wiesner, S. J., Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states, Phys. Rev. Lett., 1992, 69(20): 2881-2884. 2. Mattle, K., Weinfurter, H., Kwiat, P. G. et al., Dense coding in experimental quantum communication, Phys. Rev. Lett., 1996, 76(25): 4656-4659. 3. Fang, X. M., Zhu, X. W., Feng, M. et al., Experimental implementation of dens…  相似文献   

2.
Probabilistic remote state preparation by W states   总被引:1,自引:0,他引:1       下载免费PDF全文
刘金明  王育竹 《中国物理》2004,13(2):147-152
In this paper we consider a scheme for probabilistic remote state preparation of a general qubit by using W states. The scheme consists of the sender, Alice, and two remote receivers Bob and Carol. Alice performs a projective measurement on her qubit in the basis spanned by the state she wants to prepare and its orthocomplement. This allows either Bob or Carol to reconstruct the state with finite success probability. It is shown that for some special ensembles of qubits, the remote state preparation scheme requires only two classical bits, unlike the case in the scheme of quantum teleportation where three classical bits are needed.  相似文献   

3.
The physics realization of a ququadrit quantum computation with cooled trapped 138Ba+ ions in a Paul trap is investigated. The ground state level 62 S1/2(m = −1/2) and three metastable levels: 52 D3/2(m = −1/2), 52 D5/2(m = −1/2), and 52 D5/2(m = 1/2), of the fine-structure of the 138Ba+ ion, are used to store the quantum information of ququadrits. The use of coherent manipulation of populations in single ququadrit, being a four-dimensional Hilbert space, produces a discrete Fourier transform and the manipulation of the first red band transitions with the introduction of an ancillary quantum channel between two ququadrits generates a conditional phase gate. The combination of the both above results in a universal two-ququadrit gate, called XOR(4) gate corresponding to the controlled-NOT gate operation in qubit systems. The implementation of quantum Fourier transform for n ququadrits is performed by means of the conditional phase-shift gate. The feasibility of physical realization of ququadrit quantum computation with cooled-trapped 138Ba+ ions is detailed analyzed and described, and the theoretical detection method of logical states is given. Higher entanglement between ququadrits than qutrits or qubits and more security of ququadrit quantum cryptography than qutrit's or qutrit's will lead to more extensive applications ququadrits in quantum information fields. In particular, it is pointed out that this scheme should be the highest dimensional quantum computation in cooled-trapped ions, the entanglement between ququadrits should be the highest dimensional entanglement in it, and the ququadrit quantum cryptography should be the most secure cryptography protocol in it.  相似文献   

4.

A scheme of circular controlled quantum teleportation, which is a novel version of bidirectional controlled quantum teleportation, is proposed using a specific genuine seven-qubit entangled state as quantum channel, and then it is generalized to the scene with a general genuine seven-qubit entangled state as channel. This means that with the control of the supervisor Daniel while Alice teleportates an unknown qubit state to Bob, Bob can also teleportate an unknown qubit state to Charlie and Charlie can also teleportate an unknown qubit state to Alice circularly, simultaneously. Compared with the BCQT schemes proposed before, the intrinsic efficiency of our scheme is optimal.

  相似文献   

5.
提出了一个用三粒子纠缠的GHZ态作为量子信道实现多点控制的远程单比特幺正变换的操纵方案.在该方案中,发送者Alice能“传送”一个幺正变换给远距离的接收者Bob,此幺正变换的结构分别由Alice和Bob决定.而Alice与Bob间的量子信道宽度,亦远程单比特幺正变换的成功操纵几率则由第三者Cindy控制.Cindy与Alice(Bob)间的经典通讯也由Cindy控制.  相似文献   

6.
A scheme for secure direct communication using EPR pairs and teleportation   总被引:7,自引:0,他引:7  
A novel scheme for secure direct communication between Alice and Bob is proposed, where there is no need for establishing a shared secret key. The communication is based on Einstein-Podolsky-Rosen (EPR) pairs and teleportation between Alice and Bob. After insuring the security of the quantum channel (EPR pairs), Bob encodes the secret message directly on a sequence of particle states and transmits them to Alice by teleportation. In this scheme teleportation transmits Bobs message without revealing any information to a potential eavesdropper. Alice can read out the encoded messages directly by the measurement on her qubits. Because there is not a transmission of the qubit which carries the secret message between Alice and Bob, it is completely secure for direct secret communication if perfect quantum channel is used.Received: 17 March 2004, Published online: 30 September 2004PACS: 03.67.Dd Quantum cryptography - 03.67.Hk Quantum communicationF.L. Yan: Present address: Department of Physics, Hebei Normal University, Shijiazhuang 050016, P.R. China  相似文献   

7.
In this paper, we present a scheme for quantum dialogue by using a four-qubit cluster state as quantum channel.The scheme has two cases: Case 1, Sender Alice and receiver Bob share information using an orderly sequence of entangled state as quantum channel which was prepared by Alice. This case is achieved as follows: The two sides agreed to encode quantum state information, then Alice perform a bell state measurement for quantum information which has been encoded. This will convey the information to Bob, then Bob measuring his own qubits, through the analysis of the measurement results of Alice and Bob, Bob can obtain quantum information. For case 2, four-qubit cluster state and quantum state information is transmitted to form a total quantum system. In the Case 2 scenario, Alice and Bob perform bell state measurements for part of the qubits, and tell the measurement result to each other through the classical channel. Finally, according to the measurement result, Alice and Bob operate an appropriate unitary transformation, as a result, Alice’s qubit will be renewed upon Bob’s measurements, and also, Bob’s qubit will be renewed upon Alice’s measurements. Thus, a bidirectional quantum dialogue is achieved. After analysis, this scheme has high security by taking certain eavesdropping attacks into account. There is therefore a certain reference value to the realization of quantum dialogue.  相似文献   

8.
A bidirectional quantum controlled teleportation scheme using a seven-qubit maximally entangled state as quantum channel is proposed. This means that Alice can transmit an arbitrary single qubit state of qubit a to Bob and Bob can transmit an arbitrary single qubit state of qubit b to Alice via the control of the supervisor Charlie.  相似文献   

9.
To implement generalized quantum measurement (GQM) one has to extend the original Hilbert space. Generally speaking, the additional dimensions of the ancilla space increase as the number of the operators of the GQM n increases. This paper presents a scheme for deterministically implementing all possible n-operator GQMs on a single atomic qubit by using only one 2-dimensional ancillary atomic qubit repeatedly, which remarkably reduces the complexity of the realistic physical system. Here the qubit is encoded in the internal states of an atom trapped in an optical cavity and single-photon pulses are employed to provide the interaction between qubits. It shows that the scheme can be performed remotely, and thus it is suitable for implementing GQM in a quantum network. What is more, the number of the total ancilla dimensions in our scheme achieves the theoretic low bound.  相似文献   

10.
We propose a rotationally-invariant quantum key distribution scheme that uses a pair of orthogonal qubit trines, realized as mixed states of three physical qubits. The measurement outcomes do not depend on how Alice and Bob choose their individual reference frames. The efficient key generation by two-way communication produces two independent raw keys, a bit key and a trit key. For a noiseless channel, Alice and Bob get a total of 0.573 key bits per trine state sent (98% of the Shannon limit). This exceeds by a considerable amount the yield of standard trine schemes, which ideally attain half a key bit per trine state. Eavesdropping introduces an ?-fraction of unbiased noise, ensured by twirling if necessary. The security analysis reveals an asymmetry in Eve's conditioned ancillas for Alice and Bob resulting from their inequivalent roles in the key generation. Upon simplifying the analysis by a plausible symmetry assumption, we find that a secret key can be generated if the noise is below the threshold set by ?=0.197.  相似文献   

11.
We propose a scheme for bidirectional controlled quantum teleportation by using a genuine five-qubit entangled state. In our scheme, Alice may transmit an arbitrary single qubit state of qubit A to Bob and at the same time, Bob may transmit an arbitrary single qubit state of qubit B to Alice via the control of the supervisor Charlie.  相似文献   

12.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

13.
In this paper, taking the theory of quantum information as a model, we consider the human unconscious, pre-consciousness and consciousness as sets of quantum bits (qubits). We view how there can be communication between these various qubit sets. In doing this we are inspired by the theory of nuclear magnetic resonance. In this way we build a model of handling a mental qubit with the help of pulses of a mental field. Starting with an elementary interaction between two qubits we build two-qubit quantum logic gates that allow information to be transferred from one qubit to the other. In this manner we build a quantum process that permits consciousness to “read” the unconscious and vice versa. The elementary interaction, e.g. between a pre-consciousness qubit and a consciousness one, allows us to predict the time evolution of the pre-consciousness + consciousness system in which pre-consciousness and consciousness are quantum entangled. This time evolution exhibits Rabi oscillations that we name mental Rabi oscillations. This time evolution shows how for example the unconscious can influence consciousness. In a process like mourning the influence of the unconscious on consciousness, as the influence of consciousness on the unconscious, are in agreement with what is observed in psychiatry.  相似文献   

14.
We present a scheme for bidirectional controlled teleportation by using a six-qubit cluster state as quantum channel. Based on the C-not operation and single qubit measurements, Alice may transmit an arbitrary single qubit state of qubit A to Bob and Bob may transmit an arbitrary single qubit state of qubit B to Alice via the control of the supervisor Charlie.  相似文献   

15.
We present two robust three-party quantum secret sharing protocols against two kinds of collective noise. Each logical qubit is made up of two physical qubits and is invariant under a collective noise. The two agents encode their message on each logical qubit with two unitary physical operations on two physical qubits. As each logical qubit received by each agent can carry two bits of information and the classical information exchanged is reduced largely, these protocols have a high intrinsic efficiency. Moreover, the boss Alice can read out her agents' information with two Bell-state measurements on each four-qubit system, not four-photon joint measurements.  相似文献   

16.
We present a scheme for bidirectional controlled teleportation by using a five-qubit composite GHZ-Bell state as quantum channel. Based on the C-not operation and single qubit measurements, Alice may transmit an arbitrary single qubit state of qubit A to Bob and Bob may transmit an arbitrary single qubit state of qubit B to Alice via the control of the supervisor Charlie.  相似文献   

17.

In this paper, we present a scheme of bidirectional quantum controlled teleportation of three-qubit state by using GHZ states. Alice transmits an unknown three-qubit entangled state to Bob, and Bob transmit an unknown three-qubit entangled state to Alice via the control of the supervisor Charlie. In order to facilitate the implementation in the experimental environment, the preparation method of quantum channel is given. This scheme is based on that three-qubit entangled state are transformed into two-qubit entangled state and single qubit superposition state by using Toffoli Gate and Controlled-NOT operation, receivers can by introducing the appropriate unitary transformation and auxiliary particles to reconstruct the initial state. Finally, this paper is implemented a scheme of bidirectional quantum controlled teleportation of more than two qubits via the control of the supervisor Charlie.

  相似文献   

18.
A deterministic secure quantum communication against collective-dephasing noise is proposed. Alice constructs two sets of three-photon bases with EPR (Einstein-Podolsky-Rosen) pairs in the state |Ψ+〉 or |Ψ-〉 and auxiliary single photons in the state |H〉. And then she sends them to Bob. Bob can get the secret message by his single-photon measurement outcomes and two public message strings from Alice if the quantum channel is secure. The scheme does not need photon storing technique and only single-photon measurement is necessary.  相似文献   

19.
A scheme for quantum state sharing of an arbitrary m-qudit state is proposed with two-qudit entanglements and generalized Bell-state (GBS) measurements. In this scheme, the sender Alice should perform m two-particle GBS measurements on her 2m qudits, and the controllers also take GBS measurements on their qudits and transfer their quantum information to the receiver with entanglement swapping if the agents cooperate. We discuss two topological structures for this quantum state sharing scheme, a dispersive one and a circular one. The former is better at the aspect of security than the latter as it requires the number of the agents who should cooperate for recovering the quantum secret larger than the other one.  相似文献   

20.
The dependence of the ground-state energy E of a quantum-mechanical system on the parameter λ appearing linearly in the Hamiltonian is studied. A variation of the scale makes it possible to supplement the convexity-concavity relation for energy as a function of this parameter with a refined relation between the energies of systems that go over to one another upon a change in the particle charges or masses. This relation follows from the fundamentals of quantum mechanics and is valid for exact energies of the systems being considered. Its application does not require calculating wave functions and makes it possible to determine the boundaries of the ground-state energy level and the boundaries of the region of obvious stability of various systems. The results of applying the theory to m 1+ m 2+ m 3 and m 1+ m 2+ m 4 three- and four-particle mesic atoms and molecules featuring particles of various mass are presented.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号