首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 163 毫秒
1.
陈立冰  路洪  金瑞博 《中国物理》2007,16(11):3204-3211
We present a systematic simple method to implement a generalized quantum control-NOT (CNOT) gate on two d-dimensional distributed systems. First, we show how the nonlocal generalized quantum CNOT gate can be implemented with unity fidelity and unity probability by using a maximally entangled pair of qudits as a quantum channel. We also put forward a scheme for probabilistically implementing the nonlocal operation with unity fidelity by employing a partially entangled qudit pair as a quantum channel. Analysis of the scheme indicates that the use of partially entangled quantum channel for implementing the nonlocal generalized quantum CNOT gate leads to the problem of 'the general optimal information extraction'. We also point out that the nonlocal generalized quantum CNOT gate can be used in the entanglement swapping between particles belonging to distant users in a communication network and distributed quantum computer.[第一段]  相似文献   

2.
修晓明  董莉  高亚军  迟锋 《中国物理 B》2008,17(11):3991-3995
In this paper, we present a multi-partner communication network protocol. The supervisor prepares numerous Einstein-Podolsky-Rosen (EPR) pairs and auxiliary qubits. He then performs a controlled-NOT(CNOT) gate operation on one qubit of each EPR pair and an auxiliary, which induces the entanglement between the EPR pair and the auxiliary. The supervisor keeps one qubit sequence in his laboratory and sends the others to the outside world. After security approval, the network can be constructed successfully, which can be applied to quantum secret sharing and quantum secure direct communication.  相似文献   

3.
杨宇光  温巧燕  朱甫臣 《中国物理》2007,16(7):1838-1842
In this paper an efficient quantum secure direct communication (QSDC) scheme with authentication is presented, which is based on quantum entanglement and polarized single photons. The present protocol uses Einstein-Podolsky-Rosen (EPR) pairs and polarized single photons in batches. A particle of the EPR pairs is retained in the sender's station, and the other is transmitted forth and back between the sender and the receiver, similar to the‘ping-pong' QSDC protocol. According to the shared information beforehand, these two kinds of quantum states are mixed and then transmitted via a quantum channel. The EPR pairs are used to transmit secret messages and the polarized single photons used for authentication and eavesdropping check. Consequently, because of the dual contributions of the polarized single photons, no classical information is needed. The intrinsic efficiency and total efficiency are both 1 in this scheme as almost all of the instances are useful and each EPR pair can be used to carry two bits of information.  相似文献   

4.
潘兴博  陈秀波  徐刚  窦钊  李宗鹏  杨义先 《中国物理 B》2022,31(1):10305-010305
We propose a scheme where one can exploit auxiliary resources to achieve quantum multicast communication with network coding over the butterfly network.In this paper,we propose the quantum 2-pair multicast communication scheme,and extend it to k-pair multicast communication over the extended butterfly network.Firstly,an EPR pair is shared between each adjacent node on the butterfly network,and make use of local operation and classical communication to generate entangled relationship between non-adjacent nodes.Secondly,each sender adds auxiliary particles according to the multicast number k,in which the CNOT operations are applied to form the multi-particle entangled state.Finally,combined with network coding and free classical communication,quantum multicast communication based on quantum measurements is completed over the extended butterfly network.Not only the bottleneck problem is solved,but also quantum multicast communication can be completed in our scheme.At the same time,regardless of multicast number k,the maximum capacity of classical channel is 2 bits,and quantum channel is used only once.  相似文献   

5.
We propose a theoretical scheme for secure quantum key distribution network following the ideas m quantum aense coding. In this scheme, the server of the network provides the service for preparing and measuring the Bell states,and the users encode the states with local unitary operations. For preventing the server from eavesdropping, we design a decoy when the particle is transmitted between the users. The scheme has high capacity as one particle carries two bits of information and its efficiency for qubits approaches 100%. Moreover, it is unnecessary for the users to store the quantum states, which makes this scheme more convenient in applications than others.  相似文献   

6.
We present a scheme for quantum privacy amplification (QPA) for a sequence of single qubits. The QPA procedure uses a unitary operation with two controlled-not gates and a Hadamard gate. Every two qubits are performed with the unitary gate operation, and a measurement is made on one photon and the other one is retained. The retained qubit carries the state information of the discarded one. In this way, the information leakage is reduced. The procedure can be performed repeatedly so that the information leakage is reduced to any arbitrarily low level. With this QPA scheme, the quantum secure direct communication with single qubits can be implemented with arbitrarily high security. We also exploit this scheme to do privacy amplification on the single qubits in quantum information sharing for long-distance communication with quantum repeaters.  相似文献   

7.
A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed.  相似文献   

8.
A new quantum secure direct communication (QSDC) scheme with authentication is proposed based on polarized photons and EPR pairs. EPR pairs are used to transmit information, while polarized photons are used to detect Eve and their encoding bases are used to transmit authentication information. Alice and Bob have their own identity number which is shared by legal users only. The identity number is encoded on the bases of polarized photons and distilled if there is no Eve. Compared with other QSDC schemes with authentication, this new scheme is considerably easier and less expensive to implement in a practical setting.  相似文献   

9.
We present an explicit protocol for extraction of an EPR pair from two partially entangled pairs in a deterministic fashion via local operations and classical communication. This protocol is constituted by a local measurement described by a positive operator-valued measure (POVM), one-way classical communication, and a corresponding local unitary operation or a choice between the two pairs. We explicitly construct the required POVM by the analysis of the doubly stochastic matrix connecting the initial and the final states. Our scheme might be useful in future quantum communication.  相似文献   

10.
吴双  梁林梅  李承祖 《中国物理》2007,16(5):1229-1232
The loss of a quantum channel leads to an irretrievable particle loss as well as information. In this paper, the loss of quantum channel is analysed and a method is put forward to recover the particle and information loss effectively using universal quantum error correction. Then a secure direct communication scheme is proposed, such that in a loss channel the information that an eavesdropper can obtain would be limited to arbitrarily small when the code is properly chosen and the correction operation is properly arranged.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号