首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the travelling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message.  相似文献   

2.
A multiple multi-qubit quantum states sharing scheme is proposed,in which the dealer can share multiple multi-qubit quantum states among the participants through only one distribution and one recovery.The dealer encodes the secret quantum states into a special entangled state,and then distributes the particles of the entangled state to the participants.The participants perform the single-particle measurements on their particles,and can cooperate to recover the multiple multi-qubit quantum states.Compared to the existing schemes,our scheme is more efficient and more flexible in practice.  相似文献   

3.
提出了一种基于Greenberger-Horne-Zeilinger(GHZ)纠缠态进行纯EPR对双向隐形传态的方案.通过使用纠缠交换技术,通信双方Alice和Bob共享两对三粒子GHZ纠缠态来构建量子信道.方案中通过使用受控非门操作,单量子位测量以及适当的幺正操作,通信双方可以同时发送一个纯EPR对给对方.故相比仅可以传送单一量子态的方案更经济.  相似文献   

4.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

5.
An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is shown that the proposed scheme is secure against several well-known attacks.Specifically,it can stand against the receiver’s disavowal attack.Moreover,compared with previous relevant arbitrated quantum signature schemes,the scheme proposed has the advantage of less transmission complexity.  相似文献   

6.
薛正远  易佑民  曹卓良 《中国物理》2006,15(7):1421-1424
We investigate schemes for quantum secret sharing and quantum dense coding via tripartite entangled states. We present a scheme for sharing classical information via entanglement swapping using two tripartite entangled GHZ states. In order to throw light upon the security affairs of the quantum dense coding protocol, we also suggest a secure quantum dense coding scheme via W state by analogy with the theory of sharing information among involved users.  相似文献   

7.
《中国物理 B》2021,30(10):100303-100303
Recently, measurement-device-independent quantum secure direct communication schemes were proposed by Niu et al. [Sci. Bull. 63 1345(2018)] and Zhou et al. [Sci. China-Phys. Mech. Astron. 63 230362(2020)]. Inspired by their ideas,in this paper, a measurement-device-independent quantum dialogue protocol based on entanglement is designed and proven to be secure. The advantage of this scheme is that it can not only allow two communicators to transmit secret messages between each other, making the application scenarios more extensive, but can also eliminate all the security loopholes related to the measurement device and information leakage. In terms of experimental implementation, the scheme mainly involves the preparation of entangled states, the preparation of single photons, quantum storage, Bell measurement and other technologies, all of which are mature at present, therefore, the scheme is feasible by using current technologies.  相似文献   

8.
It is a simple introduction to quantum entanglement and quantum operations. The authors focus on some applications of quantum entanglement and relations between two-qubit entangled states and unitary operations. It includes remote state preparation by using any pure entangled states, nonlocal operation implementation using entangled states, entanglement capacity of two-qubit gates and two-qubit gates construction. Supported by the National Fundamental Research Program of China (Grant No. 2001CB309306), the National Natural Science Foundation of China (Grant Nos. 60621064 and 10674127) and the Innovation Funds from Chinese Academy of Sciences  相似文献   

9.
A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed.In the proposed scheme,communicators share key information by exchanging one travelling photon with two random and secret polarization angles.The security of the distributed key is guaranteed by three checking phases in three-way channel and the communicators' secret polarization angles.  相似文献   

10.
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes.  相似文献   

11.
Based on the idea of dense coding of three-photon entangled state and qubit transmission in blocks, we present a multiparty controlled quantum secret direct communication scheme by using Greenberger-Horne-Zeilinger state. In the present scheme, the sender transmits three bits of secret message to the receiver directly and the secret message can only be recovered by the receiver under the permission of all the controllers. All three-photon entangled states are used to transmit the secret message except those chosen for eavesdropping check and the present scheme has a high source capacity because Greenberger-Horne-Zeilinger state forms a large Hilbert space.  相似文献   

12.
於亚飞  张智明 《中国物理 B》2009,18(4):1342-1345
This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has insecurity though the Smolin state was reported to violate maximally the two-setting Bell-inequality. The general proof is given.  相似文献   

13.
基于腔QED的多用户间的多原子量子信道的建立   总被引:3,自引:0,他引:3       下载免费PDF全文
赵晗  周小清  杨小琳 《物理学报》2009,58(9):5970-5977
提出基于腔QED技术的多用户间的多原子W态和GHZ态量子信道的建立方案.在量子网络的空闲时段,各个用户和量子交换机共享EPR对.量子交换机通过原子和腔场的相互作用将两个EPR对制备成W态,再与另一个EPR对进行纠缠交换,经过直接测量后为用户建立三原子W态量子信道;同时讨论了四用户间的W态量子信道的建立方案.量子交换机对三个EPR对进行纠缠交换,将三个原子同时与腔场作用,经过直接测量后为用户建立三原子GHZ态量子信道;并将此方法推广到N个用户间的GHZ态量子信道的建立. 关键词: 腔QED 量子信道 量子交换机 纠缠交换  相似文献   

14.
Controlled Secure Quantum Dialogue Using a Pure Entangled GHZ States   总被引:1,自引:0,他引:1  
We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We show that the authorized two users can exchange their secret messages after purifying the non-maximally entangled GHZ states quantum channel unconditionally securely and simultaneously under the control of a third party.  相似文献   

15.
Multicast-based quantum teleportation(QT) is extensively used in quantum information transmission where a sender sends different information to multiple receivers at the large distance through the quantum entangled channel. In this paper, we introduce the multi-output QT scheme, which deals with the situation that the synchronous transfer of the arbitrary m-and(m+1)-qubit GHZ-class states from one sender to two receivers. Notably, the requirement about synchronous diverse information transmission is satisfied in our scheme with high efficiency. Moreover, we demonstrate the implementation of the special case of above quantum multi-output teleportation scheme on a sixteenqubit quantum computer and a 32-qubit simulator provided by IBM quantum platform, then discuss it in four types of noisy environments, and calculate the fidelities of the output states.  相似文献   

16.
A symmetric two-mode Gaussian entangled state is used to investigate the effect of excess noise on entanglement sudden death and Gaussian quantum discord with continuous variables. The results show that the excess noise in the channel can lead to entanglement sudden death of a symmetric two-mode Gaussian entangled state, while Gaussian quantum discord never vanishes. As a practical application, the security of a quantum key distribution (QKD) scheme based on a symmetric two-mode Gaussian entangled state against collective Gaussian attacks is analyzed. The calculation results show that the secret key cannot be distilled when entanglement vanishes and only quantum discord exists in such a QKD scheme.  相似文献   

17.
We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies.  相似文献   

18.
A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information.Moreover,the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information.Then,the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users.After insuring the security of the quantum channel,they begin to hide the secret information in the cover of message.Comparing the scheme with the previous quantum steganographies,capacity and imperceptibility of hidden message are good.The security of the present scheme against many attacks is also discussed.  相似文献   

19.
黄伟  温巧燕  贾恒越  秦素娟  高飞 《中国物理 B》2012,21(10):100308-100308
We present two novel quantum secure direct communication(QSDC) protocols over different collective-noise channels.Different from the previous QSDC schemes over collective-noise channels,which are all source-encrypting protocols,our two protocols are based on channel-encryption.In both schemes,two authorized users first share a sequence of EPR pairs as their reusable quantum key.Then they use their quantum key to encrypt and decrypt the secret message carried by the decoherence-free states over the collective-noise channel.In theory,the intrinsic efficiencies of both protocols are high since there is no need to consume any entangled states including both the quantum key and the information carriers except the ones used for eavesdropping checks.For checking eavesdropping,the two parties only need to perform two-particle measurements on the decoy states during each round.Finally,we make a security analysis of our two protocols and demonstrate that they are secure.  相似文献   

20.
六光子量子纠缠态的制备   总被引:2,自引:0,他引:2       下载免费PDF全文
游珺  李家华  谢小涛 《中国物理》2005,14(7):1329-1333
我们提出了一个完全基于量子擦除概念上的六光子纠缠态的制备方案。首先,提出了利用一组四纠缠光子来制备六光子纠缠态的方案。接着,运用同样的技术,通过五粒子纠缠和Bell态的相互作用来制备六光子纠缠态。我们的实验方案可以应用于以测量为基础的量子计算和多体量子通信领域的研究。我们发现该方案成功的概率取决于纠缠态的系数。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号