共查询到20条相似文献,搜索用时 15 毫秒
1.
W. Zhang Y. M. Liu X. F. Yin Z. J. Zhang 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2009,55(1):189-195
Enlightened by Zhang and Cheung’s original idea [J.
Phys. B 41, 015503 (2008)], we put forward a novel tripartite quantum
information splitting scheme by using three Einstein-Podolsky-Rosen
pairs as quantum channels. Our scheme is applicable for perfectly
splitting four ensembles of quantum information known by the
splitter in priori. In contrast to the general scheme using the same
quantum channels [Eur. Phys. J. D 39, 459 (2006)], our
scheme has distinct advantages in quantum resource consumption,
quantum operation intensity, classical communication cost and
efficiency when dealing with the four specific ensembles of quantum information. 相似文献
2.
Chen-Ming Bai Zhi-Hui Li Ting-Ting Xu Yong-Ming Li 《International Journal of Theoretical Physics》2016,55(11):4972-4986
An information theoretical model for quantum secret sharing was introduced by H. Imai et al. (Quantum Inf. Comput. 5(1), 69–80 2005), which was analyzed by quantum information theory. In this paper, we analyze this information theoretical model using the properties of the quantum access structure. By the analysis we propose a generalized model definition for the quantum secret sharing schemes. In our model, there are more quantum access structures which can be realized by our generalized quantum secret sharing schemes than those of the previous one. In addition, we also analyse two kinds of important quantum access structures to illustrate the existence and rationality for the generalized quantum secret sharing schemes and consider the security of the scheme by simple examples. 相似文献
3.
Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme 下载免费PDF全文
《中国物理 B》2021,30(7):70309-070309
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly,the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the quantum channel, to correct the errors in non-Clifford gate evaluation. By using the set synthesized by Clifford gates and T gates, it is feasible to perform the arbitrary quantum computation on the encrypted data. Secondly, our scheme is different from the previous scheme described by the quantum homomorphic encryption algorithm. From the perspective of application, a two-party probabilistic quantum homomorphic encryption scheme is proposed. It is clear what the computation and operation that the client and the server need to perform respectively, as well as the permission to access the data. Finally, the security of probabilistic quantum homomorphic encryption scheme is analyzed in detail. It demonstrates that the scheme has favorable security in three aspects, including privacy data, evaluated data and encryption and decryption keys. 相似文献
4.
An effective teleportation scheme for an unknown ionic internal state
via trapped ions is proposed without joint Bell-state measurement
(BSM). In the constructed quantum channel process, we make use of
entanglement swapping to avoid decrease in entanglement during
the distributing of particles. Thus our scheme provides new prospects
for quantum teleportation in a longer distance. The distinct
advantage of our scheme is insensitive to the heating of vibrational
mode. Furthermore, our scheme has no any individual optical access,
and the successful probability also can reach 1. 相似文献
5.
Teleportation for an Ionic Entangled Internal State by Entanglement Swapping 总被引:4,自引:0,他引:4 下载免费PDF全文
We present an effective scheme to teleport an unknown ionic entangled internal state via trapped ions without joint Bell-state measurement. In the constructed quantum channel process, we adopt entanglement swapping to avoid decrease of entanglement during the distribution of particles. Thus our scheme provides new prospects for quantum teleportation over longer distance. The distinct advantages of our scheme are that our scheme is insensitive to heating of vibrational mode and can be generalized to teleport an N-ion electronic entangled GHZ class state. Furthermore, in our scheme the success probability can reach 1. 相似文献
6.
In this paper, we propose DiLizium: a new lattice-based two-party signature scheme. Our scheme is constructed from a variant of the Crystals-Dilithium post-quantum signature scheme. This allows for more efficient two-party implementation compared with the original but still derives its post-quantum security directly from the Module Learning With Errors and Module Short Integer Solution problems. We discuss our design rationale, describe the protocol in full detail, and provide performance estimates and a comparison with previous schemes. We also provide a security proof for the two-party signature computation protocol against a classical adversary. Extending this proof to a quantum adversary is subject to future studies. However, our scheme is secure against a quantum attacker who has access to just the public key and not the two-party signature creation protocol. 相似文献
7.
Physical superpositions exist both in classical and in quantum physics. However, what is exactly meant by ‘superposition’ in each case is extremely different. In this paper we discuss some of the multiple interpretations which exist in the literature regarding superpositions in quantum mechanics. We argue that all these interpretations have something in common: they all attempt to avoid ‘contradiction’. We argue in this paper, in favor of the importance of developing a new interpretation of superpositions which takes into account contradiction, as a key element of the formal structure of the theory, “right from the start”. In order to show the feasibility of our interpretational project we present an outline of a paraconsistent approach to quantum superpositions which attempts to account for the contradictory properties present in general within quantum superpositions. This approach must not be understood as a closed formal and conceptual scheme but rather as a first step towards a different type of understanding regarding quantum superpositions. 相似文献
8.
Ji-Hao Fan 《中国物理 B》2021,30(12):120302-120302
In most practical quantum mechanical systems, quantum noise due to decoherence is highly biased towards dephasing. The quantum state suffers from phase flip noise much more seriously than from the bit flip noise. In this work, we construct new families of asymmetric quantum concatenated codes (AQCCs) to deal with such biased quantum noise. Our construction is based on a novel concatenation scheme for constructing AQCCs with large asymmetries, in which classical tensor product codes and concatenated codes are utilized to correct phase flip noise and bit flip noise, respectively. We generalize the original concatenation scheme to a more general case for better correcting degenerate errors. Moreover, we focus on constructing nonbinary AQCCs that are highly degenerate. Compared to previous literatures, AQCCs constructed in this paper show much better parameter performance than existed ones. Furthermore, we design the specific encoding circuit of the AQCCs. It is shown that our codes can be encoded more efficiently than standard quantum codes. 相似文献
9.
过去的二十年中,量子信息相关研究取得了显著的进展,重要的理论和实验工作不断涌现.与其他量子信息处理系统相比,基于自旋动力学的核磁共振系统,不仅具有丰富而且成熟的控制技术,还拥有相干时间长、脉冲操控精确、保真度高等优点.这也是核磁共振体量子系统能够精确操控多达12比特的量子系统的原因.因此,核磁共振量子处理器在量子信息领域一直扮演着重要角色.本文介绍核磁共振量子计算的基本原理和一些新研究进展.研究的新进展主要包括量子噪声注入技术、量子机器学习在核磁共振平台上的实验演示、高能物理和拓扑序的量子模拟以及核磁共振量子云平台等.最后讨论了液态核磁共振的发展前景和发展瓶颈,并对未来发展方向提出展望. 相似文献
10.
We propose a novel quantum teleportation protocol for certain class of five-qubit state with a seven-qubit cluster state as quantum channel. In our scheme, the sender merely needs to perform a seven-qubit von-Neumann projective measurement, the original state with deterministic probability can be reconstructed by the receiver after a series corresponding unitary transformations. Compared with other schemes proposed before, our scheme has the distinct advantages of requiring fewer quantum channels, possessing higher intrinsic efficiency, and transmitting more quantum information bits. 相似文献
11.
In this paper, a scheme is proposed for remote state preparation (RSP) with cavity quantum electrodynamics (QED). In our scheme, two observers share two-atom nonmaximally entangled state as quantum channels and can realize remote preparation of state of an atom. We also propose a generalization for remote preparation of N-atom entangled state by (N+1)-atom GHZ-like state (N ≥ 2). By this scheme, one single-atom projective measurement is enough for the RSP of a qubit or N-atom entangled state, and the probability of success for RSP is unity. Furthermore, we have considered the case where observers use W-like state as quantum channels to realize RSP of a qubit. We compare our scheme with existing ones. 相似文献
12.
D. X. Kong A. M. Wang 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2009,55(1):211-221
We investigate the quantum-state transfer on spin-chain channels with random imperfections.
Through combining the advantages of two known schemes, the dual-rail spin-chain
channels [9] and the particular ihhomogenous spin-chain channel [10],
we propose a protocol that can avoid the quantum noises introduced by many unnecessary
measurements and can enhance the anti-decoherence ability. The results show that our protocol is more efficient to transfer
an
arbitrary quantum state than the original one. In particular, we discuss the effects of couplings fluctuations and imperfect
initialization on both of the improved scheme and original one. 相似文献
13.
The overwhelming majority of the attempts in exploring the problems related to quantum logical structures and their interpretation have been based on an underlying set-theoretic syntactic language. We propose a transition in the involved syntactic language to tackle these problems from the set-theoretic to the category-theoretic mode, together with a study of the consequent semantic transition in the logical interpretation of quantum event structures. In the present work, this is realized by representing categorically the global structure of a quantum algebra of events (or propositions) in terms of sheaves of local Boolean frames forming Boolean localization functors. The category of sheaves is a topos providing the possibility of applying the powerful logical classification methodology of topos theory with reference to the quantum world. In particular, we show that the topos-theoretic representation scheme of quantum event algebras by means of Boolean localization functors incorporates an object of truth values, which constitutes the appropriate tool for the definition of quantum truth-value assignments to propositions describing the behavior of quantum systems. Effectively, this scheme induces a revised realist account of truth in the quantum domain of discourse. We also include an Appendix, where we compare our topos-theoretic representation scheme of quantum event algebras with other categorial and topos-theoretic approaches. 相似文献
14.
In quantum mechanics, the expectation value of an operator can be measured by using the projective measurement, ifthe coupling between the measured system and pointer is strong enough. However in the weak coupling regime, the pointercan not show all the eigenvalue of the physical quantity directly due to the overlapping among the pointer states, whichmakes the measurement of the expectation value difficult. In this paper, we propose an expectation value measurementmethod in the weak coupling regime inspired by the weak measurement scheme. Compared to the projective measurement,our scheme has two obvious advantages. Experimentally we use the internal state and motional state of a single trapped40Ca+ to establish the measurement scheme and realize the proof of principle demonstration of the scheme. 相似文献
15.
YuGuang Yang YuChen Zhang Gang Xu XiuBo Chen Yi-Hua Zhou WeiMin Shi 《中国科学:物理学 力学 天文学(英文版)》2018,61(3):030312
Li et al. first proposed a quantum hash function(QHF) in a quantum-walk architecture. In their scheme, two two-particle interactions, i.e., I interaction and π-phase interaction are introduced and the choice of I or π-phase interactions at each iteration depends on a message bit. In this paper, we propose an efficient QHF by dense coding of coin operators in discrete-time quantum walk. Compared with existing QHFs, our protocol has the following advantages: the efficiency of the QHF can be doubled and even more; only one particle is enough and two-particle interactions are unnecessary so that quantum resources are saved. It is a clue to apply the dense coding technique to quantum cryptographic protocols, especially to the applications with restricted quantum resources. 相似文献
16.
F. Jenč 《Foundations of Physics》1979,9(9-10):707-737
The application of the conceptual analysis (CA) method outlined in Part I is illustrated on the example of quantum mechanics. In Part II, we deduce the complete-lattice structure in quantum mechanics from postulates specifying the idealizations that are accepted in the theory. The idealized abstract concepts are introduced by means of a topological extension of the basic structure (obtained in Part I) in accord with the “approximation principle”; the relevant topologies are not arbitrarily chosen; they are fixed by the choice of the idealizations. There is a typical topological asymmetry in the mathematical scheme. Convexity or linear structures do not play any role in the mathematical methods of this approach. The essential concept in Part II is the idealization of “perfect measurement” suggested by our conceptual analysis in Part I. The Hilbert-space representation will be deduced in Part III. In our papers, we keep to the tenet: The mathematical scheme of a physical theory must be rigorously formulated. However, for physics, mathematics is only a nice and useful tool; it is not purpose. 相似文献
17.
量子存储器是实现按照需要存储/读出诸如单光子、纠缠或者压缩态等非经典量子态的系统,是实现量子通信和量子计算必不可少的核心器件.量子存储协议多种多样,其中拉曼方案由于具有存储宽带大、可用于存储短脉冲信号的优点而引起了人们的广泛关注.然而实现真正单光子和光子纠缠的拉曼存储具有挑战性.本文简要介绍了量子存储器的主要性能和评价指标,在回顾了量子存储器特别是拉曼量子存储器的发展现状后,重点介绍了本研究组最近基于拉曼协议实现各种量子态存储的系列研究,取得的研究成果对于构建高速量子网络具有重要参考价值. 相似文献
18.
Piotr Fra̧ckiewicz Jan Sładkowski 《International Journal of Theoretical Physics》2014,53(10):3248-3261
The paper is devoted to quantization of extensive games with the use of both the Marinatto-Weber and the Eisert-Wilkens-Lewenstein concept of quantum game. We revise the current conception of quantum ultimatum game and we show why the proposal is unacceptable. To support our approach, we present a new idea of the quantum ultimatum game. Our scheme also makes a point of departure for a general protocol for quantizing extensive games. 相似文献
19.
Entanglement concentration and teleportation of multipartite entangled states in an ion trap 下载免费PDF全文
We propose an effective scheme for the entanglement concentration of
a four-particle state via entanglement swapping in an ion trap.
Taking the maximally entangled state after concentration as a quantum
channel, we can faithfully and determinatively teleport quantum
entangled states from Alice to Bob without the joint Bell-state
measurement. In the process of constructing the quantum channel, we
adopt entanglement swapping to avoid the decrease of entanglement
during the distribution of particles. Thus our scheme provides a new
prospect for quantum teleportation over a longer distance.
Furthermore, the success probability of our scheme is 1.0. 相似文献
20.
HUANG Da-Zu CHEN Zhi-Gang GUO Ying 《理论物理通讯》2009,51(2):221-226
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation. 相似文献