首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Enlightened by Zhang and Cheung’s original idea [J. Phys. B 41, 015503 (2008)], we put forward a novel tripartite quantum information splitting scheme by using three Einstein-Podolsky-Rosen pairs as quantum channels. Our scheme is applicable for perfectly splitting four ensembles of quantum information known by the splitter in priori. In contrast to the general scheme using the same quantum channels [Eur. Phys. J. D 39, 459 (2006)], our scheme has distinct advantages in quantum resource consumption, quantum operation intensity, classical communication cost and efficiency when dealing with the four specific ensembles of quantum information.  相似文献   

2.
An information theoretical model for quantum secret sharing was introduced by H. Imai et al. (Quantum Inf. Comput. 5(1), 69–80 2005), which was analyzed by quantum information theory. In this paper, we analyze this information theoretical model using the properties of the quantum access structure. By the analysis we propose a generalized model definition for the quantum secret sharing schemes. In our model, there are more quantum access structures which can be realized by our generalized quantum secret sharing schemes than those of the previous one. In addition, we also analyse two kinds of important quantum access structures to illustrate the existence and rationality for the generalized quantum secret sharing schemes and consider the security of the scheme by simple examples.  相似文献   

3.
《中国物理 B》2021,30(7):70309-070309
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly,the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the quantum channel, to correct the errors in non-Clifford gate evaluation. By using the set synthesized by Clifford gates and T gates, it is feasible to perform the arbitrary quantum computation on the encrypted data. Secondly, our scheme is different from the previous scheme described by the quantum homomorphic encryption algorithm. From the perspective of application, a two-party probabilistic quantum homomorphic encryption scheme is proposed. It is clear what the computation and operation that the client and the server need to perform respectively, as well as the permission to access the data. Finally, the security of probabilistic quantum homomorphic encryption scheme is analyzed in detail. It demonstrates that the scheme has favorable security in three aspects, including privacy data, evaluated data and encryption and decryption keys.  相似文献   

4.
Quantum teleportation by entanglement swapping with trapped ions   总被引:4,自引:0,他引:4       下载免费PDF全文
An effective teleportation scheme for an unknown ionic internal state via trapped ions is proposed without joint Bell-state measurement (BSM). In the constructed quantum channel process, we make use of entanglement swapping to avoid decrease in entanglement during the distributing of particles. Thus our scheme provides new prospects for quantum teleportation in a longer distance. The distinct advantage of our scheme is insensitive to the heating of vibrational mode. Furthermore, our scheme has no any individual optical access, and the successful probability also can reach 1.  相似文献   

5.
We present an effective scheme to teleport an unknown ionic entangled internal state via trapped ions without joint Bell-state measurement. In the constructed quantum channel process, we adopt entanglement swapping to avoid decrease of entanglement during the distribution of particles. Thus our scheme provides new prospects for quantum teleportation over longer distance. The distinct advantages of our scheme are that our scheme is insensitive to heating of vibrational mode and can be generalized to teleport an N-ion electronic entangled GHZ class state. Furthermore, in our scheme the success probability can reach 1.  相似文献   

6.
In this paper, we propose DiLizium: a new lattice-based two-party signature scheme. Our scheme is constructed from a variant of the Crystals-Dilithium post-quantum signature scheme. This allows for more efficient two-party implementation compared with the original but still derives its post-quantum security directly from the Module Learning With Errors and Module Short Integer Solution problems. We discuss our design rationale, describe the protocol in full detail, and provide performance estimates and a comparison with previous schemes. We also provide a security proof for the two-party signature computation protocol against a classical adversary. Extending this proof to a quantum adversary is subject to future studies. However, our scheme is secure against a quantum attacker who has access to just the public key and not the two-party signature creation protocol.  相似文献   

7.
Physical superpositions exist both in classical and in quantum physics. However, what is exactly meant by ‘superposition’ in each case is extremely different. In this paper we discuss some of the multiple interpretations which exist in the literature regarding superpositions in quantum mechanics. We argue that all these interpretations have something in common: they all attempt to avoid ‘contradiction’. We argue in this paper, in favor of the importance of developing a new interpretation of superpositions which takes into account contradiction, as a key element of the formal structure of the theory, “right from the start”. In order to show the feasibility of our interpretational project we present an outline of a paraconsistent approach to quantum superpositions which attempts to account for the contradictory properties present in general within quantum superpositions. This approach must not be understood as a closed formal and conceptual scheme but rather as a first step towards a different type of understanding regarding quantum superpositions.  相似文献   

8.
Ji-Hao Fan 《中国物理 B》2021,30(12):120302-120302
In most practical quantum mechanical systems, quantum noise due to decoherence is highly biased towards dephasing. The quantum state suffers from phase flip noise much more seriously than from the bit flip noise. In this work, we construct new families of asymmetric quantum concatenated codes (AQCCs) to deal with such biased quantum noise. Our construction is based on a novel concatenation scheme for constructing AQCCs with large asymmetries, in which classical tensor product codes and concatenated codes are utilized to correct phase flip noise and bit flip noise, respectively. We generalize the original concatenation scheme to a more general case for better correcting degenerate errors. Moreover, we focus on constructing nonbinary AQCCs that are highly degenerate. Compared to previous literatures, AQCCs constructed in this paper show much better parameter performance than existed ones. Furthermore, we design the specific encoding circuit of the AQCCs. It is shown that our codes can be encoded more efficiently than standard quantum codes.  相似文献   

9.
孔祥宇  朱垣晔  闻经纬  辛涛  李可仁  龙桂鲁 《物理学报》2018,67(22):220301-220301
过去的二十年中,量子信息相关研究取得了显著的进展,重要的理论和实验工作不断涌现.与其他量子信息处理系统相比,基于自旋动力学的核磁共振系统,不仅具有丰富而且成熟的控制技术,还拥有相干时间长、脉冲操控精确、保真度高等优点.这也是核磁共振体量子系统能够精确操控多达12比特的量子系统的原因.因此,核磁共振量子处理器在量子信息领域一直扮演着重要角色.本文介绍核磁共振量子计算的基本原理和一些新研究进展.研究的新进展主要包括量子噪声注入技术、量子机器学习在核磁共振平台上的实验演示、高能物理和拓扑序的量子模拟以及核磁共振量子云平台等.最后讨论了液态核磁共振的发展前景和发展瓶颈,并对未来发展方向提出展望.  相似文献   

10.
We propose a novel quantum teleportation protocol for certain class of five-qubit state with a seven-qubit cluster state as quantum channel. In our scheme, the sender merely needs to perform a seven-qubit von-Neumann projective measurement, the original state with deterministic probability can be reconstructed by the receiver after a series corresponding unitary transformations. Compared with other schemes proposed before, our scheme has the distinct advantages of requiring fewer quantum channels, possessing higher intrinsic efficiency, and transmitting more quantum information bits.  相似文献   

11.
邓黎  陈爱喜  徐彦秋 《中国物理 B》2008,17(10):3725-3728
In this paper, a scheme is proposed for remote state preparation (RSP) with cavity quantum electrodynamics (QED). In our scheme, two observers share two-atom nonmaximally entangled state as quantum channels and can realize remote preparation of state of an atom. We also propose a generalization for remote preparation of N-atom entangled state by (N+1)-atom GHZ-like state (N ≥ 2). By this scheme, one single-atom projective measurement is enough for the RSP of a qubit or N-atom entangled state, and the probability of success for RSP is unity. Furthermore, we have considered the case where observers use W-like state as quantum channels to realize RSP of a qubit. We compare our scheme with existing ones.  相似文献   

12.
We investigate the quantum-state transfer on spin-chain channels with random imperfections. Through combining the advantages of two known schemes, the dual-rail spin-chain channels [9] and the particular ihhomogenous spin-chain channel [10], we propose a protocol that can avoid the quantum noises introduced by many unnecessary measurements and can enhance the anti-decoherence ability. The results show that our protocol is more efficient to transfer an arbitrary quantum state than the original one. In particular, we discuss the effects of couplings fluctuations and imperfect initialization on both of the improved scheme and original one.  相似文献   

13.
The overwhelming majority of the attempts in exploring the problems related to quantum logical structures and their interpretation have been based on an underlying set-theoretic syntactic language. We propose a transition in the involved syntactic language to tackle these problems from the set-theoretic to the category-theoretic mode, together with a study of the consequent semantic transition in the logical interpretation of quantum event structures. In the present work, this is realized by representing categorically the global structure of a quantum algebra of events (or propositions) in terms of sheaves of local Boolean frames forming Boolean localization functors. The category of sheaves is a topos providing the possibility of applying the powerful logical classification methodology of topos theory with reference to the quantum world. In particular, we show that the topos-theoretic representation scheme of quantum event algebras by means of Boolean localization functors incorporates an object of truth values, which constitutes the appropriate tool for the definition of quantum truth-value assignments to propositions describing the behavior of quantum systems. Effectively, this scheme induces a revised realist account of truth in the quantum domain of discourse. We also include an Appendix, where we compare our topos-theoretic representation scheme of quantum event algebras with other categorial and topos-theoretic approaches.  相似文献   

14.
In quantum mechanics, the expectation value of an operator can be measured by using the projective measurement, ifthe coupling between the measured system and pointer is strong enough. However in the weak coupling regime, the pointercan not show all the eigenvalue of the physical quantity directly due to the overlapping among the pointer states, whichmakes the measurement of the expectation value difficult. In this paper, we propose an expectation value measurementmethod in the weak coupling regime inspired by the weak measurement scheme. Compared to the projective measurement,our scheme has two obvious advantages. Experimentally we use the internal state and motional state of a single trapped40Ca+ to establish the measurement scheme and realize the proof of principle demonstration of the scheme.  相似文献   

15.
Li et al. first proposed a quantum hash function(QHF) in a quantum-walk architecture. In their scheme, two two-particle interactions, i.e., I interaction and π-phase interaction are introduced and the choice of I or π-phase interactions at each iteration depends on a message bit. In this paper, we propose an efficient QHF by dense coding of coin operators in discrete-time quantum walk. Compared with existing QHFs, our protocol has the following advantages: the efficiency of the QHF can be doubled and even more; only one particle is enough and two-particle interactions are unnecessary so that quantum resources are saved. It is a clue to apply the dense coding technique to quantum cryptographic protocols, especially to the applications with restricted quantum resources.  相似文献   

16.
The application of the conceptual analysis (CA) method outlined in Part I is illustrated on the example of quantum mechanics. In Part II, we deduce the complete-lattice structure in quantum mechanics from postulates specifying the idealizations that are accepted in the theory. The idealized abstract concepts are introduced by means of a topological extension of the basic structure (obtained in Part I) in accord with the “approximation principle”; the relevant topologies are not arbitrarily chosen; they are fixed by the choice of the idealizations. There is a typical topological asymmetry in the mathematical scheme. Convexity or linear structures do not play any role in the mathematical methods of this approach. The essential concept in Part II is the idealization of “perfect measurement” suggested by our conceptual analysis in Part I. The Hilbert-space representation will be deduced in Part III. In our papers, we keep to the tenet: The mathematical scheme of a physical theory must be rigorously formulated. However, for physics, mathematics is only a nice and useful tool; it is not purpose.  相似文献   

17.
史保森  丁冬生  张伟  李恩泽 《物理学报》2019,68(3):34203-034203
量子存储器是实现按照需要存储/读出诸如单光子、纠缠或者压缩态等非经典量子态的系统,是实现量子通信和量子计算必不可少的核心器件.量子存储协议多种多样,其中拉曼方案由于具有存储宽带大、可用于存储短脉冲信号的优点而引起了人们的广泛关注.然而实现真正单光子和光子纠缠的拉曼存储具有挑战性.本文简要介绍了量子存储器的主要性能和评价指标,在回顾了量子存储器特别是拉曼量子存储器的发展现状后,重点介绍了本研究组最近基于拉曼协议实现各种量子态存储的系列研究,取得的研究成果对于构建高速量子网络具有重要参考价值.  相似文献   

18.
The paper is devoted to quantization of extensive games with the use of both the Marinatto-Weber and the Eisert-Wilkens-Lewenstein concept of quantum game. We revise the current conception of quantum ultimatum game and we show why the proposal is unacceptable. To support our approach, we present a new idea of the quantum ultimatum game. Our scheme also makes a point of departure for a general protocol for quantizing extensive games.  相似文献   

19.
潘长宁  方卯发 《中国物理》2007,16(5):1225-1228
We propose an effective scheme for the entanglement concentration of a four-particle state via entanglement swapping in an ion trap. Taking the maximally entangled state after concentration as a quantum channel, we can faithfully and determinatively teleport quantum entangled states from Alice to Bob without the joint Bell-state measurement. In the process of constructing the quantum channel, we adopt entanglement swapping to avoid the decrease of entanglement during the distribution of particles. Thus our scheme provides a new prospect for quantum teleportation over a longer distance. Furthermore, the success probability of our scheme is 1.0.  相似文献   

20.
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号