排序方式: 共有30条查询结果,搜索用时 15 毫秒
11.
Utilizing a three-particle W state, we come up with a protocol for the teleportation of an unknown two-particle entangled state. It is shown that the teleportation can be deterministically and exactly realized. Moreover, two-particle entanglement teleportation is generalized to a system consisting of many particles via a three-particle W state and a multi-particle W state, respectively. All unitary transformations performed by the receiver are given in a concise formula. 相似文献
12.
本文证明了下面定理.设G是一个有限Abel群,e为G的元之最大阶,则对任一由G的元构成|G|+e-1项序列都可找到其中e项和为0. 相似文献
13.
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency. 相似文献
14.
15.
Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack. 相似文献
16.
四维二阶 Hadamard 矩阵的分类 总被引:1,自引:0,他引:1
一、引言所谓 n 维 m 阶 m~n Hadamard 矩阵(简称为 H 阵)就是满足下面两个条件的 n 维矩阵A=[A_(ij…z)]。条件1:A_(ij…z)=±1(0≤i,j,…,z≤m-1),其中 A_(ij…z)的下标有n 个。条件2:sum from p sum from q…sum from y A_(pq…ya)A_(pq…yb)=m~(n-1)δ_(ab)(这里(Pq…yn),是(ij…z)的任意一个置换,δ_(ab)=(?)容易看出当 n=2时,它就是以前大家所熟知的Hadamard 矩阵。关于高维 Hadamrd 矩阵的细节可见[1]。 相似文献
17.
18.
19.
The semiquantum techniques have been explored recently to bridge the classical communications and the quantum communications.In this paper,we present one scheme to distribute the messages from one quantum participate to one weak quantum participate who can only measure the quantum states.It is proved to be robust by combining the classical coding encryption,quantum coding and other quantum techniques. 相似文献
20.