首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 9 毫秒
1.
We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information receiver can the unknown states in the sender's qubits be fully reconstructed in the receiver's qubits. In our method, agents's control parameters are obtained via quantum entanglement swapping. As the realization of the many-agent controlled teleportation is concerned, compared to the recent method [G.P. Yang, et al., Phys. Rev. A 70 (2004) 022329], our present method considerably reduces the preparation difficulty of initial states and the identification difficulty of entangled states, moreover, it does not need local Hadamard operations and it is more feasible in technology.  相似文献   

2.
We present a scheme for teleporting multi-qutrit quantum information from a sender to a receiver via the control of many agents in a network. Agents's control parameters are obtained via quantum entanglement swapping. In our scheme, Zhang and Man's QSS protocol [Phys. Rev. A 72 (2005) 022303] based on Bell-state entanglement swapping is generalized to a qutrit case. Our scheme owns the advantage of having higher code capacity and better security than the work [Commun. Theor. Phys. 44 (2005) 847] on controlled teleportation for multi-qubit.  相似文献   

3.
In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping of maximally d-dimensional EPR pair. In our scheme, Yang's qutrit controlled teleportation protocol [Commun. Theor. Phys. 49 (2008) 338] based on Bell-state entanglement swapping is generalized to the qudit case. The scheme of multi-qudit owns the advantage of having higher code capacity and better security than that of multi-qutrit.  相似文献   

4.
In this scheme, N non-maximally entangled particle pairs are used as quantum channel to teleport an unknown N-particle entangled GHZ state via entanglement swapping. In order to realize this teleportation, the sender Alice operates Bell-state measurement on particles belonging to herself. Then she informs the results to the receiver Bob through classical communication. According to the results, Bob operates corresponding transformation to reconstruct the initial state. The advantage of this scheme is that it needs only one common unitary matrix for Alice‘s different results, which has a more general meaning. As a special case, teleporting an unknown three-particle entangled GHZ state is proposed.  相似文献   

5.
In this scheme, N non-maximally entangled particle pairs are used as quantum channel to teleport an unknown N-particle entangled GHZ state via entanglement swapping. In order to realize this teleportation, the sender Alice operates Bell-state measurement on particles belonging to herself. Then she informs the results to the receiver Bob through classical communication. According to the results, Bob operates corresponding transformation to reconstruct the initial state. The advantage of this scheme is that it needs only one common unitary matrix for Alice's different results, which has a more general meaning. As a special case, teleporting an unknown three-particle entangled GHZ state is proposed.  相似文献   

6.
A scheme for teleporting a three-particle state is proposed when three pairs of entang]ed particles are used as quantum channel. After a sender operates the Bell-state measurement, the original state with deterministic probability can be reconstructed when the receiver performs a corresponding measurement with unitary transformation.  相似文献   

7.
Information switching and swapping seem to be fundamental elements of quantum communication protocols. Another crucial issue is the presence of entanglement and its level in inspected quantum systems. In this article, a formal definition of the operation of the swapping local quantum information and its existence proof, together with some elementary properties analysed through the prism of the concept of the entropy, are presented. As an example of the local information swapping usage, we demonstrate a certain realisation of the quantum switch. Entanglement levels, during the work of the switch, are calculated with the Negativity measure and a separability criterion based on the von Neumann entropy, spectral decomposition and Schmidt decomposition. Results of numerical experiments, during which the entanglement levels are estimated for systems under consideration with and without distortions, are presented. The noise is generated by the Dzyaloshinskii-Moriya interaction and the intrinsic decoherence is modelled by the Milburn equation. This work contains a switch realisation in a circuit form—built out of elementary quantum gates, and a scheme of the circuit which estimates levels of entanglement during the switch’s operating.  相似文献   

8.
A kind of three-particle entangled state is applied as quantum channel of the controlled quantum teleporration of a one-particle unknown state. The one-particle unknown state is transmitted from the sender to the recipient under the control of the supervisor. After the sender makes Bell-state measurement and the supervisor performs von Neumann measurement, the recipient carries out unitary transformation on his own particle depending on classical information from the sender and the supervisor. The teleportation cannot be completed successfully by the recipient if the supervisor does not agree to cooperate. The roles of the recipient and the supervisor may be exchanged in this scheme. The scheme is flexible and feasible because the sequence of manipulation of the sender and the supervisor may be exchanged and only simple unitary transformation is included.  相似文献   

9.
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states.  相似文献   

10.
A kind of three-particle entangled state is applied as quantum channel of the controlled quantum teleportation of a one-particle unknown state. The one-particle unknown state is transmitted from the sender to the recipient under the control of the supervisor. After the sender makes Bell-state measurement and the supervisor performs von Neumann measurement, the recipient carries out unitary transformation on his own particle depending on classical information from the sender and the supervisor. The teleportation cannot be completed successfully by the recipient if the supervisor does not agree to cooperate. The roles of the recipient and the supervisor may be exchanged in this scheme. The scheme is flexible and feasible because the sequence of manipulation of the sender and the supervisor may be exchanged and only simple unitary transformation is included.  相似文献   

11.
Based on two atoms and two cavities initially in two pairs of atom-photon nonmaximally entangled states, we propose a relatively simple scheme to create maximally entangled photon-photon and atom-photon states via entanglement swapping using techniques of cavity QED inspired by the scheme proposed in [Phys. Rev. A 71 (2005)044302] and [Phys. Rev. A 71 (2005) 034312]. Our scheme does not involve the measurement in Bell basis, we only require detecting the states of atoms.  相似文献   

12.
Based on two atoms and two cavities initially in two pairs of atom-photon nonmaximally entangled states, we propose a relatively simple scheme to create maximally entangled photon-photon and atom-photon states via entanglement swapping using techniques of cavity QED inspired by the scheme proposed in [Phys. Rev. A 71 (2005) 044302] and [Phys. Rev. A 71 (2005) 034312]. Our scheme does not involve the measurement in Bell basis, we only require detecting the states of atoms.  相似文献   

13.
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.  相似文献   

14.
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes.  相似文献   

15.
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making use of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.  相似文献   

16.
量子隐形传态的杰出安全特性使其在未来的通讯领域充满潜力.量子力学的不确定性原理和不可克隆定理禁止对量子态进行直接复制,因此,量子隐形传态将量子态划分为经典和量子两部分,信息分别经由经典和量子通道从发送者Alice传递给远方的接收者Bob,根据这两种信息,Bob实行相应操作就可以以一定的几率重建初始传送态.利用一般意义的隐形传态方案,提出一种简便的新方法实现了一个N粒子任意态的概率传态.方法采用N个非最大纠缠的三粒子GHZ态作为量子通道,避免了引入额外的辅助粒子.为了实现传态,Alice将所有粒子分成N份,对第i份的粒子对(i,xi)实行Bell测量并将结果通过经典通道通知Bob,Bob对粒子(yi,zi)进行相应的操作就可以完成第i个粒子信息的传送.当完成N次相似的重复操作后,Bob就可以准确地重建初始传送态.文中以Bell态测量为基本手段,重复的操作同时也降低了实验难度,作为一个特例,文中给出了一个两粒子任意态的传态方案.  相似文献   

17.
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes.  相似文献   

18.
We present a (t, .n) threshold multiparty controlled quantum teleportation protocol of an arbitrary m-qubit quantum state between two remote parties. The unknown m-qubit quantum state can be recovered by the receiver under control of a subset of the n controllers if the number of the subset is larger than or equal to a threshold, say, t, but not for any t - 1 or fewer controllers. Our scheme seems to be more practical and more flexible than other existing protocols. The quantum resource required is just m Einstein-Podolsky-Rosen (EPR) pairs plus some single photons. The techniques required are only Bell state measurement, single-qubit unitary operation and yon Neumann measurement. So our scheme is also feasible with present-day technique.  相似文献   

19.
We present a (t,n) threshold multiparty controlled quantum teleportation protocol of an arbitrary m-qubit quantum state between two remote parties. The unknown m-qubit quantum state can be recovered by the receiver under control of a subset of the n controllers if the number of the subset is larger than or equal to a threshold, say, t, but not for any t-1 or fewer controllers. Our scheme seems to be more practical and more flexible than otherexisting protocols. The quantum resource required is just mEinstein-Podolsky-Rosen (EPR) pairs plus some single photons. Thetechniques required are only Bell state measurement, single-qubitunitary operation and von Neumann measurement. So our scheme is alsofeasible with present-day technique.  相似文献   

20.
Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently, Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号