共查询到20条相似文献,搜索用时 15 毫秒
1.
良好的安全性对量子保密通信协议而言是不可或缺的,但信息泄露已成为量子对话的一个严重安全威胁.为了解决信息泄露问题,利用腔QED中原子的演化规律提出一个基于腔QED的无信息泄露量子对话协议,利用腔QED中两个Bell态纠缠交换后的测量相关性来克服信息泄露问题.研究表明:该协议能够通过安全检测探测到外部窃听者的主动攻击,如截获-重发攻击、测量-重发攻击和纠缠-测量攻击;在每轮通信可以安全交换4比特秘密信息;对信息泄露问题和外部窃听者的主动攻击,都具备良好的安全性. 相似文献
2.
In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack. 相似文献
3.
We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information receiver can the unknown states in the sender's qubits be fully reconstructed in the receiver's qubits. In our method, agents's control parameters are obtained via quantum entanglement swapping. As the realization of the many-agent controlled teleportation is concerned, compared to the recent method [G.P. Yang, et al., Phys. Rev. A 70 (2004) 022329], our present method considerably reduces the preparation difficulty of initial states and the identification difficulty of entangled states, moreover, it does not need local Hadamard operations and it is more feasible in technology. 相似文献
4.
We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information receiver can the unknown states in the sender‘s qubits be fully reconstructed in the receiver‘s qubits. In our method,agents‘s control parameters are obtained via quantum entanglement swapping. As the realization of the many-agent controlled teleportation is concerned, compared to the recent method [C.P. Yang, et al., Phys. Rev. A 70 (2004) 022329],our present method considerably reduces the preparation difficulty of initial states and the identification difficulty of entangled states, moreover, it does not need local Hadamard operations and it is more feasible in technology. 相似文献
5.
We present a scheme for teleporting multi-qutrit quantum information from a sender to a receiver via the control of many agents in a network. Agents's control parameters are obtained via quantum entanglement swapping. In our scheme, Zhang and Man's QSS protocol [Phys. Rev. A 72 (2005) 022303] based on Bell-state entanglement swapping is generalized to a qutrit case. Our scheme owns the advantage of having higher code capacity and better security than the work [Commun. Theor. Phys. 44 (2005) 847] on controlled teleportation for multi-qubit. 相似文献
6.
In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping of maximally d-dimensional EPR pair. In our scheme, Yang's qutrit controlled teleportation protocol [Commun. Theor. Phys. 49 (2008) 338] based on Bell-state entanglement swapping is generalized to the qudit case. The scheme of multi-qudit owns the advantage of having higher code capacity and better security than that of multi-qutrit. 相似文献
8.
Information leakage in quantum dialogue (QD) or bidirectional quantum secure direct communication (BQSDC) was found ten years ago, but enough attention was not paid and even wrong conclusions were drawn. It is indeed necessary to emphasize the importance. Here, we find information leakage exists in the QD protocol based on entanglement swapping between any two Bell states and the shared secret Bell state. To be specific, half of the interchanged information is leaked out unconsciously. This is not allowed in a truly secure QD protocol. Afterward, this QD protocol is improved to the one without information leakage. Compared with the original one, there are some obvious advantages in the improved version. 相似文献
9.
Information switching and swapping seem to be fundamental elements of quantum communication protocols. Another crucial issue is the presence of entanglement and its level in inspected quantum systems. In this article, a formal definition of the operation of the swapping local quantum information and its existence proof, together with some elementary properties analysed through the prism of the concept of the entropy, are presented. As an example of the local information swapping usage, we demonstrate a certain realisation of the quantum switch. Entanglement levels, during the work of the switch, are calculated with the Negativity measure and a separability criterion based on the von Neumann entropy, spectral decomposition and Schmidt decomposition. Results of numerical experiments, during which the entanglement levels are estimated for systems under consideration with and without distortions, are presented. The noise is generated by the Dzyaloshinskii-Moriya interaction and the intrinsic decoherence is modelled by the Milburn equation. This work contains a switch realisation in a circuit form—built out of elementary quantum gates, and a scheme of the circuit which estimates levels of entanglement during the switch’s operating. 相似文献
10.
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps. 相似文献
11.
In this paper, quantum correlation (QC) swapping between two Werner-like states, which are transformed from Werner states undergoing local and nonlocal unitary operations, are studied. Bell states measures are performed in the middle node to realize the QC swapping and correspondingly final correlated sates are obtained. Two different QC quantifiers, i.e., measurement-induced disturbance (MID) and ameliorated MID, are employed to characterize and quantify all the concerned QCs in the swapping process. All QCs in the concerned states are evaluated analytically and numerically. Correspondingly, their characteristics and properties are exposed in detail. It is exposed that, through the QC swapping process, one can obtain the long-distance QC indeed. Moreover, the similarities of monotony features of MID and AMID between the initial states and final states are exposed and analyzed. 相似文献
12.
Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps. 相似文献
13.
We propose a scheme for sharing an arbitrary unknown two-qubit state among three parties by using a four-qubit cluster-class state and a Bell state as a quantum channel. With a quantum controlled phase gate (QCPG) operation and a local unitary operation, any one of the two agents has the access to reconstruct the original state if he/she collaborates with the other one, whilst individual agent obtains no information. As all quantum resource can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. Moreover, the present scheme is more feasible with present-day technique. 相似文献
14.
In this paper, quantum correlation (QC) swapping for certain separable two-qubit mixed states is treated. A QC quantifier, measurement-induced disturbance (MID) (Luo in Phys Rev A 77:022301, 2008), is employed to characterize and quantify QCs in the relevant states. Properties of all QCs in the swapping process are revealed. Particularly, it is found that MID can be increased through QC swapping for certain separable two-qubit mixed states. 相似文献
15.
We propose a scheme for sharing an arbitrary unknown two-qubit state among three parties by using a four-qubit cluster-class state and a Bell state as a quantum channel. With a quantum controlled phase gate (QCPG) operation and a local unitaryoperation, any one of the two agents has the access to reconstruct the original state if he/she collaborates with the other one, whilst individual agent obtains no information. As all quantum resource can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. Moreover, the present scheme is more feasible with present-day technique. 相似文献
16.
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 相似文献
17.
In this paper we propose a tripartite scheme for splitting an arbitrary 2-qubit quantum information by using two asymmetric W states as the quantum channel. In the schemem if the two recipients collaborate together, they can deterministically recover the quantum information by performing first a 4-qubit collective unitary operation and then two single-qubit unitary operations. In addition, since the asymmetric W states are employed as the quantum channel, the scheme is robust against decoherence. 相似文献
18.
By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the "two-step" transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. 相似文献
19.
By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the ``two-step" transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. 相似文献
20.
In this paper, we investigate the dynamics of a spin chain whose two end spins interact with two independent non-Markovian baths by using the non-Markovian quantum state diffusion (QSD) equation approach. Specifically, two issues about information scrambling in an open quantum system are addressed. The first issue is that tripartite mutual information (TMI) can quantify information scrambling properly via its negative value in a closed system, whether it is still suitable to indicate information scrambling in an open quantum system. We find that negative TMI is not a suitable quantifier of information scrambling in an open quantum system in some cases, while negative tripartite logarithmic negativity (TLN) is an appropriate one. The second one is that up to now almost all information scrambling in open quantum systems reported were focus on a Markovian environment, while the effect of a non-Markovian environment on information scrambling is still elusive. Our results show that the memory effect of an environment will be beneficial to information scrambling. Moreover, it is found that the environment is generally detrimental for information scrambling in the long-term, while in some cases it will be helpful for information scrambling in the short-term. 相似文献
|