首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 109 毫秒
1.
提出了一种基于N个有序纠缠光子对量子机密共享方案.用纠缠光子作为信息的载体,密钥管理者Alice将纠缠光子对分成两个序列,其中一个序列直接发送给合作者之一Bob,在确保第一个序列发送安全后,再对第二个序列进行编码,发送给另一个合作者Charlie.Bob和Charlie分别对他们所接收到的光子序列进行Bell基联合测量...  相似文献   

2.
基于cluster态具有较强的纠缠顽固性,提出两个利用四粒子cluster态传送任意单粒子态的量子信息共享方案.第一个方案中发送者Alice、控制者Charlie和接收者Bob共享一个四粒子纠缠态,首先Alice对自己拥有的粒子执行一个三粒子Von-Neumann联合测量,然后Charlie对其拥有粒子执行Z基测量,最后Bob根据发送者和控制者的测量结果,对所拥有的粒子做适当的幺正变换,就能重建共享的单粒子任意态.第二个方案利用一个辅助粒子,发送者Alice、控制者Charlie只需做Bell基测量,Bob通过比特位翻转和幺正变换即可得到Alice传送的量子态.与已有方案相比,两方案信息共享的成功概率为100%,且只需四粒子cluster态为载体,可在目前实验室技术条件下实现.  相似文献   

3.
提出了一个利用五粒子团簇态实现的可控量子安全直接通信方案.在这一方案中,首先信息发送者Alice、信息接收者Bob和控制者Charlie共享由Alice制备的一有序序列团簇态作为量子信道;在确定量子信道的安全性以后,Alice制备编码量子态(Bell态)序列,然后通过对自己手中的粒子进行Bell基测量,接着Charlie对自己手中的粒子进行单粒子的测量,就能把信息传送给接收者Bob;最后,Bob测量自己手中的粒子,并通过分析三人的测量结果,从而获得Alice要传送的信息.在我们提出的方案中,携带信息的粒子不需要在公共信道上传输.该文中,我们给出了方案的安全性分析,证明了我们的方案是决定性的和安全的.在未来,我们的方案在以目前的实验技术为基础条件下很可能得到实现.  相似文献   

4.
远程制备双原子纠缠态   总被引:1,自引:1,他引:0  
陈美锋  马宋设 《光子学报》2008,37(1):188-191
提出一种远程制备双原子纠缠态的方案,该方案基于两个原子与单模腔场的同时非共振相互作用.由于双粒子纠缠态比三粒子纠缠态容易制备,方案用两对双原子纠缠态作为量子通道.Alice 拥有的两个相同原子同时与一单模腔场非共振相互作用.Alice已知她要制备的纠缠态,她选择适当的相互作用时间、测量她所拥有的两个原子并通过经典通道通知Bob.Bob引入一个相同的辅助原子和一个单模腔场来实现方案.方案对腔场状态和腔损耗不敏感,基于当前的腔QED 技术,方案能在实验上实现.该方案有望在量子信息过程中有重要的应用价值.  相似文献   

5.
提出了一个利用六粒子最大纠缠态作为纠缠资源的双向量子控制隐形传态方案.该理论方案中,六粒子最大纠缠态作为量子通道来连系着合法的三方——通信双方和控制方,通信双方既是发送方同时也是接收方.传输过程中,Alice传输一个任意单粒子态a给Bob的同时Bob也传输一个任意的单粒子态b给Alice;由控制方Charlie来控制和协助通信双方完成最终的量子态的交换;Bob先对自己手中的粒子作一个幺正操作,用户双方再各自对自己手中的粒子执行Bell基测量,测量完成后通过经典信道将自己的测量结果公开宣布,用户双方根据对方所公布的测量结果做相应的幺正操作,从而成功地实现双向量子控制隐形传态.  相似文献   

6.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

7.
基于四粒子GHZ态的可控量子双向隐形传态及安全性   总被引:1,自引:0,他引:1  
胡钰安  叶志清 《光子学报》2014,43(8):827001
提出一个基于四粒子GHZ纠缠态实现未知单粒子态的可控量子双向传态方案.通信双方Alice和Bob以及控制方事先密享两对四粒子GHZ纠缠态以构建量子信道,根据纠缠粒子的不同分发方式,以及测量时所选择的不同测量基,可以分别实现三方和四方参与的可控量子双向传态.通信开始后,Alice和Bob分别对自己拥有的部分粒子作量子投影测量,若控制方同意双方通信,则对自己拥有的粒子作测量并通过经典信道公布测量结果.通信双方根据控制方公布的测量结果对各自的某个粒子作相应的幺正变换,即可在己方的粒子上重建对方待传的量子态.由于第三方Charlie以及第四方Dennis的加入,整个双向传态的安全性大为提高.  相似文献   

8.
基于高维两粒子纠缠态的超密编码方案   总被引:3,自引:3,他引:0  
基于通信双方预先共享d维二粒子最大纠缠态非定域相关性,信息发送方Bob只需要向信息接收者Alice传送一个粒子,就可以传送log22比特经典信息,为保护信息的安全,方案采用诱骗光子技术,安全性等价于改进后的原始量子密钥分配方案(Bennett-Brassard 1984,BB84).本文讨论了基于高维纯纠缠态超密编码方...  相似文献   

9.
基于六粒子纠缠态和Bell态测量的量子信息分离   总被引:2,自引:2,他引:0  
通过介绍六粒子纠缠态的新应用研究,提出了一个二粒子任意态的信息分离方案.在这个方案中,发送者Alice、控制者Charlie和接受者Bob共享一个六粒子纠缠态,发送者先执行两次Bell基测量;然后控制者执行一次Bell基测量;最后接受者根据发送者和控制者的测量结果,对自己拥有的粒子做适当的幺正变换,从而能够重建要发送的...  相似文献   

10.
叶天语 《光子学报》2014,43(5):502701
提出一个无信息泄露的受控双向量子安全直接通信协议.协议中合法通信双方Alice和Bob在控制者Charlie的控制下实现彼此秘密信息的安全交换,利用3个Bell态纠缠交换后的测量相关性来克服信息泄露问题.由于该协议仅利用Bell态作为量子资源,而且仅需要进行Bell测量,所以方便实现.安全性分析表明,该协议不仅能检测到外部窃听者的主动攻击,而且还能检测到控制者Charlie的不诚实行为,因此,具备良好的安全性.  相似文献   

11.
An efficient high-capacity quantum secret sharing scheme is proposed following some ideas in quantum dense coding with two-photon entanglement. The message sender, Alice prepares and measures the two-photon entangled states, and the two agents, Bob and Charlie code their information on their photons with four local unitary operations, which makes this scheme more convenient for the agents than others. This scheme has a high intrinsic efficiency for qubits and a high capacity.  相似文献   

12.
A new application of the genuinely entangled five-qubit state is investigated for quantum information splitting of a particular type of two-qubit state. In this scheme, a genuinely entangled five-qubit state is shared by Alice (a sender), Charlie (a controller) and Bob (a receiver), and Alice only needs to perform two Bell-state measurements and Charlie performs a single-qubit measurement, Bob can reconstruct the two-qubit state by performing some appropriately unitary transformations on his qubits after he knows the measured results of both Alice and Charlie. This quantum information splitting scheme is deterministic, i.e. the probability of success is 100 %. The presented protocol is showed to be secure against certain eavesdropping attacks.  相似文献   

13.
In this paper, we develop a large-capacity quantum digital secret sharing (QDSS) scheme, combined the Fibonacci-and Lucas-valued orbital angular momentum (OAM) entanglement with the recursive Fibonacci and Lucas matrices. To be exact, Alice prepares pairs of photons in the Fibonacci-and Lucas-valued OAM entangled states, and then allocates them to two participants, say, Bob and Charlie, to establish the secret key. Moreover, the available Fibonacci and Lucas values from the matching entangled states are used as the seed for generating the Fibonacci and Lucas matrices. This is achieved because the entries of the Fibonacci and Lucas matrices are recursive. The secret key can only be obtained jointly by Bob and Charlie, who can further recover the secret. Its security is based on the facts that nonorthogonal states are indistinguishable, and Bob or Charlie detects a Fibonacci number, there is still a twofold uncertainty for Charlie' (Bob') detected value.  相似文献   

14.
A theoretical scheme for bidirectional quantum controlled teleportation is presented using the entanglement property of five-qubit cluster state. This means that Alice wants to transmit a entangled state of particle a to Bob and Bob wants to transmit a entangled state of particle b to Alice via the control of the supervisor Charlie.  相似文献   

15.
Based on the delocalized entanglement correlation of GHZ state in quantum information theory, a three-party stop-wait quantum communication protocol for data link layer is presented. When three sites, Alice, Bob and Charlie, communicate in data link layer, data frame is sent to Bob and Charlie by Alice. When receiving the data frame within the set time, the receivers, Bob and Charlie, return to quantum acknowledgment frames or quantum negative acknowledgement frames via quantum channel. In the proposed protocol, the sender Alice can simultaneously receive and deal with quantum acknowledgment (QACK) frames or quantum negative acknowledgement (QNACK) frames from Bob and Charlie. And due to the transience of transferring quantum information, propagation delay and processing delay among three sites are reduced. As a result, the minimum time span between two successfully delivered data frames can be significantly reduced, the communication time is shortened. It is shown that the proposed protocol enhances the maximum throughout effectively and improves the communication efficiency for data link layer in a multicast communication network.  相似文献   

16.
We propose a practical scheme for concentrating entanglement in a pair of unknown partially entangled three-photon W states with only linear optics and photon detectors. In the scheme, Alice, Bob, and Charlie at three distant parties can obtain one maximally entangled three-photon W state with a certain success probability from two identical partially entangled three-photon W states by local operations and classical communication. The proposed setup is very simple, which greatly simplifies the experimental realization of the scheme.  相似文献   

17.
A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state,i.e.,Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie.The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice,Bob,and Charlie.  相似文献   

18.
We propose a scheme for controlled entanglement swapping of continuous variable, where an EPR pair shared by two parties (Alice and Debbie) and a GHZ entangled state shared by three parties (Alice, Bob and Claire) are required. One optical beams of the EPR state will be entangled with the output mode displaced by Bob with the help of Claire. It is shown that the entanglement swapping can occur controlled by the third party (Claire)  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号