首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
We devise an highly efficient protocol for remotely preparing a four-qubit entangled cluster-type state. In this protocol, two non-maximally entangled GHZ-type states are employed to link the sender Alice and the receiver Bob, and the to-be-prepared state can be reconstructed successfully with the probability of (b1b2)2 in general case. Then to achieve our concerns of constructing efficient remote preparation with higher success probability, some special ensembles of four-qubit states are minutely investigated. As a result, it is shown that the total probability of the RSP protocol, in these particular cases, can be improved to twice or even fourfold as that in general case.  相似文献   

2.
The idea of secure quantum information exchange (SQIE) [J. Phys. B: At. Mol. Opt. Phys.44, 115504 (2011)] is introduced for the secure exchange of single qubit information states between two legitimate users, Alice and Bob. In the present paper, we extend this original SQIE protocol by presenting a scheme, which enables the secure exchange of n-single qubit information states among the n nodes of a quantum network, with the aid of a special kind of 4n-qubit entangled state and the classical assistance of an extra participant Charlie. For experimental realization of our extended SQIE protocol, we suggest an efficient scheme for the generation of a special kind of 4n-qubit entangled state using the interaction between highly detuned Λ-type three-level atoms and optical coherent field. Further, by discussing the various experimental parameters, we show that the special kind 4n-qubit entangled state can be generated with the presently available technology.  相似文献   

3.
In this paper, a theoretical scheme for tripartite quantum controlled teleportation is presented using the entanglement property of seven-qubit cluster state. This means that Alice wants to transmit a entangled state of particle a to Bob, Charlie wants to transmit a entangled state of particle b to David and Edison wants to transmit a entangled state of particle c to Ford via the control of the supervisor. In the end, we compared the aspects of quantum resource consumption, operation complexity, classical resource consumption, quantum information bits transmitted, success probability and efficiency with other schemes.  相似文献   

4.
A comparison of two protocols for generating a cryptographic key composed from d-valued symbols, one using a string of independent qubits and another utilizing d-level systems prepared in states belonging to d + 1 mutually unbiased bases, is performed. The protocol based on qubits is shown to be optimal for quantum cryptography, since it provides higher security and a higher key generation rate.  相似文献   

5.
To experimentally realize quantum computations on d-level basic elements (qudits) at d > 2, it is necessary to develop schemes for the technical realization of elementary logical operators. We have found sequences of selective rotation operators that represent the operators of the quantum Fourier transform (Walsh-Hadamard matrices) for d = 3–10. For the prime numbers 3, 5, and 7, the well-known method of linear algebra is applied, whereas, for the factorable numbers 6, 9, and 10, the representation of virtual spins is used (which we previously applied for d = 4, 8). Selective rotations can be realized, for example, by means of pulses of an RF magnetic field for systems of quadrupole nuclei or laser pulses for atoms and ions in traps.  相似文献   

6.
We present a scheme for implementing a remote minimum-error discrimination (MD) among N linearly independent nonorthogonal symmetric qudit states. The probability of correct guesses is in agreement with the optimal probability for local MD among the N nonorthogonal states. The procedure we use is a remote probability operator measure (POM). We show that this remote POM can be performed as a remote von Neumann measurement by remote basis transformation. We construct a quantum network for realizing the remote MD using local operations, classical communications and shared entanglement (LOCCSE), and thus provide a feasible physical means to realize the remote MD.  相似文献   

7.
A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state |φ?〉 is used as the carrier. One photon of |φ?〉 state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.  相似文献   

8.
We quantify multiparticle quantum entanglement in a system of N two-level atoms interacting with a squeezed vacuum state of the electromagnetic field. We calculate the amount of quantum entanglement present among one hundred such two-level atoms and also show the variation of that entanglement with the radiation field parameter. We show the continuous variation of the amount of quantum entanglement as we continuously increase the number of atoms from N = 2 to N = 100. We also discuss that the multiparticle correlations among the N two-level atoms are made up of all possible bipartite correlations among the N atoms.  相似文献   

9.
A quantum circuit has been proposed for the algorithm for finding the permutation order on two qudits with the number of levels d 1 and d 2. The sequence of the RF pulses for implementing the algorithm on two quadrupole nuclei I 1 = 7/2 (d 1 = 8) and I 2 = 3/2 (d 2 = 4) has been calculated and the algorithm has been numerically simulated. A method for preparing pseudopure states has been presented. A comparison with the implementation of the algorithm by NMR methods on five qubits has been performed.  相似文献   

10.
11.
We quantify and analyze the controller’s power in controlled remote state preparation schemes. Our analysis provides a lower bound on the control power required for controlled remote preparation of arbitrary D-dimensional states. We evaluate several existing controlled remote state preparation protocols and show that some proposed non-maximally entangled channels are not suitable for perfect controlled remote preparation of arbitrary quantum states from the controller’s point of view. We find that for remotely preparing D-dimensional states, the entropy of each controller should be no less than log2D bits. Our new criteria are not only useful for evaluating controlled remote state preparation schemes but can also be used for other controlled quantum communication schemes.  相似文献   

12.
A quantitative comparison of the magnetocapacitance measurements on high-quality samples in the fractional quantum Hall effect with the composite-fermion approach has been performed. For this comparison, the relation between the electron chemical potential μ e and quasi-particle spectrum has been derived. The effect of the temperature T has been calculated in the two-level approximation. The calculation quantitatively describes the decrease in the measured chemical-potential jump at filling factors of ν = 1/3, 2/5 with increasing T. In the compressible range 1/3 < ν < 2/5, the slope of the temperature dependence dμe/dν(T) is also in agreement with the calculation. The discrepancy of the composite-fermion approach with the experimental data is in the incorrectly predicted gaps and their dependence on the denominator of a fraction.  相似文献   

13.
We demonstrate that a seven-qubit entangled state can be used to realize the deterministic tripartite controlled teleportation by performing Bell-state measurements, where Alice wants to teleport an arbitrary single-qubit state of qubit a to Bob, Charlie wants to teleport an arbitrary single-qubit state of qubit b to David and at the same time Edison wants to teleport an arbitrary single-qubit state of qubit c to Ford via the control of the supervisor Tom.  相似文献   

14.
We study two relevant characterizations of a commutative positive operator valued measure (POVM) F. The first one is a Choquet type of an integral representation. It introduces a measure ν on the space of the projection valued measures (PVMs) and describes F as an integral over this space. The second one represents a commutative POVM F as the randomization of a single PVM E by means of a Markov kernel μ. We show that one can be derived from the other. We also elaborate upon some previous results on Choquet’s representation of Markov kernels and find a functional relationship between ν and μ. Finally, we analyze some relevant particular cases and provide some physically relevant examples which include the unsharp position observables.  相似文献   

15.
We propose a total measure of multi-particle quantum correlation in a system of N two-level atoms (N qubits). We construct a parameter that encompasses all possible quantum correlations among N two-level atoms in arbitrary symmetric pure states and define its numerical value to be the total measure of the net atom-atom correlations. We use that parameter to quantify the total quantum correlations in atomic Schrödinger cat states, which are generated by the dispersive interaction in a cavity. We study the variation of the net amount of quantum correlation as we vary the number of atoms from N=2 to N=100 and obtain some interesting results. We also study the variation of the net correlation, for fixed interaction time, as we increase the number of atoms in the excited state of the initial system, and notice some interesting features. We also observe the behaviour of the net quantum correlation as we continuously increase the interaction time, for the general state of N two-level atoms in a dispersive cavity.  相似文献   

16.
We give a brief review of SU(2|1) supersymmetric quantum mechanics based on the worldline realizations of the supergroup SU(2|1) in the appropriate N = 4, d = 1 superspaces. The corresponding SU(2|1) models are deformations of standard N = 4, d = 1 models by a mass parameter m.  相似文献   

17.
In this contribution, I show that it is possible to construct three-dimensional spaces of nonconstant curvature, i.e., three-dimensional Darboux spaces. Two-dimensional Darboux spaces have been introduced by Kalnins et al., with a path integral approach by the present author. In comparison to two dimensions, in three dimensions it is necessary to add a curvature term in the Lagrangian in order that the quantum motion can be properly defined. Once this is done, it turns out that, in the two three-dimensional Darboux spaces which are discussed in this paper, the quantum motion is similar to the two-dimensional case. In D 3d-I, we find seven coordinate systems which separate the Schrödinger equation. For the second space, D 3d-II, all coordinate systems of flat three-dimensional Euclidean space which separate the Schrödinger equation also separate the Schrödinger equation in D 3d-II. I solve the path integral on D 3d-I in the (u, v, w) system and on D 3d-II in the (u, v, w) system and in spherical coordinates.  相似文献   

18.
The title compound (II), 1-(cyclohexylmethyl)-2-(pyridin-2-yl)-1H-benzo[d]imidazole (C19H21N3), was synthesized via N-alkylation of 2-(pyridin-2-yl)-1H-benzo[d]imidazole (I). Both compounds I and II were characterized by IR, NMR and UV-vis spectroscopy. Solid-state structure of compound II was determined by single-crystal X-ray diffraction technique. Furthermore, quantum chemical calculations employing density functional theory (DFT/B3LYP) method with the 6–311++G(d, p) basis set were performed for the theoretical characterization of the molecular and spectroscopic features of the compounds. Using the TD-DFT method, electronic absorption spectra of the compounds have been predicted at same level. When the obtained results were compared with the experimental findings, it is seen that theoretical results support the experimental data and a good agreement exists between them.  相似文献   

19.
M. I. Ojovan 《JETP Letters》2004,79(12):632-634
Thermodynamic parameters of defects (presumably, defective SiO molecules) in the network of amorphous SiO2 are obtained by analyzing the viscosity of the melt with the use of the Doremus model. The best agreement between the experimental data on viscosity and the calculations is achieved when the enthalpy and entropy of the defect formation in the amorphous SiO2 network are H d =220 kJ/mol and S d =16.13R, respectively. The analysis of the network defect concentration shows that, above the glass-transition temperature (T g ), the defects form dynamic percolation clusters. This result agrees well with the results of molecular dynamics modeling, which means that the glass transition in amorphous SiO2 can be considered as a percolation phase transition. Below T g , the geometry of the distribution of network defects is Euclidean and has a dimension d=3. Above the glass-transition temperature, the geometry of the network defect distribution is non-Euclidean and has a fractal dimension of d f =2.5. The temperature T g can be calculated from the condition that percolation arises in the defect system. This approach leads to a simple analytic formula for the glass-transition temperature: T g =H d /((S d +1.735R). The calculated value of the glass-transition temperature (1482 K) agrees well with that obtained from the recent measurements of T g for amorphous SiO2 (1475 K).  相似文献   

20.
A complete set of d + 1 mutually unbiased bases exists in a Hilbert space of dimension d whenever d is power of a prime. We discuss a simple construction of d + 1 disjoint classes (each one having d ? 1 commuting operators) such that the corresponding eigenstates form sets of unbiased bases. One of these classes is diagonal and can be mapped to “ladder” operators by means of the finite Fourier transform. Using this idea, we naturally introduce the notion of quantum phase as complementary to the inversion. Relevant examples involving qubits and qutrits are discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号