首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We introduce a version of the chained Bell inequality for an arbitrary number of measurement outcomes and use it to give a simple proof that the maximally entangled state of two d-dimensional quantum systems has no local component. That is, if we write its quantum correlations as a mixture of local correlations and general (not necessarily quantum) correlations, the coefficient of the local correlations must be zero. This suggests an experimental program to obtain as good an upper bound as possible on the fraction of local states and provides a lower bound on the amount of classical communication needed to simulate a maximally entangled state in dxd dimensions. We also prove that the quantum correlations violating the inequality are monogamous among nonsignaling correlations and, hence, can be used for quantum key distribution secure against postquantum (but nonsignaling) eavesdroppers.  相似文献   

2.
Entanglement swapping for four-qubit cluster-class states is studied. It is shown that a four-qubit cluster state (maximally entangled) can be obtained with a certain probability from two four-qubit cluster-class states by entanglement swapping. The probability is related to the smallest superposition coefficient of the cluster-class states (when all the moduli of amplitudes are equivalent, they are the usual cluster states and the probability hits to one). Two examples for the applications of the entanglement swapping are also presented. One is quantum teleportation of an arbitrary two-qubit state via a quantum repeater, in which the success probability can be improved by the entanglement swapping when the quantum channels are general cluster-class states (partially entangled). The other is quantum key distribution, in which a secret random sequence of bits (a “key”) can be efficiently established between two distant parties by the entanglement swapping of two groups of cluster states.  相似文献   

3.
A continuous variable quantum key distribution protocol with entanglement swapping of quasi-Bell entangled coherent states is proposed. As the preliminary step, a sender shares quasi-Bell entangled coherent states with a receiver. After their measurements to distinguish the cases of a zero response, a nonzero even-photon response and an odd-photon response, two legitimate participants fulfill the task of key distribution. The correlations resulting from entanglement swapping of quasi-Bell entangled coherent states and the order rearrangement of transmitted states provide the possibility to protect secret key distribution. In the ideal channel, the success probability increases with the amplitude of the coherent state, and approaches unity when the amplitude of the coherent state is larger than two. However, in the loss channel, the decoherence will introduce error in the generated key, and the error rate increases with the amplitude of the coherent state. When the amplitude of the coherent state is smaller than 0.2 (or so), the error rate approaches zero, although the success probability is less than 0.5 in this case.  相似文献   

4.
束缚纠缠态量子秘密共享的不安全性分析   总被引:2,自引:1,他引:1  
於亚飞  张智明 《光学学报》2008,28(3):556-559
分析了以Smolin束缚纠缠态作为通道量子态的量子秘密共享方案的安全性.给出了一个简单的来自通信方内部的截获重发攻击策略,这个攻击策略是依赖比对单量子比特测量结果的窃听检测程序所不能检测出来的.结果表明,仅以束缚纠缠Smolin态作为通道量子态的量子秘密共享方案对于来自内部的窃听攻击不是无条件的.  相似文献   

5.
郑仕标 《中国物理快报》2006,23(9):2356-2359
We describe a protocol for quantum state teleportation via mixed entangled pairs. With the help of an ancilla, near-perfect teleportation might be achieved. For pure entangled pairs, perfect teleportation might be achieved with a certain probability without using an ancilla. The protocol is generalized to teleportation of multiparticle states and quantum secret sharing.  相似文献   

6.
A symmetric two-mode Gaussian entangled state is used to investigate the effect of excess noise on entanglement sudden death and Gaussian quantum discord with continuous variables. The results show that the excess noise in the channel can lead to entanglement sudden death of a symmetric two-mode Gaussian entangled state, while Gaussian quantum discord never vanishes. As a practical application, the security of a quantum key distribution (QKD) scheme based on a symmetric two-mode Gaussian entangled state against collective Gaussian attacks is analyzed. The calculation results show that the secret key cannot be distilled when entanglement vanishes and only quantum discord exists in such a QKD scheme.  相似文献   

7.
We present a three-party quantum single-qutrit-state sharing scheme with a non-maximally entangled three-qutrit state as the quantum channel. In the scheme, the sender’s secret quantum information (i.e., the single-qutrit state) is split in such a way that it can be probabilistically reconstructed through introducing an auxiliary qutrit and performing appropriate operations provided that the receivers both collaborate together. We work out the success probability and reveal the relation between the probability and the parameters characterizing the quantum channel. After this, we then briefly introduce the generalization of the three-party scheme to a more-party one.  相似文献   

8.
於亚飞  张智明 《中国物理 B》2009,18(4):1342-1345
This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has insecurity though the Smolin state was reported to violate maximally the two-setting Bell-inequality. The general proof is given.  相似文献   

9.
A multiple multi-qubit quantum states sharing scheme is proposed,in which the dealer can share multiple multi-qubit quantum states among the participants through only one distribution and one recovery.The dealer encodes the secret quantum states into a special entangled state,and then distributes the particles of the entangled state to the participants.The participants perform the single-particle measurements on their particles,and can cooperate to recover the multiple multi-qubit quantum states.Compared to the existing schemes,our scheme is more efficient and more flexible in practice.  相似文献   

10.
刘玉玲  满忠晓  夏云杰 《物理学报》2008,57(5):2680-2686
提出一个对任意二粒子纠缠态在N者之间的量子秘密分享方案,该方案利用非最大纠缠Einstein-Podolsky-Rosen(EPR)对作为量子信道,利用广义的贝尔基进行测量.接收者通过引入辅助粒子,并对其做选择性测量,就会概率性地得到最初的量子态. 关键词: 非最大纠缠的Einstein-Podolsky-Rosen(EPR)对 广义的贝尔测量  相似文献   

11.
A quantum secret sharing scheme is proposed by making use of quantum registers. In the proposed scheme, secret message state is encoded into multipartite entangled states. Several identical multi-particle entanglement states are generated and each particle of the entanglement state is filled in different quantum registers which act as shares of the secret message. Two modes, i.e. the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the secret message may be recovered. The security analysis shows that the proposed scheme is secure against eavesdropping of eavesdropper and cheating of participants.  相似文献   

12.
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes.  相似文献   

13.
With an arbitrary bi-particle entangled mixed state which is shared by Alice (the sender) and Bob (the receiver) acted as a quantum channel, at first, a teleportation protocol that Alice successfully transmits an unknown mixed state to Bob based on a positive operator-valued measurement (POVM) is presented. The upper bound of probability to teleport successfully an unknown mixed state is then investigated, and conclude that it completely depends on the entanglement degree of the bi-particle entangled mixed state as a resource.  相似文献   

14.
Hengji Li 《中国物理 B》2022,31(9):90303-090303
Very recently, Lee et al. proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys. Rev. Lett. 124 060501 (2020)]. This quantum network is encoded with a maximally entangled GHZ state. In this paper, we consider a partially entangled GHZ state as the entanglement channel, where it can achieve, probabilistically, unity fidelity transfer of the state. Two kinds of strategies are given. One arises when an auxiliary particle is introduced and a general evolution at any receiver's location is then adopted. The other one involves performing a single generalized Bell-state measurement at the location of any sender. This could allow the receivers to recover the transmitted state with a certain probability, in which only the local Pauli operators are performed, instead of introducing an auxiliary particle. In addition, the successful probability is provided, which is determined by the degree of entanglement of the partially multipartite entangled state. Moreover, the proposed protocol is robust against the bit and phase flip noise.  相似文献   

15.
In this paper, we propose a protocol to deterministically teleport an unknown mixed state of qubit by utilizing a maximally bipartite entangled state of qubits as quantum channel. Ira non-maximally entangled bipartite pure state is employed as quantum channel, the unknown mixed quantum state of qubit can be teleported with 1 -√ 1- C^2 probability, where C is the concurrence of the quantum channel. The protocol can also be generalized to teleport a mixed state of qudit or a multipartite mixed state. More important purpose is that, on the basis of the protocol, the teleportation of an arbitrary multipartite (pure or mixed) quantum state can be decomposed into the teleportation of each subsystem by employing separate entangled states as quantum channels. In the case of deterministic teleportation, Bob only needs to perform unitary transformations on his single particles in order to recover the initial teleported multipartite quantum state.  相似文献   

16.
The research of multi-particle entanglement is a hot topic because of its important applications and far-reaching effects on vast aspects of quantum information. The article is devoted to the χ − type entangled state, a peculiar four-particle entangled state, which is different from a four-particle GHZ or W state under stochastic local operations and classical communication (SLOCC). Secure four-site distribution using decoy particles is proposed. Moreover, applying it, several communication protocols are presented, including four-party hierarchical quantum secret sharing, supervisory three-party asymmetric deterministic secure quantum communication, etc. The security of the four-site distribution and the communication protocols are also analyzed.  相似文献   

17.
The Einstein-Podolsky-Rosen (EPR) nonlocality puzzle has been recognized as one of the most important unresolved issues in the foundational aspects of quantum mechanics. We show that the problem is more or less entirely resolved, if the quantum correlations are calculated directly from local quantities, which preserve the phase information in the quantum system. We assume strict locality for the probability amplitudes instead of local realism for the outcomes and calculate an amplitude correlation function. Then the experimentally observed correlation of outcomes is calculated from the square of the amplitude correlation function. Locality of amplitudes implies that measurement on one particle does not collapse the companion particle to a definite state. Apart from resolving the EPR puzzle, this approach shows that the physical interpretation of apparently “nonlocal” effects, such as quantum teleportation and entanglement swapping, are different from what is usually assumed. Bell-type measurements do not change distant states. Yet the correlations are correctly reproduced, when measured, if complex probability amplitudes are treated as the basic local quantities. As examples, we derive the quantum correlations of two-particle maximally entangled states and the three-particle Greenberger-Horne-Zeilinger entangled state.  相似文献   

18.
The major problem faced by photons propagating through a physical channel is that of collective noise. This collective noise has the ability to reduce the number of quantum bits that are transmitted, thereby reduces the message fidelity. The traditional method of noise immunity is the use of entanglement purification, which consumes a lot of quantum resources in accomplishing the joint probability of noise immunity but does not guarantee accurate quantum dialog. In this paper, we investigate a new approach to quantum dialogue in which quantum information can be faithfully transmitted via a noisy channel. we constructs corresponding Decoherence Free Subspace(DFS), the quantum state after the change is in the maximally entangled state, so as to realize the fidelity of quantum dialogue model that can ensure the accuracy and noise resistance, and secret information exchange.  相似文献   

19.
王川  张勇 《中国物理 B》2009,18(8):3238-3242
In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed.  相似文献   

20.
邓晓冉  杨帅  闫凤利 《光子学报》2014,39(11):2083-2087
 为了高效实现多方之间的量子秘密共享,引入了一种纠缠度较高的N粒子纠缠态,并提出了利用该N粒子纠缠态在一方与(N-1)方之间形成共享秘密位串的方案.该方案在建立秘密位串的过程中,Alice对发送的粒子随机选择么正操作I和σx,并选择一部分粒子用于检测信道的安全|之后Alice根据(N-1)方选择的操作又选择了一部分粒子用于对参与者诚实度检测及信道安全检测.通过多次对窃听者的检测,很好地保证了信道的安全性及产生的秘密位串的可用性.最终在Alice及另外(N-1)方之间可形成n[1-(N-1)/2 N-1]/6个共享秘密位.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号