共查询到20条相似文献,搜索用时 0 毫秒
1.
提出一种量子投票协议, 协议基于非对称量子通道受控量子局域幺正操作隐形传输(quantum operation teleportation, QOT). 由公正机构CA提供的零知识证明的量子身份认证, 保证选民身份认证的匿名性. 计票机构Bob制造高维Greenberger-Horne-Zeilinger 纠缠态建立一个高维量子通信信道. 选民对低维的量子选票进行局域幺正操作的量子投票, 是通过非对称基的测量和监票机构Charlie的辅助测量隐形传输的. Bob在Charlie帮助下可以通过幺正操作结果得到投票结果. 与其他一般的QOT量子投票协议相比, 该协议利用量子信息与传输的量子信道不同维, 使单粒子信息不能被窃取、防止伪造.选举过程由于有Charlie的监督, 使得投票公正和不可抵赖.由于量子局域幺正操作隐形传输的成功概率是1, 使量子投票的可靠性得以保证.
关键词:
量子投票
高维GHZ纠缠态
非对称基测量
量子操作隐形传输 相似文献
2.
The preparation of multipartite entangled states is the prerequisite for exploring quantum information networks and quantum computation.In this paper,we review the experimental progress in the preparation of cluster states and multi-color entangled states with continuous variables.The preparation of lager scale multipartite entangled state provide valuable quantum resources to implement more complex quantum informational tasks. 相似文献
3.
4.
5.
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency. 相似文献
6.
Quantum steganography that utilizes quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, El Allati et al. proposed a new quantum steganography using GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency. 相似文献
7.
YUAN Hong-Chun QI Kai-Guo 《理论物理通讯》2005,44(2):269-273
We mostly investigate two schemes. One is to teleport a multi-mode W-type entangled coherent state using a peculiar bipartite entangled state as the quantum channel different from other proposals. Based on our formalism,teleporting multi-mode coherent state or squeezed state is also possible. Another is that the tripartite entangled state is used as the quantum channel of controlled teleportation of an arbitrary and unknown continuous variable in the case of three participators. 相似文献
8.
YUAN Hong-Chun QI Kai-Guo 《理论物理通讯》2005,44(8)
We mostly investigate two schemes. One is to teleport a multi-mode W-type entangled coherent state using a peculiar bipartite entangled state as the quantum channel different from other proposals. Based on our formalism,teleporting multi-mode coherent state or squeezed state is also possible. Another is that the tripartite entangled state is used as the quantum channel of controlled teleportation of an arbitrary and unknown continuous variable in the case of three participators. 相似文献
9.
Based on quantum entanglement, secure anonymous ballot systems are introduced to realize voting among numerous candidates
in this paper. By searching individuals, each voter may cast a vote for his desired candidates of which number may be more
than one. Therefore, the system based on the proposed algorithm may be applied voting among many candidates, such as a network
ballot with the development of a quantum network. Finally, the security of the present scheme is investigated. 相似文献
10.
11.
12.
Very recently, Lee et al. proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys. Rev. Lett. 124 060501 (2020)]. This quantum network is encoded with a maximally entangled GHZ state. In this paper, we consider a partially entangled GHZ state as the entanglement channel, where it can achieve, probabilistically, unity fidelity transfer of the state. Two kinds of strategies are given. One arises when an auxiliary particle is introduced and a general evolution at any receiver's location is then adopted. The other one involves performing a single generalized Bell-state measurement at the location of any sender. This could allow the receivers to recover the transmitted state with a certain probability, in which only the local Pauli operators are performed, instead of introducing an auxiliary particle. In addition, the successful probability is provided, which is determined by the degree of entanglement of the partially multipartite entangled state. Moreover, the proposed protocol is robust against the bit and phase flip noise. 相似文献
13.
14.
A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information.Moreover,the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information.Then,the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users.After insuring the security of the quantum channel,they begin to hide the secret information in the cover of message.Comparing the scheme with the previous quantum steganographies,capacity and imperceptibility of hidden message are good.The security of the present scheme against many attacks is also discussed. 相似文献
15.
16.
纠缠态量子探测是将量子力学与信息科学相结合,应用在目标探测领域的一种新技术,其在灵敏度、抗干扰能力等方面具有突破传统探测技术的潜力.在雷达探测领域,恒虚警检测是一项具有重要的意义和应用价值的技术.然而,对于纠缠态量子探测系统中恒虚警检测方法的研究还没有展开,本文针对这一问题,提出了一种纠缠态量子探测系统的恒虚警检测方法.该方法通过系统对噪声的实时估计,自适应调整检测门限,使得纠缠态量子探测系统在检测过程中始终保持恒定的虚警概率.仿真结果表明,所提恒虚警检测方法是正确和有效的,能够实现纠缠态量子探测系统的恒虚警检测功能.该方法提升了纠缠态量子探测系统的灵活性和适应性,为量子探测技术进一步走向实用及应用奠定了理论基础. 相似文献
17.
提出一种任意两粒子纠缠态1→2普适远程克隆方案. 此方案仅需一个特殊的四粒子纠缠态作为量子信道, 就可使处于空间不同位置的两个接收者分别以5/6的保真度得到任意输入态的近似拷贝, 该保真度远高于已有方案中的保真度. 将方案推广到任意两粒子纠缠态1→N(N>2)普适远程克隆的情况, 可使处于不同地点的N个接收者分别以(2N+1)/(3N)的保真度得到输入态的近似拷贝. 另外, 提出一种以上述单个特殊四粒子纠缠态作为量子信道, 在多目标量子比特受控非门和
关键词:
量子纠缠态
普适远程克隆
保真度 相似文献
18.
A scheme for transferring an unknown atomic entangledstate via cavity quantum electrodynamics 下载免费PDF全文
In this paper, we propose a scheme for transferring an unknown atomic entangled
state via cavity quantum electrodynamics (QED). This scheme, which has a successful
probability of 100 percent, does not require Bell-state measurement and performing
any operations to reconstruct an initial state. Meanwhile, the scheme only involves
atom--field interaction with a large detuning and does not require the transfer of
quantum information between the atoms and cavity. Thus the scheme is insensitive to
the cavity field states and cavity decay. This scheme can also be extended to
transfer ring an entangled state of $n$-atom. 相似文献
19.
20.
Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme 下载免费PDF全文
《中国物理 B》2021,30(7):70309-070309
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly,the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the quantum channel, to correct the errors in non-Clifford gate evaluation. By using the set synthesized by Clifford gates and T gates, it is feasible to perform the arbitrary quantum computation on the encrypted data. Secondly, our scheme is different from the previous scheme described by the quantum homomorphic encryption algorithm. From the perspective of application, a two-party probabilistic quantum homomorphic encryption scheme is proposed. It is clear what the computation and operation that the client and the server need to perform respectively, as well as the permission to access the data. Finally, the security of probabilistic quantum homomorphic encryption scheme is analyzed in detail. It demonstrates that the scheme has favorable security in three aspects, including privacy data, evaluated data and encryption and decryption keys. 相似文献