首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
A five-qubit entangled state is constructed with the four-qubit genuine entangled state. As one of its applications, a controlled deterministic secure quantum communication scheme is proposed. Firstly, the supervisor prepares the five-qubit entangled state and distributes uniformly the four qubits to two users and keeps the rest one for control function. Then the receiver can perform jointly projective measurement on the encoded qubits from the sender to decrypt the secret information. The two-step security test ensures the security of the communication. Moreover, quantum dense coding is applied to enhance the capacity of quantum channel. The communication is realized under the control of the supervisor.  相似文献   

2.
Utilized polarization entangled photons, a linear optical protocol for generating random quantum key distribution (QKD) is proposed, which is made up of EPR-source, linear optical elements, and conventional photon detectors. It is shown that total efficiency of QKD η=100% in theory.  相似文献   

3.
We propose a physical realization of symmetric telecloning machine for spin quantum states. The concept of area average fidelity is introduced to describe the telecloning quality. It is indicated that for certain input states this quantity may come to an enough high level to satisfy the need of quantum information processing. We also study the properties of entanglement distribution via the spin chain for arbitrary two-qubit entangled pure states as inputs and find that the decay ratio of entanglement for the output states is only determined by the parameters of spin chain and waiting time, independent of the initial input states.  相似文献   

4.
Nguyen Ba An 《Physics letters. A》2009,373(20):1701-1707
Three novel probabilistic yet conclusive schemes are proposed to teleport a general two-mode coherent-state superposition via attenuated quantum channels with ideal and/or threshold detectors. The calculated total success probability is highest (lowest) when only ideal (threshold) detectors are used.  相似文献   

5.
Iulia Ghiu 《Physics letters. A》2009,373(10):922-926
Suppose that we have two entangled states |?1〉, |ψ1〉 that cannot be converted to any of other two states |?2〉, |ψ2〉 by local operations and classical communication. We analyze the possibility of locally transforming a superposition of |?1〉 and |ψ1〉 into a superposition of |?2〉 and |ψ2〉. By using the Nielsen's theorem we find the necessary and sufficient conditions for this conversion to be performed.  相似文献   

6.
A revised controlled deterministic secure quantum communication protocol using five-photon entangled state is proposed. It amends the security loopholes pointed by Qin et al. in [S.J. Qin, Q.Y. Wen, L.M. Meng, F.C. Zhu, Opt. Commun. 282 (2009) 2656] in the original protocol proposed by Xiu et al. in [X.M. Xiu, L. Dong, Y.J. Gao, F. Chi, Opt. Commun. 282 (2009) 333]. The security loopholes are solved by using order rearrangement of transmission photons and two-step security test.  相似文献   

7.
A deterministic secure quantum communication scheme using entanglement swapping is proposed. The sender prepares four-particle genuine entangled states and sends two particles in each state to the receiver and remains the rest particles. If the quantum channel is secure, they begin to communicate. After their four-particle projective measurements, the receiver can obtain the secret information according to his measurement outcomes and classical information from the sender. Using entanglement swapping, there are no particles carrying secret information to be transmitted.  相似文献   

8.
De-Chao Li 《Physics letters. A》2009,373(40):3610-3613
Based on a new set of entanglement monotones of two-qubit pure states, we give sufficient and necessary conditions that one two-qubit mixed state is transformed into another one by local operations and classical communication (LOCC). This result can be viewed as a generalization of Nielsen's theorem Nielsen (1999) [1]. However, we find that it is more difficult to manipulate the entanglement transformation between single copy of two-qubit mixed states than to do between single copy of two-qubit pure ones.  相似文献   

9.
Thermal entanglement of the two-qubit XXZ model under magnetic fields in arbitrary directions is studied. Both the uniform and nonuniform fields are addressed. For the ferromagnetic case, a magnetic field perpendicular to the z-axis helps to enhance the entanglement or slows down the decrease of the entanglement. For the antiferromagnetic case, there is the revival phenomenon when the magnetic field is uniform and no such phenomenon when the field is uniform in the z-direction and a staggered type in the x-axis.  相似文献   

10.
We present a remote preparation of the N-particle GHZ state protocol in which only the effects of quantum statistics of indistinguishable particles are used. The N-particle GHZ state can be successfully prepared in the limit of N → ∞.  相似文献   

11.
Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes.  相似文献   

12.
A protocol for three-party quantum secure direct communication based on Greenberger-Horne-Zeilinger (GHZ) states was recently proposed by 3in et al. [Phys. Lett. A 354 (2006) 67] By analysing the protocol we find some security loopholes, e.g. one bit of secret messages of a party (Alice in the original paper) can always be leaked straight to the public without any eavesdropping. These problems suggested previously are discussed and possible solutions are presented to improve the security of the original protocol.  相似文献   

13.
An alternative protocol is proposed to implement three-qubit phase gate between photon and atoms in a high-Q bimodel optical cavity. The idea can be extended to directly implement N-qubit phase gate, and the gating time that is required to implement the protocol does not rise with increasing number of qubits. The influence of cavity decay and atomic spontaneous emission on the gate fidelity is also discussed.  相似文献   

14.
A scheme for quantum state sharing of an arbitrary m-qudit state is proposed with two-qudit entanglements and generalized Bell-state (GBS) measurements. In this scheme, the sender Alice should perform m two-particle GBS measurements on her 2m qudits, and the controllers also take GBS measurements on their qudits and transfer their quantum information to the receiver with entanglement swapping if the agents cooperate. We discuss two topological structures for this quantum state sharing scheme, a dispersive one and a circular one. The former is better at the aspect of security than the latter as it requires the number of the agents who should cooperate for recovering the quantum secret larger than the other one.  相似文献   

15.
A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efticiency for qudits in this scheme approaches 100% in principle.  相似文献   

16.
Firstly, we investigate the necessary and sufficient conditions that an entangled channel of n-qubits should satisfy to carry out perfect teleportation of an arbitrary single qubit state and dense coding. It is shown that the sender can transmit two classical bits of information by sending one qubit. Further, the case of high-dimension quantum state is also considered. Utilizing n-qudit state as quantum channel, it is proposed that the necessary and sufficient conditions are in all to teleport an arbitrary single qudit state. The sender can transmit 2log2d classical bits of information to the receiver conditioned on the constraints.  相似文献   

17.
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71 (2005) 012314]. The sender distributes the classical secret shares to his or her n agents and each agent owns a secret share in advance. The sender's secure direct communication message can be extracted by an agent subset by collaboration in such a way that at least t or more agents can obtain the secret message with the mutual assistances but any t - 1 or fewer agents cannot. In contrast to the previous multiparty quantum secret sharing protocols in which the sender's secret message can be recovered only if all the agents collaborate, our protocol is more practical and more flexible.  相似文献   

18.
宋杰  张寿 《中国物理快报》2006,23(6):1383-1836
We show that a potential eavesdropper can eavesdrop whole secret information when the legitimate users use secure carrier to encode and decode classical information repeatedly in the protocol proposed by Bagherinezhad S and Karimipour V [Phys. Rev. A 67(2003)044302]. Then we present a revised quantum secret sharing protocol by using the Greenberger-Horne-Zeilinger state as secure carrier. Our protocol can resist Eve's attack.  相似文献   

19.
A new experimentally feasible and secure quantum sealed-bid auction protocol using quantum secure direct communication based on GHZ states is proposed. In this scheme all bidders Bob, Charlie, … , and Zach use M groups n-particle GHZ states to represent their bids. Here, an auctioneer gives the auction outcome by performing a sequence of n-particle GHZ-basis measurements on the final quantum states. It has been shown that using this method guarantees the honesty of the protocol, and malicious bidders can not collude with the auctioneers.  相似文献   

20.
The security of the quantum secure direct communication (QSDC) protocol with cluster state is analysed. It is shown that the secret would be partially leaked out when an eavesdropper performs forcible measurements on the transmitted particles. With the help of the result in minimum error discrimination, an upper bound (i.e. 40%) of this leakage is obtained. Moreover, the particular measurements which makes the leakage reach this bound are given.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号