共查询到20条相似文献,搜索用时 15 毫秒
1.
The class of quantum languages Q() over an alphabet is the class of languages accepted by quantum automata. We study properties of Q() and compare Q() with the class of regular languages R(). It is shown that Q() is closed under union, intersection, and reversal but is not closed under complementation, concatenation, or Kleene star. It is also shown that Q() and R() are incomparable. Finally, we prove that L Q() if and only if L admits a transition amplitude function satisfying a certain property and a similar characterization is given for R(). 相似文献
2.
Lattices of Quantum Automata 总被引:3,自引:0,他引:3
We defined and studied three different types of lattice-valued finite state quantum automata (LQA) and four different kinds of LQA operations, discussed their advantages, disadvantages, and various properties. There are four major results obtained in this paper. First, no one of the above mentioned LQA follows the law of lattice value conservation. Second, the theorem of classical automata theory, that each nondeterministic finite state automaton has an equivalent deterministic one, is not necessarily valid for finite state quantum automata. Third, we proved the existence of semilattices and also lattices formed by different types of LQA. Fourth, there are tight relations between properties of the original lattice l and those of the l-valued lattice formed by LQA. 相似文献
3.
Stan Gudder 《Foundations of Physics》2006,36(8):1160-1192
Although a few new results are presented, this is mainly a review article on the relationship between finite-dimensional quantum mechanics and finite groups. The main motivation for this discussion is the hidden subgroup problem of quantum computation theory. A unifying role is played by a mathematical structure that we call a Hilbert *-algebra. After reviewing material on unitary representations of finite groups we discuss a generalized quantum Fourier transform. We close with a presentation concerning position-momentum measurements in this framework. 相似文献
4.
In this paper, we define weakly regular quantum grammars (WRQG), regular quantum grammars (RQG), asynchronous quantum automata
(AQA) and synchronous quantum automata (SQA). Moreover, we investigate the relationships between quantum languages generated
by weakly quantum regular grammars and by asynchronous quantum automata. At the mean time, we discuss the relationships between
regular quantum grammars and synchronous quantum automata.
This work is supported by National Science Foundation of China (Grant No. 10571112) and 973 Program of China (No. 2002CB312200). 相似文献
5.
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency. 相似文献
6.
YUAN Hao LIU Yi-Min HAN Lian-Fang ZHANG Zhan-Jun 《理论物理通讯》2008,49(5):1191-1194
A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger-Horne-Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate parties. The quantum information (i.e., the arbitrary unknown two-qutrit state) from the sender can be split in such a way that it can be reconstructed deterministically by any agent via a proper unitary operation provided that both agents collaborates together. Moreover, the generalization of the tripartite scheme to more-party case is also outlined. 相似文献
7.
We present a scheme to-prepare a quantum state in an ion trap with probability approaching to one by means of ion trap quantum computing and Grover's quantum search algorithm acting on trapped ions. 相似文献
8.
This paper presents a simple and novel quantum secret sharing schemeusing GHZ-like state. The characteristics of the GHZ-like state areused to develop the quantum secret sharing scheme. In contrast withthe other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency. 相似文献
9.
A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state,i.e.,Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie.The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice,Bob,and Charlie. 相似文献
10.
We propose and study a universal approach for the reconstruction of quantum states of many body systems from symmetry analysis. The concept of minimal complete set of quantum correlation functions (MCSQCF) is introduced to describe the state reconstruction. As an experimentally feasible physical object, the MCSQCF is mathematically defined through the minimal complete subspace of observables determined by the symmetry of quantum states under consideration. An example with broken symmetry is analyzed in detail to illustrate the idea. 相似文献
11.
Quantum state targeting is a quantum game which results from combining traditional quantum state estimation with additional
classical information. We consider a particular version of the game and show how it can be played with maximally entangled
states. The optimal solution of the game is used to derive a Bell inequality for two entangled qutrits. We argue that the
nice properties of the inequality are direct consequences of the method of construction. 相似文献
12.
A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information.Moreover,the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information.Then,the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users.After insuring the security of the quantum channel,they begin to hide the secret information in the cover of message.Comparing the scheme with the previous quantum steganographies,capacity and imperceptibility of hidden message are good.The security of the present scheme against many attacks is also discussed. 相似文献
13.
GUO Ying ZENG Gui-Hua Moon Ho Lee 《理论物理通讯》2008,50(8):363-367
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes. 相似文献
14.
DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《理论物理通讯》2008,49(6):1495-1498
A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure. 相似文献
15.
16.
A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state, i.e., Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie. The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice, Bob, and Charlie. 相似文献
17.
Omar Jimnez Miguel Angel SolísProsser Leonardo Neves Aldo Delgado 《Entropy (Basel, Switzerland)》2021,23(1)
We studied the mutual information and quantum discord that Alice and Bob share when Bob implements a discrimination with a fixed rate of inconclusive outcomes (FRIO) onto two pure non-orthogonal quantum states, generated with arbitrary a priori probabilities. FRIO discrimination interpolates between minimum error (ME) and unambiguous state discrimination (UD). ME and UD are well known discrimination protocols with several applications in quantum information theory. FRIO discrimination provides a more general framework where the discrimination process together with its applications can be studied. In this setting, we compared the performance of optimum probability of discrimination, mutual information, and quantum discord. We found that the accessible information is obtained when Bob implements the ME strategy. The most (least) efficient discrimination scheme is ME (UD), from the point of view of correlations that are lost in the initial state and remain in the final state, after Bob’s measurement. 相似文献
18.
A multi-sender-controlled quantum teleportation scheme is proposed
to teleport several secret quantum states from different senders to
a distance receiver based on only one Einstein-Podolsky-Rosen (EPR)
pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e.,
the detecting mode and the message mode, are employed so that the
eavesdropping can be detected easily and the teleported message may
be recovered efficiently. It has an advantage over teleporting
several different quantum states for one scheme run with more
efficiency than the previous quantum teleportation schemes. 相似文献
19.
WANG Jian ZHANG Quan TANG Chao-Jing 《理论物理通讯》2007,48(4):637-640
We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et at. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel. 相似文献
20.
M. Mirzaee M. Rezaee M. A. Jafarizadeh 《International Journal of Theoretical Physics》2007,46(6):1471-1494
Using the convex semidefinite programming method and superoperator formalism we obtain the finite quantum tomography of some
mixed quantum states such as: truncated coherent states tomography, phase tomography and coherent spin state tomography, qudit
tomography, N-qubit tomography, where that obtained results are in agreement with those of References (Buzek et al., Chaos, Solitons and Fractals
10 (1999) 981; Schack and Caves, Separable states of N quantum bits. In: Proceedings of the X. International Symposium on Theoretical Electrical Engineering, 73. W. Mathis and T. Schindler, eds. Otto-von-Guericke University of Magdeburg, Germany (1999); Pegg and Barnett Physical Review A
39 (1989) 1665; Barnett and Pegg Journal of Modern Optics
36 (1989) 7; St. Weigert Acta Physica Slov.
4 (1999) 613).
PACs index: 03.65.Ud 相似文献