首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The class of quantum languages Q() over an alphabet is the class of languages accepted by quantum automata. We study properties of Q() and compare Q() with the class of regular languages R(). It is shown that Q() is closed under union, intersection, and reversal but is not closed under complementation, concatenation, or Kleene star. It is also shown that Q() and R() are incomparable. Finally, we prove that L Q() if and only if L admits a transition amplitude function satisfying a certain property and a similar characterization is given for R().  相似文献   

2.
Lattices of Quantum Automata   总被引:3,自引:0,他引:3  
We defined and studied three different types of lattice-valued finite state quantum automata (LQA) and four different kinds of LQA operations, discussed their advantages, disadvantages, and various properties. There are four major results obtained in this paper. First, no one of the above mentioned LQA follows the law of lattice value conservation. Second, the theorem of classical automata theory, that each nondeterministic finite state automaton has an equivalent deterministic one, is not necessarily valid for finite state quantum automata. Third, we proved the existence of semilattices and also lattices formed by different types of LQA. Fourth, there are tight relations between properties of the original lattice l and those of the l-valued lattice formed by LQA.  相似文献   

3.
Although a few new results are presented, this is mainly a review article on the relationship between finite-dimensional quantum mechanics and finite groups. The main motivation for this discussion is the hidden subgroup problem of quantum computation theory. A unifying role is played by a mathematical structure that we call a Hilbert *-algebra. After reviewing material on unitary representations of finite groups we discuss a generalized quantum Fourier transform. We close with a presentation concerning position-momentum measurements in this framework.  相似文献   

4.
Weakly Regular Quantum Grammars and Asynchronous Quantum Automata   总被引:1,自引:0,他引:1  
In this paper, we define weakly regular quantum grammars (WRQG), regular quantum grammars (RQG), asynchronous quantum automata (AQA) and synchronous quantum automata (SQA). Moreover, we investigate the relationships between quantum languages generated by weakly quantum regular grammars and by asynchronous quantum automata. At the mean time, we discuss the relationships between regular quantum grammars and synchronous quantum automata. This work is supported by National Science Foundation of China (Grant No. 10571112) and 973 Program of China (No. 2002CB312200).  相似文献   

5.
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.  相似文献   

6.
A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger-Horne-Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate parties. The quantum information (i.e., the arbitrary unknown two-qutrit state) from the sender can be split in such a way that it can be reconstructed deterministically by any agent via a proper unitary operation provided that both agents collaborates together. Moreover, the generalization of the tripartite scheme to more-party case is also outlined.  相似文献   

7.
We present a scheme to-prepare a quantum state in an ion trap with probability approaching to one by means of ion trap quantum computing and Grover's quantum search algorithm acting on trapped ions.  相似文献   

8.
This paper presents a simple and novel quantum secret sharing schemeusing GHZ-like state. The characteristics of the GHZ-like state areused to develop the quantum secret sharing scheme. In contrast withthe other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.  相似文献   

9.
A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state,i.e.,Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie.The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice,Bob,and Charlie.  相似文献   

10.
We propose and study a universal approach for the reconstruction of quantum states of many body systems from symmetry analysis. The concept of minimal complete set of quantum correlation functions (MCSQCF) is introduced to describe the state reconstruction. As an experimentally feasible physical object, the MCSQCF is mathematically defined through the minimal complete subspace of observables determined by the symmetry of quantum states under consideration. An example with broken symmetry is analyzed in detail to illustrate the idea.  相似文献   

11.
Quantum state targeting is a quantum game which results from combining traditional quantum state estimation with additional classical information. We consider a particular version of the game and show how it can be played with maximally entangled states. The optimal solution of the game is used to derive a Bell inequality for two entangled qutrits. We argue that the nice properties of the inequality are direct consequences of the method of construction.  相似文献   

12.
A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information.Moreover,the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information.Then,the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users.After insuring the security of the quantum channel,they begin to hide the secret information in the cover of message.Comparing the scheme with the previous quantum steganographies,capacity and imperceptibility of hidden message are good.The security of the present scheme against many attacks is also discussed.  相似文献   

13.
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes.  相似文献   

14.
A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure.  相似文献   

15.
本文研究了如何在二粒子纠缠态的量子受控传递中选择最佳量子通道的问题。分别利用四粒子GHZ态和四粒子特殊"反关联GHZ态"作为量子通道,本文提出了二粒子反关联纠缠态的量子受控传递的两个方案。通过对比两个方案下接受者最后采取的幺正操作的具体矩阵形式,分析了待传量子纠缠态与量子通道的关系,指出了四粒子GHZ态和四粒子特殊"反关联GHZ态"分别是二粒子正关联和反关联纠缠态各自隐形传递应该选择的最佳的量子通道。  相似文献   

16.
A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state, i.e., Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie. The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice, Bob, and Charlie.  相似文献   

17.
We studied the mutual information and quantum discord that Alice and Bob share when Bob implements a discrimination with a fixed rate of inconclusive outcomes (FRIO) onto two pure non-orthogonal quantum states, generated with arbitrary a priori probabilities. FRIO discrimination interpolates between minimum error (ME) and unambiguous state discrimination (UD). ME and UD are well known discrimination protocols with several applications in quantum information theory. FRIO discrimination provides a more general framework where the discrimination process together with its applications can be studied. In this setting, we compared the performance of optimum probability of discrimination, mutual information, and quantum discord. We found that the accessible information is obtained when Bob implements the ME strategy. The most (least) efficient discrimination scheme is ME (UD), from the point of view of correlations that are lost in the initial state and remain in the final state, after Bob’s measurement.  相似文献   

18.
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes.  相似文献   

19.
We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et at. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.  相似文献   

20.
Using the convex semidefinite programming method and superoperator formalism we obtain the finite quantum tomography of some mixed quantum states such as: truncated coherent states tomography, phase tomography and coherent spin state tomography, qudit tomography, N-qubit tomography, where that obtained results are in agreement with those of References (Buzek et al., Chaos, Solitons and Fractals 10 (1999) 981; Schack and Caves, Separable states of N quantum bits. In: Proceedings of the X. International Symposium on Theoretical Electrical Engineering, 73. W. Mathis and T. Schindler, eds. Otto-von-Guericke University of Magdeburg, Germany (1999); Pegg and Barnett Physical Review A 39 (1989) 1665; Barnett and Pegg Journal of Modern Optics 36 (1989) 7; St. Weigert Acta Physica Slov. 4 (1999) 613). PACs index: 03.65.Ud  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号