首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
A new application of cluster states is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. In our scheme, a four-qubit cluster state and a Bell state are shared by a sender (Alice), a controller (Charlie), and areceiver (Bob). Both the sender and controller only need to perform Bell-state measurements (BSMs), the receiver can reconstruct the arbitrary three-qubit state by performing some appropriately unitary transformations on his qubits after he knows the measured results of both the sender and the controller. This QIS scheme is deterministic.  相似文献   

3.
In this paper, a new scheme of quantum information splitting (8QIS) by using five-qubit state and GHZ-state as quantum channel is proposed. The sender Alice performs Bell-state measurements (BSMs) on her qubit-pairs respectively,then tells her measurement result to the receivers Bob. If Bob wants to reconstruct the original states, he must cooperates with the controller Charlie, that Charlie performs two single particle measurement on his qubits and tells Bob the results. According to Alice’s and Bob’s results, Bob can reconstruct the initial state by applying appropriate unitary operation.  相似文献   

4.
In this paper, two new efficient multiparty quantum direct secret sharing schemes are proposed via a six-particle GHZ state and Bell measurements. In the first scheme, based on the theory of security cryptanalysis, the secret message of the sender is directly encoded into the transmitted particles, and all the agents can obtain their information by performing bell measurement on the received particles, and then cooperate to recover the information of the sender. In the second scheme, we define a new secret shared coding method by performing local unitary operations on the transmitted particles, then agents perform Bell measurements on their own particles respectively, and feedback the measurement to the dealer. If the agent's results are matched with the previous coding method, the protocol will work out.In addition, the proposed two schemes have the following common advantages: the sender can send all prepared particles to the receiver, and can send an arbitrary key to the receiver, rather than a random secret key; the proposed schemes do not need to insert any detection sets to detect eavesdropping and can resist both existing attacks and spoofing attacks by dishonest agents. The sender need not to retain any photons, so the sender's quantum memory could be omitted here.  相似文献   

5.
We present a tripartite quantum information splitting (QIS) protocol for splitting an arbitrary two-qubit state by using a five-qubit entangled state as quantum channel. We describe the construction of this channel and explicitly demonstrate how the QIS protocol works. We illustrate the procedure in the ion-trap systems, but the protocol can also be realized in other systems.  相似文献   

6.
A scheme for probabilistic teleportation of an unknown three-atom entangled state via a five-atom non-maximally entangled cluster state as quantum channel is proposed. In this scheme, the sender performs two Bell state and a single-atom measurements on the atoms, the receiver can reconstruct the original state with a certain probability by introducing an auxiliary atom and operating appropriate unitary transformations and controlled-not (C-not) operations according to the sender Alice's measurement results. As a result, the probability of successful teleportation is determined by the smallest two of the coefficients'absolute values of the cluster state. The considerable advantage of our scheme is that we employ a non-maximally entangled cluster state as quantum channel in the scheme, which can greatly reduce the amount of entanglement resources and need less classical bits. If we employ a maximally entangled cluster state as quantum channel, the probabilistic teleportation scheme becomes usual teleportation, the successful probability being 100%.  相似文献   

7.
In this paper, two schemes of teleporting two particles are proposed. In first scheme, an auxiliary particle is introduced to transfer a two-particle state with special coefficients. The sender adopts Bell bases measurement and Von Neumann measurement, then the receiver obtain the state through appropriate unitary transformation. In second scheme, two special two-particle entangled states are chosen as quantum channel. The sender takes Bell bases measurement twice, and transfers the results to the receiver by classical channel, then the receiver gets the transmitted state through unitary transformation.  相似文献   

8.
A multiparty quantum secret sharing scheme based on Bell measurement is proposed and analyzed. In this scheme, all agents are not required to prepare entangled states or perform any local unitary operation. The security of the protocol is also analyzed. It is shown that any eavesdropper will introduce errors invariably and be detected if he tries to steal information about Trent’s secret. Moreover, because no classical bit needs to be transmitted except those for detection, the total efficiency of the scheme approaches to 100%.  相似文献   

9.
We propose a seven-qubit entangled channel that can be used to realize the deterministic quantum information splitting of an arbitrary three-qubit state. We describe the construction of this channel and explicitly demonstrate how the protocol works. In this scheme, three Bell state measurements and a single-qubit measurement are indispensable.  相似文献   

10.
A new application of the genuinely entangled five-qubit state is investigated for quantum information splitting of a particular type of two-qubit state. In this scheme, a genuinely entangled five-qubit state is shared by Alice (a sender), Charlie (a controller) and Bob (a receiver), and Alice only needs to perform two Bell-state measurements and Charlie performs a single-qubit measurement, Bob can reconstruct the two-qubit state by performing some appropriately unitary transformations on his qubits after he knows the measured results of both Alice and Charlie. This quantum information splitting scheme is deterministic, i.e. the probability of success is 100 %. The presented protocol is showed to be secure against certain eavesdropping attacks.  相似文献   

11.
In this paper, we propose a mesh-topology-based multi-hop teleportation scheme for a quantum network. By using the proposed scheme, quantum communication can be realized between two arbitrary nodes, even when they do not share a direct quantum channel. Einstein–Podolsky–Rosen pairs are used as quantum channels. The source node (initial sender) and all intermediate nodes make Bell measurements independently. They send the results to the destination node (final receiver) by classical channels. The quantum state can be determined from the Bell measurement result, and only the destination node is required for simple unitary transformation. This method of simultaneous measurement contributes significantly to quantum network by reducing the hop-by-hop transmission delay.  相似文献   

12.
In this paper, we present a scheme for quantum dialogue by using a four-qubit cluster state as quantum channel.The scheme has two cases: Case 1, Sender Alice and receiver Bob share information using an orderly sequence of entangled state as quantum channel which was prepared by Alice. This case is achieved as follows: The two sides agreed to encode quantum state information, then Alice perform a bell state measurement for quantum information which has been encoded. This will convey the information to Bob, then Bob measuring his own qubits, through the analysis of the measurement results of Alice and Bob, Bob can obtain quantum information. For case 2, four-qubit cluster state and quantum state information is transmitted to form a total quantum system. In the Case 2 scenario, Alice and Bob perform bell state measurements for part of the qubits, and tell the measurement result to each other through the classical channel. Finally, according to the measurement result, Alice and Bob operate an appropriate unitary transformation, as a result, Alice’s qubit will be renewed upon Bob’s measurements, and also, Bob’s qubit will be renewed upon Alice’s measurements. Thus, a bidirectional quantum dialogue is achieved. After analysis, this scheme has high security by taking certain eavesdropping attacks into account. There is therefore a certain reference value to the realization of quantum dialogue.  相似文献   

13.
We propose a realizable quantum information splitting (QIS) scheme for an arbitrary three-qubit state via the cavity input–output process. In our scheme, a four-qubit cluster state and a three-qubit Greenberger–Horne–Zeilinge (GHZ) state are used as quantum channel. The sender and controller only need to perform Bell-state measurements and a single-qubit measurement, respectively. The receiver can reconstruct the arbitrary three-qubit state by classical communication and local operations. Compared with the scheme in Nie et al. [Optics Communications 284 (2011) 1457], the quantum resources and classical information in our scheme are decreased by 5 qubits and 1 bit, respectively. Moreover, we replace the W-state category measurement in the former with Bell-state measurements and a single-qubit measurement, which is more simple and feasible in experiment.  相似文献   

14.
提出了一个基于高维2m+1粒子纠缠态的任意m粒子态量子可控离物传态方案,发送方Alice对需传送的未知态量子系统和手中的纠缠粒子执行m个广义Bell基测量,控制方执行广义X基测量,依据预先共享量子纠缠态非定域相关性,接收方对手中的粒子执行相应的幺正操作就可以重建原来未知量子态.与其他方案相比,方案减少了任意高维多粒子态可控离物传送所需传送粒子数.我们进一步讨论了基于纯纠缠信道的概率量子可控离物传态方案,通过与发送方和控制方合作,接收方只需对手中的纠缠粒子和引入的附加粒子执行联合幺正演化和投影测量,就可以在他的粒子上概率的重建原来的未知量子态,最后,方案计算讨论了基于纯纠缠态量子可控离物传态成功概率与信道纠缠度之间的关系.  相似文献   

15.
基于六粒子纠缠态和Bell态测量的量子信息分离   总被引:2,自引:2,他引:0  
通过介绍六粒子纠缠态的新应用研究,提出了一个二粒子任意态的信息分离方案.在这个方案中,发送者Alice、控制者Charlie和接受者Bob共享一个六粒子纠缠态,发送者先执行两次Bell基测量;然后控制者执行一次Bell基测量;最后接受者根据发送者和控制者的测量结果,对自己拥有的粒子做适当的幺正变换,从而能够重建要发送的...  相似文献   

16.
We present a multiparty quantum secret sharing scheme and analyze its security. In this scheme, the sender Alice takes EPR pairs in Bell states as quantum resources. In order to obtain the shared key, all participants only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is not necessary except for the eavesdropping checks.  相似文献   

17.
We propose a tripartite scheme for bisplitting an arbitrary single-qubit quantum information (QI) by using a class of asymmetric three-qubit W state as quantum channels. In the scheme, the sender Alice first performs a Bell-state measurement on her two qubits and then publishes her measurement result via a public classical channel. Based on Alice’s message, if the two receivers Bob and Charlie collaborate together, they can retrieve the QI, i.e., they can deterministically recover the QI in one receiver’s site by first performing a two-qubit unitary operation and then executing a single-qubit unitary operation. Afterwards, we sketch the extension of the single-qubit QI splitting to an arbitrary N-qubit QI splitting.  相似文献   

18.
A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein-Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded directly on the first particles of the prepared Bell states by simple unitary operations and decoded by performing the Bell-basis measurement after the additional classic information is exchanged. In addition, the strategy with two-step transmission of quantum data blocks and the technique of decoy-particle checking both are exploited to guarantee the security of the communication. Compared with some previous DSQC schemes, this scheme not only has a higher resource capacity, intrinsic efficiency and total efficiency, but also is more realizable in practical applications. Security analysis shows that the proposed scheme is unconditionally secure against various attacks over an ideal quantum channel and still conditionally robust over a noisy and lossy quantum channel.  相似文献   

19.
刘玉玲  满忠晓  夏云杰 《物理学报》2008,57(5):2680-2686
提出一个对任意二粒子纠缠态在N者之间的量子秘密分享方案,该方案利用非最大纠缠Einstein-Podolsky-Rosen(EPR)对作为量子信道,利用广义的贝尔基进行测量.接收者通过引入辅助粒子,并对其做选择性测量,就会概率性地得到最初的量子态. 关键词: 非最大纠缠的Einstein-Podolsky-Rosen(EPR)对 广义的贝尔测量  相似文献   

20.
We present a quantum secret sharing scheme between multiparty (m members in Group 1) and multiparty (n members in Group 2), and analyze its security. This scheme takes EPR pairs in Bell states as quantum resources. In order to obtain the shared key, all members only need to perform Bell measurements, rather than perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is not necessary except for the eavesdropping checks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号