首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitary transformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication.  相似文献   

2.
We present a scheme for quantum secure direct communication, in which the message is encoded by local unitary operations, transmitted through entangled photons, and deduced from both the sender and receiver's local measurement results. In such a scheme, only one pair of entangled photons is consumed, and there is no need to transmit the sender's qubit carrying the secret message in a public channel, in order to transmit two-bit classical information.  相似文献   

3.
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel, quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel  相似文献   

4.
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed.  相似文献   

5.
杨静  王川  张茹 《理论物理通讯》2010,(11):829-834
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.  相似文献   

6.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

7.
I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th~ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack.  相似文献   

8.
We study the entanglement trapping of two entangled qubits, each of which is in its own photonic band gap, based on the weak measurement and quantum measurement reversal. An almost maximal entanglement of the two-qubit system can be trapped by using a certain weak measurement strength. Furthermore, we find that the optimal entanglement enhancing is not only dependent on the weak measurement strength but also on the different initial states. The outcomes in our scheme are completely different from that without any measurement on the studied system.  相似文献   

9.
许鹏  王栋  叶柳 《中国物理 B》2013,(10):119-124
We investigate the quantum characteristics of a three-particle W-class state and reveal the relationship between quan- tum discord and quantum entanglement under decoherence. We can also identify the state for which discord takes a maximal value for a given decoherence factor, and present a strong bound on quantum entanglement-quantum discord. In contrast, a striking result will be obtained that the quantum discord is not always stronger than the entanglement of formation in the case of decoherence. Furthermore, we also theoretically study the variation trend of the monogamy of quantum correlations for the three-particle W-class state under the phase flip channel, and find that the three-particle W-class state could transform from polygamous into monogamous, owing to the decoherence.  相似文献   

10.
We present a scheme for teleporting multi-qutrit quantum information from a sender to a receiver via the control of many agents in a network. Agents's control parameters are obtained via quantum entanglement swapping. In our scheme, Zhang and Man's QSS protocol [Phys. Rev. A 72 (2005) 022303] based on Bell-state entanglement swapping is generalized to a qutrit case. Our scheme owns the advantage of having higher code capacity and better security than the work [Commun. Theor. Phys. 44 (2005) 847] on controlled teleportation for multi-qubit.  相似文献   

11.
Werner states are paradigmatic examples of quantum states and play an innovative role in quantum information theory. In investigating the correlating capability of Werner states, we find the curious phenomenon that quantum correlations, as quantified by the entanglement of formation, may exceed the total correlations, as measured by the quantum mutual information. Consequently, though the entanglement of formation is so widely used in quantifying entanglement, it cannot be interpreted as a consistent measure of quantum correlations per se if we accept the folklore that total correlations are measured (or rather upper bounded) by the quantum mutual information.  相似文献   

12.
We consider a one-dimensional array of L identical coupled cavities, and each cavity is doped with a two-level qubit. Experimentally, it has been developed in several varieties by the newest technology. We find that the one-qubit quantum state can be perfectly transferred through the cavity array, and the entanglement between the first two qubits can also be transferred to the last two qubits. In addition, we successfully realized the entangling gate and swap gate in the coupled cavity array.  相似文献   

13.
We present a new model of quantum phase transitions in matrix product systems of one-dimensional spin-1 chains and study the phases coexistence phenomenon. We find that in the thermodynamic limit the proposed system has three different quantum phases and by adjusting the control parameters we are able to realize any phase, any two phases equal coexistence and the three phases equM coexistence. At every critical point the physical quantities including the entanglement are not discontinuous and the matrix product system has long-range correlation and N-spin maximal entanglement. We believe that our work is helpful for having a comprehensive understanding of quantum phase transitions in matrix product states of one-dimensional spin chains and of certain directive significance to the preparation and control of one-dimensional spin lattice models with stable coherence and N-spin maximal entanglement.  相似文献   

14.
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes.  相似文献   

15.
For the matrix product system of a one-dimensional spin-1/2 chain, we present a new model of quantum2 phase transitions and find that in the thermodynamic limit, both sides of the critical point are respectively described by phases |Ψa 〉=|1··· 1 representing all particles spin up and |Ψb 〉=|0··· 0 representing all particles spin down, while the phase transition point is an isolated intermediate-coupling point where√ the two phases coexist equally, which is2 described by the so-called N-qubit maximally entangled GHZ state |Ψpt =√2/2(|1··· 1 +|0··· 0). At the critical point,2the physical quantities including the entanglement are not discontinuous and the matrix product system has longrange correlation and N-qubit maximal entanglement. We believe that our work is helpful for having a comprehensive understanding of quantum phase transitions in matrix product states of one-dimensional spin chains and of potential directive significance to the preparation and control of one-dimensional spin lattice models with stable coherence and N-qubit maximal entanglement.  相似文献   

16.
林崧 《理论物理通讯》2010,(6):1059-1061
In a recent letter [H.F. Wang, X. Ji, and S. Zhang, Phys. Lett. A 358 (2006) 11], an improvement of the multiparty quantum secret splitting and quantum state sharing protocol [F.G. Deng, et al., Phys. Lett. A 354 (2006) 190.] was presented. We study the security of the improved protocol and find that two or more dishonest participants may recover the secret from the dealer. Hence we further modify the improved protocol, which make it stand against this kind of attack.  相似文献   

17.
We investigate the quantum-classical transition of a kicked rotor (KR) under perturbation by a second one. The influence of such a chaotic KR makes decoherence of the first one, resulting in the emergence of classical diffusion from its quantum dynamics. Such quantum-classical transition persists by decreasing the effective Planck's constant h, and at the same time, decreasing the mass of the second KR and the interaction strength proportionally. In the limit of h → 0, due to vanishing small mass and interaction, the second KR has almost no effect on the classieal dynamics of the first one. We demonstrate this via two different coupling potentials.  相似文献   

18.
GAO Gan 《理论物理通讯》2008,50(8):368-370
We propose a quantum superdense coding secure communication scheme by using GHZ state. This scheme combines the ideas of quantum superdense coding and sequence transmission. Its distinct advantage is high source capacity. In addition, in checking eavesdropping, we need not to destroy quantum entanglement.  相似文献   

19.
We obtain an explicit formula to calculate the entanglement entropy of bipartite entangled state of general two-mode boson exponential quadratic operator with continuous variables in Fock space. The simplicity and generality of our formula are shown by some examples.  相似文献   

20.
We propose a quantum secure communication protocol by using three-particle GHZ states. In this protocol, we utilize the ideas of the rearranging orders and the sequence transmission. The sender of messages, Alice, first disturbs the particle orders in an initial sequence, and then sends the sequence of the disturbed orders to the receiver of messages, Bob. Under Alice's introduction, Bob rearranges the sequence back to the initial sequence. By making a GHZ state measurement on each of the three particles in turn, Bob can attain Alice's secret messages. In addition, we still calculate the efficiency of our three-particle GHZ protocol and generalize it to the case using multi-particle GHZ state.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号