共查询到20条相似文献,搜索用时 0 毫秒
1.
We propose a new protocol for quantum teleportation of an arbitrary two qubit state via continuous variables entangling channel. In our scheme two pairs of entangled light fields are employed. An outstanding characteristic of this scheme is that arbitrary state of two atoms is transmitted deterministically and directly to another pair of atoms without the help of the other atoms. 相似文献
2.
Nguyen Ba An 《Physics letters. A》2008,372(21):3778-3783
In this work we devise a scheme to teleport a type of unknown M-quNit state using only a single non-maximally entangled quNit-pair as the quantum channel. The fidelity is one while the success probability is less than one and depends on N but not on M. The scheme requires M−1 ancillary quNits and 1 qubit at the receiver's and the receiver should be capable of performing some quNit-quNit/qubit operations. The classical message that the teleporter must announce consists only of 2 Nits, though the full set of his/her measurement outcome is as huge as M+1 Nits. 相似文献
3.
We propose one cavity QED (CQED) scheme for generating an arbitrary 2-level-atom cluster state. Besides, by using a 4-atom cluster state as quantum channel, we propose another CQED scheme for teleporting any unknown two-atom state. In both schemes, the dynamics processes are essentially quite similar. The Rabi frequency of the classical driving field is much bigger than the detuning between the atoms and the cavity. Hence both schemes are insensitive to the cavity decay. The necessary time for implementation is much shorter than the Rydberg-atom lifespan, therefore atom decays do not need to be considered. Moreover, in the teleportation scheme the discrimination of the 16 mutually orthogonal 4-atom cluster states is transformed into the discrimination of single-atom product states, consequently the discrimination difficulty is degraded and the scheme is more easily implemented. 相似文献
4.
We propose a protocol Dn for faithfully teleporting an arbitrary n-qudit state with the tensor product state (TPS) of n generalized Bell states (GBSs) as the quantum channel. We also put forward explicit protocols and for faithfully teleporting an arbitrary n-qudit state with two classes of 2n-qudit GESs as the quantum channel, where the GESs we constructed are a kind of genuine entangled states which cannot be reducible to the TPS of n GBSs. 相似文献
5.
We report a scalable linear optical scheme for generating entangled states of multiple ququarts in which the individual single-ququart state is prepared with the biphoton polarization state of frequency-nondegenerate spontaneous parametric down-conversion. The output state is calculated with the full consideration of the higher order effect (double-pair events) of spontaneous parametric down-conversion. Scalability to multiple-ququart entanglement is demonstrated with examples: linear optical entanglement of three and four individual biphoton ququarts. 相似文献
6.
An experimental scheme is proposed for faithful teleportation of a unknown optical cat-state via attenuated quantum channel due to energy loss or photon absorption during the process of entanglement sharing. The scheme is probabilistic, yet conclusive, and the effective classical communication costs just Log23 bits, instead of five bits which are necessary for full record of the measurement outcome. The scheme uses only threshold (i.e., yes/no) detectors so that exact photon counting is not needed. However, it requires application of a nonlinear element called cross-phase modulator. Feasibility of the scheme is also discussed with respect to EIT-based modern techniques. 相似文献
7.
Firstly, we investigate the necessary and sufficient conditions that an entangled channel of n-qubits should satisfy to carry out perfect teleportation of an arbitrary single qubit state and dense coding. It is shown that the sender can transmit two classical bits of information by sending one qubit. Further, the case of high-dimension quantum state is also considered. Utilizing n-qudit state as quantum channel, it is proposed that the necessary and sufficient conditions are in all to teleport an arbitrary single qudit state. The sender can transmit 2log2d classical bits of information to the receiver conditioned on the constraints. 相似文献
8.
A scheme for quantum state sharing of an arbitrary m-qudit state is proposed with two-qudit entanglements and generalized Bell-state (GBS) measurements. In this scheme, the sender Alice should perform m two-particle GBS measurements on her 2m qudits, and the controllers also take GBS measurements on their qudits and transfer their quantum information to the receiver with entanglement swapping if the agents cooperate. We discuss two topological structures for this quantum state sharing scheme, a dispersive one and a circular one. The former is better at the aspect of security than the latter as it requires the number of the agents who should cooperate for recovering the quantum secret larger than the other one. 相似文献
9.
J. Dong J. F. Teng 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2008,49(1):129-134
In this paper, we explicitly present a general scheme for controlled quantum teleportation of an arbitrary multi-qudit state
with unit fidelity and non-unit successful probability using d-dimensional nonmaximally entangled GHZ states as the quantum channel and generalized d-dimensional Bell states as the measurement basis. The expression of successful probability for controlled teleportation is
present depending on the degree of entanglement matching between the quantum channel and the generalized Bell states. And
the formulae for the selection of operations performed by the receiver are given according to the results measured by the
sender and the controller.
相似文献
10.
Quantum teleportation is one of the most important subjects in quantum information science. This is because quantum teleportation can be regarded as not only quantum information transfer but also a building block for universal quantum information processing. Furthermore, deterministic quantum information processing is very important for efficient processing and it can be realized with continuous-variable quantum information processing. In this review, quantum teleportation for continuous variables and related quantum information processing are reviewed from these points of view. 相似文献
11.
We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept resend attacks. Furthermore, it is eifficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the etfficiency of the protocol. 相似文献
12.
Quantum state sharing of an arbitrary
multiqubit state using nonmaximally entangled GHZ states 总被引:1,自引:0,他引:1
Z.-X. Man Y.-J. Xia N. B. An 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2007,42(2):333-340
We explicitly present a scheme for quantum
state sharing of an arbitrary multiqubit state using nonmaximally
entangled GHZ states as the quantum channel and generalized Bell
states as the measurement basis. The scheme succeeds only
probabilistically with its total success probability depending on
the degree of entanglement matching between the quantum channel and
the generalized Bell states. Security of the scheme is guaranteed by
the fact that attacks of an outside eavesdropper or/and an inside
dishonest party will inevitably introduce detectable errors. 相似文献
13.
Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology. 相似文献
14.
We consider recent schemes [J.M. Liu, B. Weng, Physica A 367 (2006) 215] to teleport unknown atomic states and superposition of zero- and two-photon states using the two-photon Jaynes-Cummings model. Here we do the same using the “full two-photon Jaynes-Cumming”, valid for arbitrary average number of photons. The success probability and fidelity of this teleportation are also considered. 相似文献
15.
Since the original Cai-Li protocol [Chin. Phys. Lett. 21 (2004)601] can be used only in an ideal quantum communication, we present the modified Cai-Li protocol that can be used in the a noisy quantum channel by using Calderbank-Shor-Steane (CSS) codes to correct errors. We also give a tight bound on the connection between information Eve eavesdropped with a measurement attack in line B → A and detection probability,which shows that the Cai-Li protocol can be used as a quasisecure direct quantum communication. 相似文献
16.
D. Bouwmeester K. Mattle J.-W. Pan H. Weinfurter A. Zeilinger M. Zukowski 《Applied physics. B, Lasers and optics》1998,67(6):749-752
Received: 1 July 1998/Revised version: 2 October 1998 相似文献
17.
We report a practical non-postselection entanglement concentration scheme in which a maximally entangled Bell-state photon pair is produced from two pairs of partially (or non-maximally) entangled photons. Since this scheme is built only upon linear optical elements and does not require photon-number resolving detectors, it has immediate applications in experimental implementations of various quantum information protocols which require two-photon Bell-states. 相似文献
18.
Polarization entangled photon pairs are easily perturbed in noisy channels. We propose a polarization entanglement purification method using temporal degree of freedom, followed by the conventional iterative purification. The entanglement fidelity can be improved to any degree, and the steps needed are less than those using conventional iteration method. 相似文献
19.
Xiu-Lao Tian Xiao-Qiang Xi Guo-Fang Shi Ming-Liang Hu Guo-Guang Yao 《Optics Communications》2009,282(24):4815-4818
We propose the tensor representation of teleportation and controlled teleportation. By using this representation, it is easy to describe the process of teleporting an unknown N-qubit state via a genuine 2N-qubit channel, and to find the necessary and sufficient condition of realizing a successful teleportation (which is determined by the measurement matrix Tα and the quantum channel parameter matrix X). For controlled teleportation, if composing tensor representation with graph, one can easily design any kind of controlled teleportation. As examples, we give a scheme of symmetrically controlled teleportation of two-qubit states and a scheme of representative network controlled of three-qubit states. This method can also be generalized to the controlled teleportation of N-qubit states. 相似文献
20.
Quantum state sharing of an arbitrary two-qubit state
with two-photon entanglements and Bell-state measurements 总被引:4,自引:0,他引:4
F.-G. Deng X.-H. Li C.-Y. Li P. Zhou H.-Y. Zhou 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2006,39(3):459-464
Two schemes for sharing an arbitrary two-qubit state based on
entanglement swapping are proposed with Bell-state measurements
and local unitary operations. One is based on the quantum channel
with four Einstein-Podolsky-Rosen (EPR) pairs shared in advance.
The other is based on a circular topological structure, i.e., each
user shares an EPR pair with his neighboring one. The advantage of
the former is that the construction of the quantum channel between
the agents is controlled by the sender Alice, which will improve
the security of the scheme. The circular scheme reduces the
quantum resource largely when the number of the agents is large.
Both of those schemes have the property of high efficiency as
almost all the instances can be used to split the quantum
information. They are more convenient in application than the
other schemes existing as they require only two-qubit
entanglements and two-qubit joint measurements for sharing an
arbitrary two-qubit state. 相似文献