首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
We propose a new protocol for quantum teleportation of an arbitrary two qubit state via continuous variables entangling channel. In our scheme two pairs of entangled light fields are employed. An outstanding characteristic of this scheme is that arbitrary state of two atoms is transmitted deterministically and directly to another pair of atoms without the help of the other atoms.  相似文献   

2.
Nguyen Ba An 《Physics letters. A》2008,372(21):3778-3783
In this work we devise a scheme to teleport a type of unknown M-quNit state using only a single non-maximally entangled quNit-pair as the quantum channel. The fidelity is one while the success probability is less than one and depends on N but not on M. The scheme requires M−1 ancillary quNits and 1 qubit at the receiver's and the receiver should be capable of performing some quNit-quNit/qubit operations. The classical message that the teleporter must announce consists only of 2 Nits, though the full set of his/her measurement outcome is as huge as M+1 Nits.  相似文献   

3.
We propose one cavity QED (CQED) scheme for generating an arbitrary 2-level-atom cluster state. Besides, by using a 4-atom cluster state as quantum channel, we propose another CQED scheme for teleporting any unknown two-atom state. In both schemes, the dynamics processes are essentially quite similar. The Rabi frequency of the classical driving field is much bigger than the detuning between the atoms and the cavity. Hence both schemes are insensitive to the cavity decay. The necessary time for implementation is much shorter than the Rydberg-atom lifespan, therefore atom decays do not need to be considered. Moreover, in the teleportation scheme the discrimination of the 16 mutually orthogonal 4-atom cluster states is transformed into the discrimination of single-atom product states, consequently the discrimination difficulty is degraded and the scheme is more easily implemented.  相似文献   

4.
We propose a protocol Dn for faithfully teleporting an arbitrary n-qudit state with the tensor product state (TPS) of n generalized Bell states (GBSs) as the quantum channel. We also put forward explicit protocols and for faithfully teleporting an arbitrary n-qudit state with two classes of 2n-qudit GESs as the quantum channel, where the GESs we constructed are a kind of genuine entangled states which cannot be reducible to the TPS of n GBSs.  相似文献   

5.
We report a scalable linear optical scheme for generating entangled states of multiple ququarts in which the individual single-ququart state is prepared with the biphoton polarization state of frequency-nondegenerate spontaneous parametric down-conversion. The output state is calculated with the full consideration of the higher order effect (double-pair events) of spontaneous parametric down-conversion. Scalability to multiple-ququart entanglement is demonstrated with examples: linear optical entanglement of three and four individual biphoton ququarts.  相似文献   

6.
An experimental scheme is proposed for faithful teleportation of a unknown optical cat-state via attenuated quantum channel due to energy loss or photon absorption during the process of entanglement sharing. The scheme is probabilistic, yet conclusive, and the effective classical communication costs just Log23 bits, instead of five bits which are necessary for full record of the measurement outcome. The scheme uses only threshold (i.e., yes/no) detectors so that exact photon counting is not needed. However, it requires application of a nonlinear element called cross-phase modulator. Feasibility of the scheme is also discussed with respect to EIT-based modern techniques.  相似文献   

7.
Firstly, we investigate the necessary and sufficient conditions that an entangled channel of n-qubits should satisfy to carry out perfect teleportation of an arbitrary single qubit state and dense coding. It is shown that the sender can transmit two classical bits of information by sending one qubit. Further, the case of high-dimension quantum state is also considered. Utilizing n-qudit state as quantum channel, it is proposed that the necessary and sufficient conditions are in all to teleport an arbitrary single qudit state. The sender can transmit 2log2d classical bits of information to the receiver conditioned on the constraints.  相似文献   

8.
A scheme for quantum state sharing of an arbitrary m-qudit state is proposed with two-qudit entanglements and generalized Bell-state (GBS) measurements. In this scheme, the sender Alice should perform m two-particle GBS measurements on her 2m qudits, and the controllers also take GBS measurements on their qudits and transfer their quantum information to the receiver with entanglement swapping if the agents cooperate. We discuss two topological structures for this quantum state sharing scheme, a dispersive one and a circular one. The former is better at the aspect of security than the latter as it requires the number of the agents who should cooperate for recovering the quantum secret larger than the other one.  相似文献   

9.
In this paper, we explicitly present a general scheme for controlled quantum teleportation of an arbitrary multi-qudit state with unit fidelity and non-unit successful probability using d-dimensional nonmaximally entangled GHZ states as the quantum channel and generalized d-dimensional Bell states as the measurement basis. The expression of successful probability for controlled teleportation is present depending on the degree of entanglement matching between the quantum channel and the generalized Bell states. And the formulae for the selection of operations performed by the receiver are given according to the results measured by the sender and the controller.   相似文献   

10.
Quantum teleportation is one of the most important subjects in quantum information science. This is because quantum teleportation can be regarded as not only quantum information transfer but also a building block for universal quantum information processing. Furthermore, deterministic quantum information processing is very important for efficient processing and it can be realized with continuous-variable quantum information processing. In this review, quantum teleportation for continuous variables and related quantum information processing are reviewed from these points of view.  相似文献   

11.
We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept resend attacks. Furthermore, it is eifficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the etfficiency of the protocol.  相似文献   

12.
We explicitly present a scheme for quantum state sharing of an arbitrary multiqubit state using nonmaximally entangled GHZ states as the quantum channel and generalized Bell states as the measurement basis. The scheme succeeds only probabilistically with its total success probability depending on the degree of entanglement matching between the quantum channel and the generalized Bell states. Security of the scheme is guaranteed by the fact that attacks of an outside eavesdropper or/and an inside dishonest party will inevitably introduce detectable errors.  相似文献   

13.
Quantum Key Distribution against Trojan Horse Attacks   总被引:1,自引:0,他引:1       下载免费PDF全文
蔡庆宇  吕桦 《中国物理快报》2007,24(5):1154-1157
Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.  相似文献   

14.
A.D. dSouza  A.T. Avelar  B. Baseia 《Physica A》2009,388(7):1331-1336
We consider recent schemes [J.M. Liu, B. Weng, Physica A 367 (2006) 215] to teleport unknown atomic states and superposition of zero- and two-photon states using the two-photon Jaynes-Cummings model. Here we do the same using the “full two-photon Jaynes-Cumming”, valid for arbitrary average number of photons. The success probability and fidelity of this teleportation are also considered.  相似文献   

15.
Since the original Cai-Li protocol [Chin. Phys. Lett. 21 (2004)601] can be used only in an ideal quantum communication, we present the modified Cai-Li protocol that can be used in the a noisy quantum channel by using Calderbank-Shor-Steane (CSS) codes to correct errors. We also give a tight bound on the connection between information Eve eavesdropped with a measurement attack in line B → A and detection probability,which shows that the Cai-Li protocol can be used as a quasisecure direct quantum communication.  相似文献   

16.
17.
We report a practical non-postselection entanglement concentration scheme in which a maximally entangled Bell-state photon pair is produced from two pairs of partially (or non-maximally) entangled photons. Since this scheme is built only upon linear optical elements and does not require photon-number resolving detectors, it has immediate applications in experimental implementations of various quantum information protocols which require two-photon Bell-states.  相似文献   

18.
Polarization entangled photon pairs are easily perturbed in noisy channels. We propose a polarization entanglement purification method using temporal degree of freedom, followed by the conventional iterative purification. The entanglement fidelity can be improved to any degree, and the steps needed are less than those using conventional iteration method.  相似文献   

19.
Tensor representation in teleportation and controlled teleportation   总被引:1,自引:0,他引:1  
We propose the tensor representation of teleportation and controlled teleportation. By using this representation, it is easy to describe the process of teleporting an unknown N-qubit state via a genuine 2N-qubit channel, and to find the necessary and sufficient condition of realizing a successful teleportation (which is determined by the measurement matrix Tα and the quantum channel parameter matrix X). For controlled teleportation, if composing tensor representation with graph, one can easily design any kind of controlled teleportation. As examples, we give a scheme of symmetrically controlled teleportation of two-qubit states and a scheme of representative network controlled of three-qubit states. This method can also be generalized to the controlled teleportation of N-qubit states.  相似文献   

20.
Two schemes for sharing an arbitrary two-qubit state based on entanglement swapping are proposed with Bell-state measurements and local unitary operations. One is based on the quantum channel with four Einstein-Podolsky-Rosen (EPR) pairs shared in advance. The other is based on a circular topological structure, i.e., each user shares an EPR pair with his neighboring one. The advantage of the former is that the construction of the quantum channel between the agents is controlled by the sender Alice, which will improve the security of the scheme. The circular scheme reduces the quantum resource largely when the number of the agents is large. Both of those schemes have the property of high efficiency as almost all the instances can be used to split the quantum information. They are more convenient in application than the other schemes existing as they require only two-qubit entanglements and two-qubit joint measurements for sharing an arbitrary two-qubit state.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号