共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
《Physics letters. A》2020,384(15):126301
The entanglement swapping protocol is analyzed in a relativistic setting, where shortly after the entanglement swapping is performed, a Bell test is performed. For an observer in the laboratory frame, a Bell violation is observed between the qubits with the swapped entanglement. In a moving frame, the order of the measurements is reversed, and a Bell violation is observed even though the particles are not entangled, directly or indirectly, or at any point in time. Although the measurement results are identical, the wavefunctions for the two frames are starkly different — one is entangled and the other is not. Furthermore, for boosts in a perpendicular direction, in the presence of decoherence, we show that the maximum Bell violation can occur across non-simultaneous points in time. This is a signature of entanglement that is spread across both space and time, showing both non-local and non-simultaneous aspects of entanglement. 相似文献
3.
Based on entanglement swapping, a scheme for the secret sharing of an arbitrary
two-particle entangled state is proposed. If the controllers do not co-operate
with the eavesdropper, the eavesdropper's successful probability decreases with the
number of the controllers increasing.
In addition,
only the Bell-state measurements are
required to realize the secret sharing scheme. 相似文献
4.
Hierarchical simultaneous entanglement swapping for multi-hop quantum communication based on multi-particle entangled states 下载免费PDF全文
Entanglement swapping is a key technology for multi-hop communication based on entanglement in quantum networks. However, the end-to-end delay of the traditional sequential entanglement swapping (SEQES) grows rapidly withthe increase of network scale. To solve this problem, we first propose a low-delay multi-particle simultaneous entanglementswapping (SES) scheme to establish the remote four-particle Greenberger–Horne–Zeilinger (GHZ) channel states for thebidirectional teleportation of three-particle GHZ states, in which the intermediate nodes perform Bell state measurements,send the measurement results and the Bell state type to the user node Bob (or Alice) through classical channel simultaneously. Bob (or Alice) only needs to carry out a proper unitary operation according to the information he (or she) hasreceived. Further, we put forward a hierarchical simultaneous entanglement swapping (HSES) scheme to reduce the classical information transmission cost, which is composed of level-1 SES and level-2 SES (schemes). The former is an innersegment SES, and the latter is an inter segments SES. Theoretical analysis and simulation results show the HSES can obtainthe optimal performance tradeoff between end-to-end delay and classical cost. 相似文献
5.
A quantum dialogue network is constructed, which uses GHZ states as quantum channel. As its application, a quantum dialogue protocol using entanglement swapping is presented. If the network is safe, any two users in the network can communicate under the control of the other users. 相似文献
6.
7.
8.
To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a novel dynamic quantum secret sharing protocol. The new protocol can not only resist some typical attacks, but also be more efficient than the existing protocols. Furthermore, we take advantage of the protocol to establish the dynamic secret sharing of a quantum state protocol for two-particle maximum entangled states. 相似文献
9.
The security of quantum secret sharing based on entanglement
swapping is revisited and a participant attack is presented. In this
attack two dishonest agents together can illegally recover the
secret quantum state without the help of any other controller, and
it will not be detected by any other users. Furthermore, by
modifying the distribution process of particles and adding a
detection step after each distribution process, we propose an
improved protocol which can resist this kind of attack. 相似文献
10.
A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations(corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed.An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. 相似文献
11.
An arbitrated quantum signature scheme based on entanglement swapping with signer anonymity 下载免费PDF全文
<正>In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed.In this scheme a message to be signed is coded with unitary operators.Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message.Combining the entangled states generated by the TTP’s Bell measurement with the signature information,the verifier can verify the authentication of a signature through a single quantum state measurement.Compared with previous schemes,our scheme is more efficient and less complex, furthermore,our scheme can ensure the anonymity of the signer. 相似文献
12.
分析经典选择重传自动请求重传(automatic repeat-request,ARQ)协议之后,利用量子力学中纠缠态的非定域关联性,提出了数据链路层的选择重传ARQ量子同步通信协议.该协议把链路分为准备阶段和发送阶段.在线路准备阶段完成EPR (Einstein-Podolsky-Rosen)关联对的分发,建立量子信道;在发送阶段完成数据帧和量子确认帧的传送.从吞吐量和信道利用率等方面比较分析了几种常见的数据链路层通信协议的性能.研究表明,该协议可以有效地提高数据链路层的最大吞吐量和信道利用率,改善选择重传ARQ协议的性能,在受时间瓶颈限制的通信中有着重要的应用价值. 相似文献
13.
分析经典选择重传自动请求重传(automatic repeat-request,ARQ)协议之后,利用量子力学中纠缠态的非定域关联性,提出了数据链路层的选择重传ARQ量子同步通信协议.该协议把链路分为准备阶段和发送阶段.在线路准备阶段完成EPR(Einstein-Podolsky-Rosen)关联对的分发,建立量子信道;在发送阶段完成数据帧和量子确认帧的传送.从吞吐量和信道利用率等方面比较分析了几种常见的数据链路层通信协议的性能.研究表明,该协议可以有效地提高数据链路层的最大吞吐量和信道利用率,改善选择重传ARQ协议的性能,在受时间瓶颈限制的通信中有着重要的应用价值. 相似文献
14.
We propose a simple geometrical approach for finding robustness of entanglement for Bell decomposable states of two-qubit quantum systems. It is shown that for these states robustness is equal to the concurrence. We also present an analytical expression for two separable states that wipe out all entanglement of these states. Random robustness of these states is also obtained. We also obtain robustness of a class of states obtained from Bell decomposable states via some special local operations and classical communications (LOCC).Received: 28 October 2002, Published online: 5 August 2003PACS:
03.65.Ud Entanglement and quantum nonlocality (e.g. EPR paradox, Bell's inequalities, GHZ states, etc.) 相似文献
15.
Sangouard N Sanguinetti B Curtz N Gisin N Thew R Zbinden H 《Physical review letters》2011,106(12):120403
We show that an entanglement swapping operation performed with spontaneous parametric down-conversion can be made faithful without postselection using sum-frequency generation. This invites us to revisit the sum-frequency process and from a proof-of-principle experiment, we demonstrate that it provides a realistic solution for nonlinear optics at the single-photon level. This opens the way to attractive alternatives to six-photon protocols based on linear optics used, e.g., for the heralded creation of maximally entangled pairs or for device-independent quantum key distribution. 相似文献
16.
ChuanMei Xie YiMin Liu JianLan Chen XiaoFeng Yin ZhanJun Zhang 《中国科学:物理学 力学 天文学(英文版)》2016,59(10):100314
In this paper, the issue of swapping quantum entanglements in two arbitrary biqubit pure states via a local bipartite entangledstate projective measure in the middle node is studied in depth, especially with regard to quantitative aspects. Attention is mainly focused on the relation between the measure and the final entanglement obtained via swapping. During the study, the entanglement of formation (EoF) is employed as a quantifier to characterize and quantify the entanglements present in all involved states. All concerned EoFs are expressed analytically; thus, the relation between the final entanglement and the measuring state is established. Through concrete analyses, the measure demands for getting a certain amount of a final entanglement are revealed. It is found that a maximally entangled final state can be obtained from any two given initial entangled states via swapping with a certain probability; however, a peculiar measure should be performed. Moreover, some distinct properties are revealed and analyzed. Such a study will be useful in quantum information processes. 相似文献
17.
Transfer of entangled state, entanglement swapping and quantum information processing via the Rydberg blockade 下载免费PDF全文
We provide a scheme with which the transfer of the entangled state and the entanglement swapping can be realized in a system of neutral atoms via the Rydberg blockade. Our idea can be extended to teleport an unknown atomic state. According to the latest theoretical research of the Rydberg excitation and experimental reports of the Rydberg blockade effect in quantum information processing, we discuss the experimental feasibility of our scheme. 相似文献
18.
In this paper, only Bell states are
employed and needed to be identified to realize the multiparty
secret sharing of quantum information, where the secret is an
arbitrary unknown quantum state in a qubit. In our multiparty
quantum information secret sharing (QISS) scheme, no subset of all
the quantum information receivers is sufficient to reconstruct the
unknown state in a qubit but the entire is. The present multiparty
QISS scheme is more feasible with present-day technique. 相似文献
19.
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden rule.In the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary transformations.The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations.To accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this paper.The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility.Moreover,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service attack.To improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states. 相似文献