首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We consider a one-dimensional array of L identical coupled cavities, and each cavity is doped with a two-level qubit. Experimentally, it has been developed in several varieties by the newest technology. We find that the one-qubit quantum state can be perfectly transferred through the cavity array, and the entanglement between the first two qubits can also be transferred to the last two qubits. In addition, we successfully realized the entangling gate and swap gate in the coupled cavity array.  相似文献   

2.
By constructing the recovery operations of the protocol of remote implementation of partially unknown quantum operation of two qubits [An-Min Wang: Phys. Rev. A 74 (2006) 032317] with two-qubit Cnot gate and single qubit logic gates, we present a scheme to implement it in cavity QED. Long-lived Rydberg atoms are used as qubits, and the interaction between the atoms and the field of cavity is a nonresonant one. Finally, we analyze the experimental feasibility of this scheme.  相似文献   

3.
In this paper, we study a quantum anti-Zeno effect (QAZE) purely induced by repetitive measurements for an artificial atom interacting with a structured bath. This bath can be artificially realized with coupled resonators in one dimension and possesses photonic band structure like Bloeh electron in a periodic potential. In the presence of repetitive measurements, the pure QAZE is discovered as the observable decay is not negligible even for the atomic energy level spacing outside of the energy band of the artificial bath. If there were no measurements, the decay would not happen outside of the band. In this sense, the enhanced decay is completely induced by measurements through the relaxation channels provided by the bath. Besides, we also discuss the controversial golden rule decay rates originated from the van Hove's singularities and the effects of the counter-rotating terms.  相似文献   

4.
When the nonlinearity of nanomechanical resonator is not negligible,the quantum decoherence of charge qubit is studied analytically.Using nonlinear Jaynes–Cummings model,one explores the possibility of being quantum data bus for nonlinear nanomechanical resonator,the nonlinearity destroys the dynamical quantum information-storage and maintains the revival of quantum coherence of charge qubit.With the calculation of decoherence factor,we demonstrate the influence of the nonlinearity of nanomechanical resonator on engineered decoherence of charge qubit.  相似文献   

5.
We propose a new scheme for realizing deterministic quantum state transfer (QST) between two spatially separated single molecule magnets (SMMs) with the framework of cavity quantum eleetrodynamics (QED). In the present scheme, two SMMs are trapped in two spatially separated optical cavities coupled by an optical fiber. Through strictly numerically simulating, we demonstrate that our scheme is robust with respect to the SMMs' spontaneous decay and fiber loss under the conditions of dispersive SMMs-field interaction and strong coupling of cavity fiber. In addition, we also discuss the influence of photon leakage out of cavities and show that our proposal is good enough to demonstrate the generation of QST with high fidelity utilizing the current experimental technology. The present investigation provides research opportunities for realizing QST between solid-state qubits and may result in a substantial impact on the progress of solid-state-based quantum communications network.  相似文献   

6.
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel, quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel  相似文献   

7.
In this paper, we give an efficient physical realization of a double-slit duality quantum gate. Weak cross- Kerr nonlinearity is exploited here. The probability of success can reach 1/2. Asymmetrical slit duality control gate also can be constructed conveniently. The special quantum control gate could be realized easily in optical system by our current experimental technology.  相似文献   

8.
许鹏  王栋  叶柳 《中国物理 B》2013,(10):119-124
We investigate the quantum characteristics of a three-particle W-class state and reveal the relationship between quan- tum discord and quantum entanglement under decoherence. We can also identify the state for which discord takes a maximal value for a given decoherence factor, and present a strong bound on quantum entanglement-quantum discord. In contrast, a striking result will be obtained that the quantum discord is not always stronger than the entanglement of formation in the case of decoherence. Furthermore, we also theoretically study the variation trend of the monogamy of quantum correlations for the three-particle W-class state under the phase flip channel, and find that the three-particle W-class state could transform from polygamous into monogamous, owing to the decoherence.  相似文献   

9.
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.  相似文献   

10.
We investigate the characteristics of three kinds of quantum correlations, measured by pairwise quantum discord (QD), geometric measure of quantum discord (GMQD), and measurement-induced disturbance (MID), in the systems of three- and four-dipole arrays. The influence of the temperature on the three quantum correlations and entanglement of the systems is also analyzed numerically. It is found that novel quantum correlation switches called QD, GMQD, and MID respectively can be constructed with the qubits consisting of electric dipoles coupled by the dipole-dipole interaction and oriented along or against the external electric field. Moreover, with the increase of temperature, QD, GMQD, and MID are more robust than entanglement against the thermal environment. It is also found that for each dipole pair of the three- and four-dipole arrangements, the MID is always the largest and the GMQD the smallest.  相似文献   

11.
A scheme for implementing discrete quantum Fourier transform is proposed via quantum dots embedded in a microcavity, and then some of its applications are investigated, i.e., Deutsch 3ozsa. algorithm and Shor's quantum factoring. In particular, the detailed process of implementing one~qubit Deutsch Jozsa algorithm and the factorization of N = 15 are given. The microcavity mode is only virtually excited in the whole interaction, so the effective decoherent has slight effect on the current scheme. These schemes would be an important step to fabricate a solid quantum computer.  相似文献   

12.
Y and inverted Y-type four-level schemes for optical quantum coherence systems, which may be intuitively considered to be very simple, have not been studied intensively till now. In this paper, we present the multiformity of these two types of schemes by considering that they can be classified into nine possible level styles as the second-order sub-schemes using laser fields. Further we point out the complexity of their more than one hundred realistic configurations as the third-order four-level sub-schemes that may appear in the optical quantum coherence experiments. Throughout this paper we review which configurations have been studied in some research aspects and which ones not, according to our knowledge, in order to be propitious to next steps of theoretical and experimental investigations, especially for applications in the fields of quantum optics, quantum information science, laser spectroscopy, and so on.  相似文献   

13.
I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th~ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack.  相似文献   

14.
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator.  相似文献   

15.
Here in this letter, we study the difference between quantum and classical deletion. We point out that the linear mapping deletion operation used in the impossibility proof for quantum systems applies also to classical system. The general classical deletion operation is a combined operation of measurement and transformation, i.e., first read the state and then transfer the state to the standard blank state. Though both quantum information and classical information can be deleted in an open system, quantum information cannot be recovered while classical information can be recovered.  相似文献   

16.
The security of the multiparty quantum secret sharing protocol proposed by Gao [G. Gao, Commun. Theor. Phys. 52 (2009) 421] is analyzed. It is shown that this protocol is vulnerable since the agents' imperfect encryption scheme can be attacked by a powerful participant. We introduce a attack strategy called participant forcible manipulation and analyze the information leakage in this protocol under this attack. At last, we give an improved version of the original protocol. The improved protocol is robust and has the same efficiency as the original one.  相似文献   

17.
In this paper we study the bilayer quantum Hall (QH) effect on a noncommutative phase space (NCPS). By using perturbation theory, we calculate the energy spectrum, eigenfunction, Hall current, and Hall conductivity of the bilayer QH system, and express them in terms of noncommutative parameters θ and θ^-, respectively. In our calculation, we assume that these parameters vary from laver to laver.  相似文献   

18.
A theoretical scheme of quantum secure communication using a class of three-particle W states is proposed. In the scheme, two communicators may communicate after they test the security of the quantum channel. The receiver can obtain the secret message determinately if the quantum channel is safe. The present scheme can be realized without using teleportation.  相似文献   

19.
A theoretical protocol of quantum dialogue is proposed, which uses a class of three-photon W states as quantum channel. After two-step security check, four-bit secret message can be transmitted to each other by transmitting of single photon with the aid of two-bit classical information.  相似文献   

20.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号