首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 468 毫秒
1.
We present a scheme for probabilistic remote preparation of multi-qubit with three-party from a sender to either of two receivers. The quantum channel is composed of a partial entangled tripartite GHZ state. We obtain the successful totM probability of the scheme in the general case and special case, respectively. We also calculate total classical communication cost required in the RSP process with three-party in the general case and special case, respectively.  相似文献   

2.
We propose a remote state preparation (RSP) scheme of three-particle Greenberger Horne-Zeilinger (GHZ) class states, where quantum channels are composed of two maximally entangled states. With the aid of forward classical bits, the preparation of the original state can be successfully realized with the probability 1/2, the necessary classical communication cost is 0.5 bit on average. If the state to be prepared belongs to some special states, the success probability of preparation can achieve 1 after consuming one extra bit on average. We then generalize this scheme to the case that the quantum channels consist of two non-maximally entangled states.  相似文献   

3.
We present a scheme for probabilistic remote preparation of a tripartite qutrit entangled state with a partial tripartite qutrit entangled state and a partial bipartite qutrit entangled state as the quantum channel. It is found that a bipartite qutrit orthogonal projective measurement, an auxiliary qutrit particle, and the corresponding unitary transformation are required. A scheme for probabilistic remote preparation of a tripartite qudit equatorial entangled state by using a partial tripartite qudit entangled state and a partial bipartite qudit entangled state as the quantum channel is also proposed. We calculate the successful total probability and the total classical communication cost required in the RSP process, respectively.  相似文献   

4.
We propose a protocol for controlled probabilistic teleportation of an unknown tripartite qutrit entangled state with two partial tripartite qutrit entangled states as the quantum channel. It is found that teleportation associated with the generalized qutrit Bell-basis measurement, the generalized qutrit π-state measurement and the generalized Hadamard operator in three-dimensional Hilbert space. We generalize the protocol for controlled probabilistic teleportation of an unknown k-particle qudit entangled state with a multi-particle qudit entangled state and a tripartite qudit entangled state as the quantum channel. We also calculate the classical communication cost required in both cases.  相似文献   

5.
We present a scheme for probabilistic remote preparation of the four-particle entangled W state by using four partial entangled two-particle states as the quantum channel. In this scheme, if Alice (sender) performs four-particle projective measurements and Bob (receiver) adopts some appropriate unitary operation, the remote state preparation can be successfully realized with certain probability. The classical communication cost is also calculated. However, the success probability of preparation can be increased to 1 for four kinds of special states.  相似文献   

6.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitary transformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication.  相似文献   

7.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

8.
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel, quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel  相似文献   

9.
We present a novel protocol for deterministic secure quantum communication by using the lour-qubit cluster state as quantum channel. It is shown that two legitimate users can directly transmit the secret messages based on Bellbasis measurements and classical communication. The present protocol makes use of the ideas of block transmission and decoy particle checking technique. It has a high capacity as each cluster state can carry two 5its of information, and has a high intrinsic efficieney 5ecause almost all the instances except the decoy checking particles (its numSer is negligible) are useful. Furthermore, this protocol is feasible with present-day technique.  相似文献   

10.
Two Avowable Quantum Communication Schemes   总被引:1,自引:0,他引:1  
Two avowable quantum communication schemes are proposed. One is an avowable teleportation protocol based on the quantum cryptography. In this protocol one teleports a set of one-particle states based on the availability of an honest arbitrator, the keys and the Einstein Podolsky-Rosen pairs shared by the communication parties and the arbitrator. The key point is that the fact of the teleportation can neither be disavowed by the sender nor be denied by the receiver. Another is an avowable quantum secure direct communication scheme. A one-way Hash function chosen by the communication parties helps the receiver to validate the truth of the information and to avoid disavowing for the sender.  相似文献   

11.
GAO Gan 《理论物理通讯》2008,50(8):368-370
We propose a quantum superdense coding secure communication scheme by using GHZ state. This scheme combines the ideas of quantum superdense coding and sequence transmission. Its distinct advantage is high source capacity. In addition, in checking eavesdropping, we need not to destroy quantum entanglement.  相似文献   

12.
A theoretical scheme of quantum secure communication using a class of three-particle W states is proposed. In the scheme, two communicators may communicate after they test the security of the quantum channel. The receiver can obtain the secret message determinately if the quantum channel is safe. The present scheme can be realized without using teleportation.  相似文献   

13.
We present a scheme for quantum secure direct communication, in which the message is encoded by local unitary operations, transmitted through entangled photons, and deduced from both the sender and receiver's local measurement results. In such a scheme, only one pair of entangled photons is consumed, and there is no need to transmit the sender's qubit carrying the secret message in a public channel, in order to transmit two-bit classical information.  相似文献   

14.
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed.  相似文献   

15.
I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th~ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack.  相似文献   

16.
By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the "two-step" transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used.  相似文献   

17.
A theoretical protocol of quantum dialogue is proposed, which uses a class of three-photon W states as quantum channel. After two-step security check, four-bit secret message can be transmitted to each other by transmitting of single photon with the aid of two-bit classical information.  相似文献   

18.
杨静  王川  张茹 《理论物理通讯》2010,(11):829-834
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.  相似文献   

19.
The atomic and electronic structures of T1 and In on Si(111) surfaces are investigated using the firstprinciples total energy calculations. Total energy optimizations show that the energetically favored structure is 1/3 ML T1 adsorbed at the T4 sites on Si(111) surfaces. The adsorption energy difference of one T1 adatom between (√3 × √3) and (1 × 1) is less than that of each In adatom. The DOS indicates that TI 6p and Si 3p electrons play a very important role in the formation of the surface states. It is concluded that the bonding of TI adatoms on Si(111) surfaces is mainly polar covalent, which is weaker than that of In on Si(111). So T1 atom is more easy to be migrated than In atom in the same external electric field and the structures of T1 on Si(111) is prone to switch between (√3 × √3) and (1 × 1).  相似文献   

20.
Study on the pre-chopper in CSNS LEBT   总被引:2,自引:0,他引:2  
Physical designing of the pre-chopper in CSNS LEBT is carried out, which includes the deflecting voltage, the length and the width of the deflecting plates, and the gap between the deflecting plates. The most outstanding feature of the design is that both the gap and the width vary with the beam envelope size. So both the requried deflecting voltage and the loaded capacitance are lowered. In order to avoid destruction of the space charge neutralization by the pre-chopper in the whole LEBT, an electron-trapping electrode is arranged to confine the electrostatic field of the pre-chopper to the local area. To examine the reliability of the pre-chopping design in CSNS LEBT, a similar pre-chopping design in ADS RFQ LEBT is set up and an experiment on the pre-chopper is prepared. 3-dimensional simulations are carried out to determine the loaded capacitance and the applied voltage of the electron-trapping electrode.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号