首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
We present an efficient scheme for sharing an arbitrary m-qubit state with n agents. In our scheme, the sender Alice first shares m Bell states with the agent Bob, who is designated to recover the original m-qubit state. Furthermore, Alice introduces n- 1 auxiliary particles in the initial state |0), applies Hadamard (H) gate and Controlled-Not (CNOT) gate operations on the particles, which make them entangled with one of m particle pairs in Bell states, and then sends them to the controllers (i.e., other n - 1 agents), where each controller only holds one particle in hand. After Alice performing m Bell-basis measurements and each controller a single-particle measurement, the recover Bob can obtain the original unknown quantum state by applying the corresponding local unitary operations on his particles. Its intrinsic efficiency for qubits approaches 100%, and the total efficiency really approaches the maximal value.  相似文献   

2.
The security of the multiparty quantum secret sharing protocol proposed by Gao [G. Gao, Commun. Theor. Phys. 52 (2009) 421] is analyzed. It is shown that this protocol is vulnerable since the agents' imperfect encryption scheme can be attacked by a powerful participant. We introduce a attack strategy called participant forcible manipulation and analyze the information leakage in this protocol under this attack. At last, we give an improved version of the original protocol. The improved protocol is robust and has the same efficiency as the original one.  相似文献   

3.
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.  相似文献   

4.
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed.  相似文献   

5.
We present a two-photon three-dimensional multiparty quantum secret sharing scheme. The secret messages are encoded by performing local operations. This is different from those quantum secret sharing protocols that all sharers must make a state measurement. The merit of our protocol is the high capacity.  相似文献   

6.
A theoretical protocol of quantum dialogue is proposed, which uses a class of three-photon W states as quantum channel. After two-step security check, four-bit secret message can be transmitted to each other by transmitting of single photon with the aid of two-bit classical information.  相似文献   

7.
林崧 《理论物理通讯》2010,(6):1059-1061
In a recent letter [H.F. Wang, X. Ji, and S. Zhang, Phys. Lett. A 358 (2006) 11], an improvement of the multiparty quantum secret splitting and quantum state sharing protocol [F.G. Deng, et al., Phys. Lett. A 354 (2006) 190.] was presented. We study the security of the improved protocol and find that two or more dishonest participants may recover the secret from the dealer. Hence we further modify the improved protocol, which make it stand against this kind of attack.  相似文献   

8.
We present a novel protocol for deterministic secure quantum communication by using the lour-qubit cluster state as quantum channel. It is shown that two legitimate users can directly transmit the secret messages based on Bellbasis measurements and classical communication. The present protocol makes use of the ideas of block transmission and decoy particle checking technique. It has a high capacity as each cluster state can carry two 5its of information, and has a high intrinsic efficieney 5ecause almost all the instances except the decoy checking particles (its numSer is negligible) are useful. Furthermore, this protocol is feasible with present-day technique.  相似文献   

9.
A four-party scheme is put forward for a sender to partition arbitrary single-qubit information among three receivers by utilizing a class of asymmetric four-qubit W state as quantum channels. In the scheme the sender's quantum information can be recovered by the three receivers if and only if they collaborate together. Specifically, they collaborate to perform first two different 2-qubit collective unitary operations and then a single-qubit unitary operation. The scheme is symmetric and (3, 3)-threshold with regard to the reconstruction, for any receiver can be assigned to conclusively recover the quantum information with the other two's assistances.  相似文献   

10.
许鹏  王栋  叶柳 《中国物理 B》2013,(10):119-124
We investigate the quantum characteristics of a three-particle W-class state and reveal the relationship between quan- tum discord and quantum entanglement under decoherence. We can also identify the state for which discord takes a maximal value for a given decoherence factor, and present a strong bound on quantum entanglement-quantum discord. In contrast, a striking result will be obtained that the quantum discord is not always stronger than the entanglement of formation in the case of decoherence. Furthermore, we also theoretically study the variation trend of the monogamy of quantum correlations for the three-particle W-class state under the phase flip channel, and find that the three-particle W-class state could transform from polygamous into monogamous, owing to the decoherence.  相似文献   

11.
A scheme for implementing discrete quantum Fourier transform is proposed via quantum dots embedded in a microcavity, and then some of its applications are investigated, i.e., Deutsch 3ozsa. algorithm and Shor's quantum factoring. In particular, the detailed process of implementing one~qubit Deutsch Jozsa algorithm and the factorization of N = 15 are given. The microcavity mode is only virtually excited in the whole interaction, so the effective decoherent has slight effect on the current scheme. These schemes would be an important step to fabricate a solid quantum computer.  相似文献   

12.
Y and inverted Y-type four-level schemes for optical quantum coherence systems, which may be intuitively considered to be very simple, have not been studied intensively till now. In this paper, we present the multiformity of these two types of schemes by considering that they can be classified into nine possible level styles as the second-order sub-schemes using laser fields. Further we point out the complexity of their more than one hundred realistic configurations as the third-order four-level sub-schemes that may appear in the optical quantum coherence experiments. Throughout this paper we review which configurations have been studied in some research aspects and which ones not, according to our knowledge, in order to be propitious to next steps of theoretical and experimental investigations, especially for applications in the fields of quantum optics, quantum information science, laser spectroscopy, and so on.  相似文献   

13.
付向群  鲍皖苏  李发达  张宇超 《中国物理 B》2014,23(2):20306-020306
Since the difficulty in preparing the equal superposition state of amplitude is 1/√N, we construct a quantile transform of quantum Fourier transform (QFT) over ZN based on the elementary transforms, such as Hadamard transform and Pauli transform. The QFT over Z_N can then be realized by the quantile transform, and used to further design its quantum circuit and analyze the requirements for the quantum register and quantum gates. However, the transform needs considerable quantum computational resources and it is difficult to construct a high-dimensional quantum register. Hence, we investigate the design of t-bit quantile transform, and introduce the definition of t-bit semiclassical QFT over Z_N. According to probability amplitude, we prove that the transform can be used to realize QFT over ZN and further design its quantum circuit. For this transform, the requirements for the quantum register, the one-qubit gate, and two-qubit gate reduce obviously when compared with those for the QFT over Z_N.  相似文献   

14.
In this paper, we study a quantum anti-Zeno effect (QAZE) purely induced by repetitive measurements for an artificial atom interacting with a structured bath. This bath can be artificially realized with coupled resonators in one dimension and possesses photonic band structure like Bloeh electron in a periodic potential. In the presence of repetitive measurements, the pure QAZE is discovered as the observable decay is not negligible even for the atomic energy level spacing outside of the energy band of the artificial bath. If there were no measurements, the decay would not happen outside of the band. In this sense, the enhanced decay is completely induced by measurements through the relaxation channels provided by the bath. Besides, we also discuss the controversial golden rule decay rates originated from the van Hove's singularities and the effects of the counter-rotating terms.  相似文献   

15.
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator.  相似文献   

16.
Metric of States     
MA Zhi-Hao 《理论物理通讯》2008,50(11):1069-1070
Metric of quantum states plays an important role in quantum information theory. In this letter, we find the deep connection between quantum logic theory and quantum information theory. Using the method of quantum logic, we can get a famous inequality in quantum information theory, and we answer a question raised by S. Gudder.  相似文献   

17.
The full-core plus correlation method with multi-configuration interaction wave functions is extended to the calcu- lation of the non-relativistic energies of ls2nd (n ≤9) states for the lithium isoelectronic sequence from Z = 11 to 20. Relativistic and mass-polarization effects on the energy are calculated as the first-order perturbation correction. The quantum-electrodynamics correction is also included. The fine structure splittings are determined from the expectation values of spin-orbit and spin-other-orbit interaction operators in the Pauli-Breit approximation. Combining the term energies of lowly excited states obtained with the quantum defects calculated by the single channel quantum defect theory, each of which is a smooth function of energy and approximated by a weakly varying function of energy, the ion potentials of highly excited states (n ≥ 6) are obtained with the semi-empirical iteration method. The results are compared with experimental data in the literature and found to be closely consistent with the regularity.  相似文献   

18.
In this paper we propose a scheme for transferring quantum states and preparing quantum networks. Compared with the previous schemes, this scheme is more efficient, since three or four-dimensional quantum states can be transferred with a single step and information interchange of three-dimensional quantum states can be realized, which is a significant improvement. It is based on the resonant interaction of a three-mode cavity field with an atom. As a consequence, the interaction time is shortened greatly. Furthermore, we give some discussions about the feasibility of the scheme.  相似文献   

19.
In this paper, we derive the explicit transformations of the optimal 1 → 3, 4, 5 phase-covariant cloning in three dimensions, and then generalize them to the cases of 1 → M = 3n, 3n + 1, 3n + 2(n ≥ 1 integer) cloning. The clone fidelities are coincident with the theoretical bounds found.  相似文献   

20.
Based on the quantum Vlasov equation, the effect of frequency chirp on electron-positron pair production is investigated. The cycle parameter, which characterizes the laser field cycle degree within the pulse, is also considered. In both supercycle and subcycle laser pulses the frequency chirp can greatly enhance the momentum distribution function of created pairs and the pair number density. The pair number density created by a supercycle laser pulse is larger than that by a subcycle pulse under the same laser frequency and chirping. There exists an optimal cycle parameter corresponding to the maximum value of the created pair number density for different chirp rates. It is found that the pair number density is sensitive/insensitive to chirping rate when the cycle parameter lies below/above the optimal one.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号