首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, a quantum secure direct communication protocol using ensembles with the same density matrix is proposed. The two communication parties can realize the message transmission using this method through a quantum channel, each bit of information can be transmitted using an ensemble and read out through global measurement. The eavesdropping behavior can be detected through the channel diagnoses.  相似文献   

2.
讨论了密度矩阵的不同定义。建议使用完全密度矩阵、压缩密度矩阵和约化密度矩阵分别描写一个封闭量子体系的、一个系综中平均分子的和一个复合体系中的一个子系统的密度矩阵。强调这与现在人们认为的具有相同压缩密度矩阵的系综是完全等价的结论完全不同,具有相同压缩密度矩阵但是成分不同的系综可以通过系综整体测量来区别。作为一个应用,现在认为现有的核磁共振量子计算中没有纠缠的结论是没有根据的。Density matrix is one important tool in quantum mechanics, and it has very broad applications. However there are different definitions about the density matrix, and they describe quite different systems. There has been some misunderstanding about the density matrix in the community, and these misunderstandings hinder the right application of the density matrix. In this article, we discuss the different definitions of density matrix. We suggest to use the full density matrix, compressed density matrix and the reduced density matrix to describe the state of a complete quantum system, the state of an averaged particle in an ensemble and the state of part of a composite system. We stress that contrary to the wide accepted understanding that ensembles with the same compressed density matrix are physically indistinguishable, they are distinguishable through the so-called ensemble measurement. As an application, we suggest that the present conclusion that the present-day nuclear magnetic resonance quantum computation does not have quantum entanglement is groundless.  相似文献   

3.
We clarify different definitions of the density matrix by proposing the use of different names, the full density matrix for a single-closed quantum system, the compressed density matrix for the averaged single molecule state from an ensemble of molecules, and the reduced density matrix for a part of an entangled quantum system, respectively. We show that ensembles with the same compressed density matrix can be physically distinguished by observing fluctuations of various observables. This is in contrast to a general belief that ensembles with the same compressed density matrix are identical. Explicit expression for the fluctuation of an observable in a specified ensemble is given. We have discussed the nature of nuclear magnetic resonance quantum computing. We show that the conclusion that there is no quantum entanglement in the current nuclear magnetic resonance quantum computing experiment is based on the unjustified belief that ensembles having the same compressed density matrix are identical physically. Related issues in quantum communication are also discussed.  相似文献   

4.
It has been claimed in the literature that impossibility of faster-than-light quantum communication has an origin of indistinguishability of ensembles with the same density matrix. We show that the two concepts are not related. We argue that even with an ideal single-atom-precision measurement, it is generally impossible to produce two ensembles with exactly the same density matrix; or to produce ensembles with the same density matrix, classical communication is necessary. Hence the impossibility of faster-than-light communication does not imply the indistinguishability of ensembles with the same density matrix.  相似文献   

5.
It has been claimed in the literature that impossibility of faster-than-light quantum communication has an origin of indistinguishability of ensembles with the same density matrix. We show that the two concepts are not related.We argue that even with an ideal single-atom-precision measurement, it is generally impossible to produce two ensembles with exactly the same density matrix; or to produce ensembles with the same density matrix, classical communication is necessary. Hence the impossibility of faster-than-light communication does not imply the indistinguishability of ensembles with the same density matrix.  相似文献   

6.
7.
We propose two schemes for realizing quantum secure direct communication (QSDC) by using a set of ordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs) as quantum information channels. In the first scheme, the photons from Bob to Alice are transmitted only once. After insuring the security of the quantum channels, Bob encodes the secret message on his photons. Then Alice performs single-photon two-DOF Bell bases measurements on her photons. This scheme has better security than former QSDC protocols. In the second scheme, Bob transmits photons to Alice twice. After insuring the security of the quantum channels, Bob encodes the secret message on his photons. Then Alice performs two-photon Bell bases measurements on each DOF. The scheme has more information capacity than former QSDC protocols.  相似文献   

8.
杨静  王川  张茹 《理论物理通讯》2010,(11):829-834
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.  相似文献   

9.
We present a scheme for quantum secure direct communication, in which the message is encoded by local unitary operations, transmitted through entangled photons, and deduced from both the sender and receiver's local measurement results. In such a scheme, only one pair of entangled photons is consumed, and there is no need to transmit the sender's qubit carrying the secret message in a public channel, in order to transmit two-bit classical information.  相似文献   

10.
We present a scheme for quantum secure direct communication, in which the message is encoded by local unitary operations, transmitted through entangled photons, and deduced from both the sender and receiver's local measurement results. In such a scheme, only one pair of entangled photons is consumed, and there is no need to transmit the sender's qubit carrying the secret message in a public channel, in order to transmit two-bit classical information.  相似文献   

11.
量子安全直接通信研究进展   总被引:1,自引:0,他引:1  
简要地介绍了量子安全直接通信的必要条件,初步介绍了两个量子安全直接通信模型,即Two-Step和Quantum-One-Time-Pad模型。 The requirements of quantum secure direct communication (QSDC) are briefly introduced. Two QSDC schemes i. e. , the Two-Step QSDC scheme and the Quantum-One-Time-Pad QSDC scheme, are discussed in brief.  相似文献   

12.
Recently Xia and Song [Phys. Lett. A 364 (2007) 117] have proposed a controlled quantum secure direct communication (CQSDC) protocol. They claimed that in their protocol only with the help of the controller Charlie, the receiver Alice can successfully extract the secret message from the sender Bob. In this letter, first we will show that within their protocol the controller Charlie's role could have been excluded if it were not for their unreasonable design. We then revise the Xia-Song CQSDC protocol such that its original advantages are reta/ned and the CQSDC can be really realized.  相似文献   

13.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks toauthenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.  相似文献   

14.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

15.
An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bit error rate induced by eavesdropper is 4.17% in C-protocol and 6.25% in Y-protocoL In this paper, another improvement on C-protocol is given. The quantum bit error rate of the eavesdropping will increase to 8.75%, which is 1.1 times larger than that in C-protocol and 0.4 times larger than that in Y-protocol.  相似文献   

16.
我们利用Greenberger-Horne-Zeilinger(GHZ)态,提出了一个控制量子安全直接通讯方案.在方案中,我们不仅分析了这个方案的安全性,而且指出了这个方案可以有效地抵御截取再发送袭击和干扰袭击.  相似文献   

17.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

18.
Multipartite quantum secure direct communication (MQSDC) enables multiple message senders to simultaneously and independently transmit secret messages to a message receiver through quantum channels without sharing keys. Existing MQSDC protocols all assume that all the communication parties are legal, which is difficult to guarantee in practical applications. In this study, a single-photon based three-party QSDC protocol with identity authentication is proposed. In the protocol, the message receiver first authenticates the identity of two practical message senders. Only when the identity authentication is passed, the legal message senders can encode their messages by the hyper-encoding technology. In theory, two bits of messages can be transmitted to the message receiver in a communication round. The protocol can resist the external attack and internal attack, and guarantee the security of the transmitted messages and the identity codes of each legal message sender. The secret message capacity of the protocol is simulated with two-decoy-state method. The maximal communication distance between any two communication parties can reach $\approx$ 31.75 km with weak signal and decoy state pulses. The three-party QSDC protocol can be extended to a general MQSDC protocol and has important application in the further practical MQSDC field.  相似文献   

19.
A quantum secure direct communication protocol over a collective rotating channel is proposed. The protocol encodes logical bits in noiseless subspaces, and so it can function over a quantum channel subjected to an arbitrary degree of collective rotating noise. Although entangled states are used, both the sender and receiver are only required to perform single-particle product measurement or Pauli operations. The protocol is feasible with present-day technique.  相似文献   

20.
A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号