首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 13 毫秒
1.
It is known that all causal correlations between two parties which output each 1 bit, a and b, when receiving each 1 bit, x and y, can be expressed as convex combinations of local correlations (i.e., correlations that can be simulated with local random variables) and nonlocal correlations of the form a+b=xy mod 2. We show that a single instance of the latter elementary nonlocal correlation suffices to simulate exactly all possible projective measurements that can be performed on a maximally entangled state of two qubits, with no communication needed at all. This elementary nonlocal correlation thus defines some unit of nonlocality, which we call a nl bit.  相似文献   

2.
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each receiver keeps a share secretly. If the sender wants to send a secret message M to the receivers, he en-codes the information of K and M on a single photon sequence and sends it to one of the receivers. According to the secret shares, the t receivers sequentially per-form the corresponding unitary operations on the single photon sequence and ob-tain the secret message M. The shared shares may be reusable if it can be judged that there is no eavesdropper in line. We discuss that our protocol is feasible with current technology.  相似文献   

3.
《Physics letters. A》2006,358(4):283-288
In this Letter, we introduce a new cryptosystem by integrating the asymptotic model of deterministic randomness with the one-way coupled map lattice (OCML) system. The key space, the encryption efficiency, and the security under various attacks are investigated. With the properties of deterministic randomness and spatiotemporal dynamics, the new scheme can improve the security to the order of computational precision, even when the lattice size is three only. Meanwhile, all the lattices can be fully utilized to increase the encryption speed.  相似文献   

4.
郭迎  陈志刚  曾贵华 《中国物理》2007,16(9):2549-2556
Based on the techniques of the quantum remote state preparation via a deterministic way, this paper proposes a quantum communication scheme to distribute the secret messages in two phases, i.e., the carrier state checking phase and the message state transmitting phase. In the first phase, the secret messages are encoded by the sender using a stabilizer quantum code and then transmitted to the receiver by implementing three CNOT gates. In the second phase, the communicators check the perfectness of the entanglement of the transmitted states. The messages can be distributed to the receiver even if some of the transmitted qubits are destroyed.  相似文献   

5.
吴双  梁林梅  李承祖 《中国物理》2007,16(5):1229-1232
The loss of a quantum channel leads to an irretrievable particle loss as well as information. In this paper, the loss of quantum channel is analysed and a method is put forward to recover the particle and information loss effectively using universal quantum error correction. Then a secure direct communication scheme is proposed, such that in a loss channel the information that an eavesdropper can obtain would be limited to arbitrarily small when the code is properly chosen and the correction operation is properly arranged.  相似文献   

6.
We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.  相似文献   

7.
We study the entanglement between the internal(coin)and the external(position)degrees of freedom in the dynamic and the static deterministic aperiodic quantum walks(QWs).For the dynamic(static)aperiodic QWs,the coin depends on the time(position)and takes two coins C(α)and C(β)arranged in the two classes of generalized Fibonacci(GF)and the Thue–Morse(TM)sequences.We found that for the dynamic QWs,the entanglement of three kinds of the aperiodic QWs are close to the maximal value,which are all much larger than that of the homogeneous QWs.Further,the first class of GF(1st GF)QWs can achieve the maximum entangled state,which is similar to that of the dynamic disordered QWs.And the entanglement of 1st GF QWs is greater than that of the TM QWs,being followed closely by the entanglement of the second class of GF(2nd GF)QWs.For the static QWs,the entanglement of three kinds of the aperiodic QWs are also close to the maximal value and 1st GF QWs can achieve the maximum entangled state.The entanglement of the TM QWs is between1st GF QWs and 2nd GF QWs.However,the entanglement of the static disordered QWs is less than that of three kinds of the aperiodic QWs.This is different from those of the dynamic QWs.From these results,we can conclude that the dynamic and static 1st GF QWs can also be considered as maximal entanglement generators.  相似文献   

8.
We present a one-step deterministic multipartite entanglement purification scheme for an N-photon system in a Greenberger-Horne-Zeilinger state with linear optical elements. The parties in quantum communication can in principle obtain a maximally entangled state from each N-photon system with a success probability of 100%. That is, it does not consume the less-entangled photon systems largely, which is far different from other multipartite entanglement purification schemes. This feature maybe make this scheme more feasible in practical applications.  相似文献   

9.
We discuss the role of nonclassicality of quantum states as a necessary resource in deterministic generation of multipartite entangled states. In particular for three bilinearly coupled modes of the electromagnetic field, tuning of the coupling constants between the parties allows the total system to evolve into both Bell and GHZ states only when one of the parties is initially prepared in a nonclassical state. A superposition resource is then converted into an entanglement resource.  相似文献   

10.
We experimentally realize a kind of entanglement transformations of bipartite pure states with 100% efficiency. The protocol employs two-outcome positive operator-valued measures (POVMs) and can transform two-photon maximally entangled state to any two-photon entangled pure state with 100% efficiency. The average fidelity of all output states is 96%. Moreover, the scheme to implement arbitrary POVM on single-photon polarization state is also discussed. In principle, our setup can be applied to any kind of entanglement transformations of two-qubit entangled states to achieve optimal successful probability.  相似文献   

11.
Sophisticated quantum search without entanglement   总被引:1,自引:0,他引:1  
The basic principle of entanglement processing says that entanglement cannot increase under local operations and classical communication. Based on this principle, we show that any entanglement measure E suitable for the regime of a high number of identically prepared entangled pairs satisfies ED < or = E < or = EF, where ED and EF are the entanglement of distillation and formation, respectively. Moreover, we exhibit a theorem establishing a very general form of bounds for distillable entanglement.  相似文献   

12.
量子纠缠消相干对确定型远程制备的影响   总被引:1,自引:0,他引:1       下载免费PDF全文
郭振  闫连山  潘炜  罗斌  徐明峰 《物理学报》2011,60(6):60301-060301
研究了两种典型的量子纠缠消相干现象对确定型量子态远程制备方案的影响.首先对该确定型远程制备方案进行了分析,得到该方案确定性和比特消耗情况; 然后通过分析制备过程中纠缠消相干现象对系统的影响得出: 在极化消相干过程中,该系统保真度与目标量子比特在Bloch球上的经度选择无关,仅与目标比特的纬度和消相干的大小有关;在相位消相干中,该系统的保真度不会受到消相干的影响,仅与目标量子态的纬度相关. 关键词: 远程制备 纠缠消相干 通信消耗 保真度  相似文献   

13.
《Physics letters. A》2003,310(4):247-251
After analysing the main quantum secret sharing protocol based on the entanglement states, we propose an idea to directly encode the qubit of quantum key distributions, and then present a quantum secret sharing scheme where only product states are employed. As entanglement, especially the inaccessible multi-entangled state, is not necessary in the present quantum secret sharing protocol, it may be more applicable when the number of the parties of secret sharing is large. Its theoretic efficiency is also doubled to approach 100%.  相似文献   

14.
In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication is that DSQC requires the two parties exchange at least one bit of classical information for reading out the message in each qubit, and QSDC does not. They are attractive because they are deterministic, in particular, the QSDC protocol is fully quantum mechanical. With sophisticated quantum technology in the future, the QSDC may become more and more popular. For ensuring the safety of QSDC with single photons and quantum information sharing of single qubit in a noisy channel, a quantum privacy amplification protocol has been proposed. It involves very simple CHC operations and reduces the information leakage to a negligible small level. Moreover, with the one-party quantum error correction, a relation has been established between classical linear codes and quantum one-party codes, hence it is convenient to transfer many good classical error correction codes to the quantum world. The one-party quantum error correction codes are especially designed for quantum dense coding and related QSDC protocols based on dense coding.   相似文献   

15.
Deterministic secure direct communication using entanglement   总被引:3,自引:0,他引:3  
A novel secure communication protocol is presented, based on an entangled pair of qubits and allowing asymptotically secure key distribution and quasisecure direct communication. Since the information is transferred in a deterministic manner, no qubits have to be discarded. The transmission of information is instantaneous, i.e., the information can be decoded during the transmission. The security against arbitrary eavesdropping attacks is provided. In case of eavesdropping attacks with full information gain, the detection rate is 50% per control transmission. The experimental realization of the protocol is feasible with relatively small effort, which also makes commercial applications conceivable.  相似文献   

16.
A communication channel is a physical system that transfers information from one place to another. Examples of communication channels include wires, optical fibers, and chains of spins that propagate spin waves through a medium. This Letter shows that the power-limited communication capacity of a multimode optical fiber or a set of parallel spin chains can be enhanced by introducing nonlinear couplings between the modes or chains. In particular, M coupled, entangled modes can send M bits in the same time it takes a single mode to send a single bit, and in the same time it takes M uncoupled, unentangled modes to send sqrt[M] bits.  相似文献   

17.
This paper investigates a reconfigurable intelligent surface (RIS)-aided underlay cognitive radio (CR) multiple-input multiple-output (MIMO) wiretap channel where the secondary transmitter (ST) communicates with primary user (PU) and secondary user (SU) in the absence of the eavesdropper’s (Eve’s) channel state information (CSI). To enhance the secrecy performance in CR MIMO wiretap channel, the power of useful signal is minimized at ST, and then the residual power is further utilized to design artificial noise (AN) based on statistical CSI at ST. Specifically, we first optimize the transmit covariance matrix at ST and the diagonal phase-shifting matrix at RIS jointly leveraging large-system approximation results. Then the power allocation for SU is optimized to obtain the minimum transmit power of useful information at ST. Besides, we further design AN with the residual power by aligning it into the null space of the SU channel and thus avert the harmful effects of AN to improve the secure communication quality of SU. Finally, through numerical simulations, we illustrate the effectiveness of the proposed algorithm and validate the existence of a trade-off between the quality-of-service (QoS) at SU and secrecy rate.  相似文献   

18.
印娟  钱勇  李晓强  包小辉  彭承志  杨涛  潘阁生 《物理学报》2011,60(6):60308-060308
设计了适用于远距离量子通信实验的高维纠缠源.利用连续激光器抽运产生了极化-时间两体四维纠缠光子对,在抽运功率20 mW下测到每秒700对符合,保真度为89%±3%.相比已有的高维纠缠源,在本文中发展的源具有传输便利、相位稳定性好等优点,适用于未来远距离高维量子通信实验和量子力学基本问题实验检验,如远距离高维量子密码实验、两粒子Greenberger-Horne-Zeilinger定理检验、两粒子量子赝"心灵感应"(quantum pseudo telepathy)实验演示等. 关键词: 高维纠缠 极化纠缠 时间箱纠缠 量子通信  相似文献   

19.
The key agreement protocols allow two or more users to negotiate a shared key for establishing a secure communication channel without a third trusted party in such a way that the shared key is determined by all authorized players rather than any subset of them. We propose the first real multiparty semiquantum key agreement(SQKA) protocols based on single-photons. Our protocols include only one quantum player, while the others are classical players who only need to measure and prepare states in the classical basis. We first present a symmetric three-party SQKA protocol,where two classical players can fairly negotiate a key with a quantum player by using single-photons as message carriers. Then we present an asymmetric SQKA protocol where a relatively low percentage of quantum states are used for eavesdropping detection. And we further extend them to an asymmetric multiparty SQKA protocol. Our SQKA protocols require fewer quantum resources than the previous SQKA protocols for classical players, especially without requirement of entanglement,which makes them easier to implement using current technologies. Our protocols are secure against external eavesdroppers and are fair against a minority of internal dishonest players.  相似文献   

20.
张闻钊  李文东  史鹏  顾永建 《物理学报》2011,60(6):60303-060303
在Nielsen定理和纠缠浓缩基本思想的基础上,对从2对非最大纠缠粒子中提取1对最大纠缠粒子的确定性纠缠浓缩协议进行了简化和改进,从而建立了一个从3对非最大纠缠粒子中提取2对最大纠缠粒子的确定性纠缠浓缩协议.该协议利用经典通信和局域操作并通过特定的正算符测度来实现,避免了概率性的风险.这有助于n对非最大纠缠粒子中提取k对最大纠缠粒子的确定性纠缠浓缩协议的最终确立.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号