首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information.  相似文献   

2.
Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently, Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution.  相似文献   

3.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitarytransformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication.  相似文献   

4.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitary transformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication.  相似文献   

5.
We propose two schemes for splitting single- and two-qubit states by using four-particle genuine entangled state as the quantum channel. After the sender performs Bell-basis (or three-partite GHZ- basis) measurements on her particles, and the cooperators operate single-particle measurements on their particles, the state receiver can reconstruct the original state of the sender by applying the appropriate unitary operation. In particular, in the scheme for splitting two-qubit state, the receiver needs to introduce an auxiliary particle and carries out a C-NOT operation.  相似文献   

6.
We propose a potential scheme to generate a genuine six-atom entangled state [J. Phys. A 42 (2009) 415301] by using atoms in cavity QED system, where the atoms interact simultaneously with the highly detuned single-mode cavity and the strong classical driving field. Thus our approach is insensitive to both the cavity decay and thermal field.  相似文献   

7.
We propose a potential scheme to generate a genuine six-atom entangled state [J. Phys. A 42 (2009) 415301] by using atoms in cavity QED system, where the atoms interact simultaneously with the highly detuned single-mode cavity and the strong classical driving field. Thus our approach is insensitive to both the cavity decay and thermal field.  相似文献   

8.
A protocol for quantum private comparison of equality (QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party (TP). In our protocol, TP is allowed to misbehave on its own but can not conspire with either of two parties. Compared with most two-user QPCE protocols, our protocol not only can compare two groups of private information (each group has two users) in one execution, but also compare just two private information. Compared with the multi-user QPCE protocol proposed, our protocol is safer with more reasonable assumptions of TP. The qubit efficiency is computed and analyzed. Our protocol can also be generalized to the case of 2N participants with one TP. The 2N-participant protocol can compare two groups (each group has N private information) in one execution or just N private information.  相似文献   

9.
我们提出了一个在三者之间利用四粒子纠缠态作为量子通道实现对任意单粒子态的信息分裂的方案.在我们的方案中,两个接收方之间有且只有在对方提供合作的情况下才能全部获得这个原始信息,而且接收方彼此之间都有同等权限去获得该原始信息,他们获得原始信息的概率是一样的,均为1.  相似文献   

10.
通过介绍六粒子纠缠态的新应用研究,提出了一个二粒子任意态的信息分离方案.在这个方案中,发送者Alice、控制者Charlie和接受者Bob共享一个六粒子纠缠态,发送者先执行两次Bell基测量|然后控制者执行一次Bell基测量|最后接受者根据发送者和控制者的测量结果,对自己拥有的粒子做适当的幺正变换,从而能够重建要发送的二粒子任意态.这个信息分离方案是决定性的,即成功概率为100%.与使用相同的量子信道进行二粒子任意态的信息分离方案相比,本文提出的方案只需要进行Bell基测量而不需要执行多粒子的联合测量,从而使得这个方案更简单、更容易,并且在目前的实验室技术条件下是能够实现的.  相似文献   

11.
In this paper, a very efficient and secure multi-proxy multi-blind-signature scheme is proposed which is based on controlled quantum teleportation. Genuine six-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to guarantee its unforgeability, undeniability, blindness and unconditional security.  相似文献   

12.
本文研究了如何在二粒子纠缠态的量子受控传递中选择最佳量子通道的问题。分别利用四粒子GHZ态和四粒子特殊"反关联GHZ态"作为量子通道,本文提出了二粒子反关联纠缠态的量子受控传递的两个方案。通过对比两个方案下接受者最后采取的幺正操作的具体矩阵形式,分析了待传量子纠缠态与量子通道的关系,指出了四粒子GHZ态和四粒子特殊"反关联GHZ态"分别是二粒子正关联和反关联纠缠态各自隐形传递应该选择的最佳的量子通道。  相似文献   

13.
As a multi-particle entangled state, the Greenberger–Horne–Zeilinger (GHZ) state plays an important role in quantum theory and applications. In this study, we propose a flexible multi-user measurement-device-independent quantum key distribution (MDI-QKD) scheme based on a GHZ entangled state. Our scheme can distribute quantum keys among multiple users while being resistant to detection attacks. Our simulation results show that the secure distance between each user and the measurement device can reach more than 280 km while reducing the complexity of the quantum network. Additionally, we propose a method to expand our scheme to a multi-node with multi-user network, which can further enhance the communication distance between the users at different nodes.  相似文献   

14.
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps.  相似文献   

15.
Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps.  相似文献   

16.
利用非Bell基测量实现两粒子纠缠态的隐形传输   总被引:1,自引:1,他引:1  
研究无Bell基测量的未知两粒子纠缠态的隐形传态方案。Alice需传送未知两原子纠缠态给Bob,以她和Bob的原子组成的最大纠缠GHZ态作为量子信道,通过两原子同时在一个强经典驱动场驱动下和一个单模腔场发生相互作用,产生态的演化,从而实现隐形传态。本方案可忽略腔场热作用和腔延迟作用的影响,传送成功的总几率为1。  相似文献   

17.
We propose a protocol where one can realize quantum cloning of an unknown two-particle entangled state and its orthogonal-complement state with assistance offered by a state preparer. The first stage of the protocol requires usual teleportation using a (or two) four-particle entangled state(s) as quantum channel(s). In the second stage of the protocol, with the assistance (through a two-particle projective measurement) of the preparer, the perfect copies and complement copies of an unknown state can be produced.  相似文献   

18.
Recently Wei-Bo Gao et al. [Phys. Rev. Lett. 104 (2010) 020501]; reported on the creation of a 4-photon 6-qubit cluster state. It is shown this states can be utilized for perfect teleportation of arbitrary three qubit systems and controlled teleportation of an arbitrary two-qubit state. Therefore, the six-qubit cluster state as quantum channels is equivalent to that of maximally six-qubit entangled state.  相似文献   

19.
There are practical motivations to construct genuine tripartite entangled states based on the collective use of two bipartite entangled states. Here, the case that the states are two‐qubit Werner states is considered. The intervals of parameters of two‐qubit Werner states are revealed such that the tripartite state is genuinely entangled. Furthermore, we also investigate the lower bound of genuine multipartite entanglement concurrence for tripartite qudit states. Several examples are given to show the effectiveness of the lower bound.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号