首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
A new protocol of bidirectional quantum teleportation (BQT) is proposed in which the users can transmit a class of n-qubit state to each other simultaneously, by using (2n + 2)-qubit entangled states as quantum channel. The state of the art approaches can only transmit two-qubit states in each round. This scheme is based on control-not operation, single-qubit measurements and appropriate single-qubit unitary operations. It is shown that the protocol is secure in preparation phase.  相似文献   

2.
We demonstrate that a seven-qubit entangled state can be used to realize the deterministic tripartite controlled teleportation by performing Bell-state measurements, where Alice wants to teleport an arbitrary single-qubit state of qubit a to Bob, Charlie wants to teleport an arbitrary single-qubit state of qubit b to David and at the same time Edison wants to teleport an arbitrary single-qubit state of qubit c to Ford via the control of the supervisor Tom.  相似文献   

3.
We investigate quantum echo control and Bell state swapping for two atomic qubits (TAQs) coupling to two-mode vacuum cavity field (TMVCF) environment via two-photon resonance. We discuss the effect of initial entanglement factor ?? and relative coupling strength R=g1/g2 on quantum state fidelity of TAQs, and analyze the relation between three kinds of quantum entanglement(C(ρa),C(ρf),S(ρa)) and quantum state fidelity, then reveal physical essence of quantum echo of TAQs. It is shown that in the identical coupling case R=1, periodic quantum echo of TAQs with π cycle is always produced, and the value of fidelity can be controlled by choosing appropriate ?? and atom-filed interaction time. In the non-identical coupling case R≠1, quantum echoes with periods of π, 2π and 4π can be formed respectively by adjusting R. The characteristics of quantum echo results from the non-Markovianity of TMVCF environment, and then we propose Bell state swapping scheme between TAQs and two-mode cavity field.  相似文献   

4.
Recently Zhu (Int. J. Theor. Phys. 53, 4095, 2014) had shown that using GHZ-like states as quantum channel, it is possible to teleport an arbitrary unknown two-qubit state. We investigate this channel for the teleportation of an arbitrary N-qubit state. The strict proof through mathematical induction is presented and the rule for the receiver to reconstruct the desired state is explicitly derived in the most general case. We also discuss that if a system of quantum secret sharing of classical message is established, our protocol can be transformed to a N-qubit perfect controlled teleportation scheme from the controller’s point of view.  相似文献   

5.
A scheme for the deterministic joint remote preparation of a four-qubit cluster-type state using only two Greenberger-Horne-Zeilinger (GHZ) states as quantum channels is presented. In this scheme, the first sender performs a two-qubit projective measurement according to the real coefficient of the desired state. Then, the other sender utilizes the measurement result and the complex coefficient to perform another projective measurement. To obtain the desired state, the receiver applies appropriate unitary operations to his/her own two qubits and two CNOT operations to the two ancillary ones. Most interestingly, our scheme can achieve unit success probability, i.e., P s u c =1. Furthermore, comparison reveals that the efficiency is higher than that of most other analogous schemes.  相似文献   

6.
A scheme for teleporting an arbitrary tripartite entangled state is proposed when three bipartite entangled states (|η〉) with continuous variables are used as quantum channels. Quantum teleportation can be carried out successfully if the receiver adopts an appropriate unitary transformation. The calculation is greatly simplified by virtue of the Schmidt decompositions of both tripartite entangled state |p t ,χ 2,χ 3〉 and |η〉. Any tripartite state which can be expanded in terms of |p t ,χ 2,χ 3〉 may be teleported in this way due to the completeness of |p t ,χ 2,χ 3〉.  相似文献   

7.
Recently, Binayak S. Choudhury (Quantum Inf. Process 13, 239 2014), proposed a protocol of joint remote state preparation of an equatorial two-qubit pure quantum state using GHZ states. According to their scheme the probability of success is 0.25. In this letter, an improved scheme is proposed, which can enhance the probability of success to 100 %. Moreover, we propose a scheme to prepare the two-qubit pure quantum state whose coefficient is more general.  相似文献   

8.
In this paper, a theoretical scheme for tripartite quantum controlled teleportation is presented using the entanglement property of seven-qubit cluster state. This means that Alice wants to transmit a entangled state of particle a to Bob, Charlie wants to transmit a entangled state of particle b to David and Edison wants to transmit a entangled state of particle c to Ford via the control of the supervisor. In the end, we compared the aspects of quantum resource consumption, operation complexity, classical resource consumption, quantum information bits transmitted, success probability and efficiency with other schemes.  相似文献   

9.
The idea of secure quantum information exchange (SQIE) [J. Phys. B: At. Mol. Opt. Phys.44, 115504 (2011)] is introduced for the secure exchange of single qubit information states between two legitimate users, Alice and Bob. In the present paper, we extend this original SQIE protocol by presenting a scheme, which enables the secure exchange of n-single qubit information states among the n nodes of a quantum network, with the aid of a special kind of 4n-qubit entangled state and the classical assistance of an extra participant Charlie. For experimental realization of our extended SQIE protocol, we suggest an efficient scheme for the generation of a special kind of 4n-qubit entangled state using the interaction between highly detuned Λ-type three-level atoms and optical coherent field. Further, by discussing the various experimental parameters, we show that the special kind 4n-qubit entangled state can be generated with the presently available technology.  相似文献   

10.
In this paper, we propose a scheme for quantum information splitting based on the non-maximally entangled four-qubit state in order to realize the splitting of the specific two-qubit state |ψ A B =x|00〉+y|11〉. The information splitter will safely share an state to the receiver with help of the controller. Through introducing an auxiliary system and applying several appropriate unitary transformations the information receiver can reconstruct the original state sent by the information splitter. Due to the non-maximally entangled four-qubit state, the total probability that the receiver obtains the original information is P. Furthermore, we discuss the relationship between the successful splitting probability and the concurrence of the entangled state and get a specific expression. In addition, the scheme is tested against external and internal attacks, and we define a function to characterise the security with the concurrence of the entanglement.  相似文献   

11.
We present a scheme for N-photon Greenberger-Horne-Zeilinger (GHZ) state analysis using hyperentanglement in polarization and time-bin degrees of freedom. The scheme only needs linear optics elements and single-photon detectors, which is feasible with current technology. The set of 2 N mutual orthogonal states can be unambiguously distinguished and the protocol is expected to find useful applications in quantum information processing.  相似文献   

12.
Joint unitary operations play a central role in quantum communication and computation. We give a quantum circuit for implementing a type of unconstructed useful joint unitary evolutions in terms of controlled-NOT (CNOT) gates and single-qubit rotations. Our synthesis is optimal and possible in experiment. Two CNOT gates and seven R x , R y or R z rotations are required for our synthesis, and the arbitrary parameter contained in the evolutions can be controlled by local Hamiltonian or external fields.  相似文献   

13.
Protection of entanglement from disturbance of the environment is an essential task in quantum information processing. We investigate the effect of the weak measurement and reversal (WMR) on the protection of the entanglement for an arbitrarily entangled two-qubit pure state from these three typical quantum noisy channels, i.e., amplitude damping channel, phase damping channel and depolarizing quantum channel. Given the parameters of the Bell-like initial qubits’ state |ψ〉 = a|00〉 + d|11〉, it is found that the WMR operation indeed helps for protecting distributed entanglement from the above three noisy quantum channels. But for the Bell-like initial qubits’ state |?〉 = b|01〉 + c|10〉, the WMR operation only protects entanglement in the amplitude damping channel, not for the phase damping and depolarizing quantum channels. In addition, we discuss how the concurrence and the success probability behave with adjusting the weak or the reversal weak measurement strength.  相似文献   

14.
Recently, Zhao-Hui Wei et al. (Int. J. Theor. Phys. 55, 4687, 2016) proposed an improved quantum teleportation scheme for one three-qubit unknown state with a four-qubit quantum channel based on the original one proposed by Binayak S. Choudhury and Arpan Dhara (Int. J. Theor. Phys. 55, 3393, 2016). According to their schemes, the three-qubit entangled state could be teleported with one four-qubit cluster state and five-qubit joint measurements or four-qubit joint measurements. In this paper, we present an improved protocol only with single-qubit measurements and the same four-qubit quantum channel, lessening the difficulty and intensity of necessary operations.  相似文献   

15.
Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (QPKC) based on the Bell states. By Holevos theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (CPA). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.  相似文献   

16.
We quantify multiparticle quantum entanglement in a system of N two-level atoms interacting with a squeezed vacuum state of the electromagnetic field. We calculate the amount of quantum entanglement present among one hundred such two-level atoms and also show the variation of that entanglement with the radiation field parameter. We show the continuous variation of the amount of quantum entanglement as we continuously increase the number of atoms from N = 2 to N = 100. We also discuss that the multiparticle correlations among the N two-level atoms are made up of all possible bipartite correlations among the N atoms.  相似文献   

17.
A family of attacks on the BB84 protocol of quantum key distribution is explicitly constructed under which the lower bound of fundamental entropy uncertainty relations is attained in the asymptotic limit of long sequences. All attacks are parameterized by a single parameter Q, which has the meaning of error probability on the receiver side, is known to the eavesdropper, but is reliably unknown to legitimate users. The situation on the receiver side looks like a scheme with classical Bernoulli tests with unknown parameter Q. For the eavesdropper, the situation also looks like a Bernoulli scheme—tossing a coin with quantum states, where each message of the eavesdropper leads to a quantum state that is uniquely determined by the outcome of measurements on the receiver side. A statistical interpretation is given to the estimate of the error probability for Q and the key secrecy parameter εδ,n. It is shown that, for a given length n of a series of tests, the width δ of the confidence interval actually determines the accuracy of the estimate for the parameter Q and, accordingly, the key secrecy level—the value of the secrecy parameter \({\varepsilon _{\delta ,n}} = 2{e^{ - 2{\delta ^2}n}}\).  相似文献   

18.
Using the thermo entangled state approach, we successfully solve the master equation of a damped harmonic oscillator affected by a linear resonance force in a squeezed heat reservoir, and obtain the analytical evolution formula for the density operator in the infinitive Kraus operator-sum representation. Interestingly, the Kraus operators Ml,m,n,r and \(\mathfrak {M}_{l,m,n,r}^{\dag }\) are not Hermite conjugate, but they are still trace-preserving quantum operations because of the normalization condition. We also investigate the evolution for an initial coherent state for damping in a squeezed heat reservoir, which shows that the initial coherent state decays to a complex mixed state as a result of damping and thermal noise.  相似文献   

19.
Quantum bit commitment is insecure in the standard non-relativistic quantum cryptographic framework, essentially because Alice can exploit quantum steering to defer making her commitment. Two assumptions in this framework are that: (a) Alice knows the ensembles of evidence E corresponding to either commitment; and (b) system E is quantum rather than classical. Here, we show how relaxing assumption (a) or (b) can render her malicious steering operation indeterminable or inexistent, respectively. Finally, we present a secure protocol that relaxes both assumptions in a quantum teleportation setting. Without appeal to an ontological framework, we argue that the protocol’s security entails the reality of the quantum state, provided retrocausality is excluded.  相似文献   

20.
By employing the bipartite entangled state representation and the technique of integration within an ordered product of operators, the classical complex wavelet transform of a complex signal function can be recast to a matrix element of the squeezing-displacing operator U 2(μ, σ) between the mother wavelet vector 〈ψ| and the two-mode quantum state vector |f〉 to be transformed. 〈ψ|U 2(μ, σ)|f〉 can be considered as the spectrum for analyzing the two-mode quantum state |f〉. In this way, for some typical two-mode quantum states, such as two-mode coherent state and two-mode Fock state, we derive the complex wavelet transform spectrum and carry out the numerical calculation. This kind of wavelet-transform spectrum can be used to recognize quantum states.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号