首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Nguyen Ba An 《Physics letters. A》2009,373(20):1701-1707
Three novel probabilistic yet conclusive schemes are proposed to teleport a general two-mode coherent-state superposition via attenuated quantum channels with ideal and/or threshold detectors. The calculated total success probability is highest (lowest) when only ideal (threshold) detectors are used.  相似文献   

2.
宋伟 《中国物理快报》2007,24(2):336-339
We propose a protocol for teleportation of arbitrary mixture of diagonal Bell states, it is shown that the channel can be constructed with either pure maximally entangled states or mixed bound entangled states. We also present protocols to realize the controlled teleportation of mixture of diagonal Bell states via multi-particle mixed states. Our results show that bound entangled states are also important and useful resources in quantum communication tasks.  相似文献   

3.
Ho Ngoc Phien 《Physics letters. A》2008,372(16):2825-2829
We propose a linear optics scheme to teleport an arbitrary two-mode coherent state. The devices used are beam-splitters, phase-shifters and ideal photo-detectors capable of distinguishing between even and odd photon numbers. The scheme achieves faithful teleportation with a probability of 1/4. However, with additional use of an appropriate displacement operator, the teleported state can always be made near-faithful.  相似文献   

4.
We present a controlled quantum secure direct communication protocol that uses a 2-dimensional Greenberger–Horne–Zeilinger (GHZ) entangled state and a 3-dimensional Bell-basis state and employs the high-dimensional quantum superdense coding, local collective unitary operations and entanglement swapping. The proposed protocol is secure and of high source capacity. It can effectively protect the communication against a destroying-travel-qubit-type attack. With this protocol, the information transmission is greatly increased. This protocol can also be modified, so that it can be used in a multi-party control system.  相似文献   

5.
The entanglement-assisted capacity of a generalized amplitude damping channel is investigated by using the properties of partial symmetry and concavity of mutual information. The numerical and analytical results of the entanglement-assisted capacity are obtained under certain conditions. It is shown that the entanglement-assisted capacity depends on the channel parameters representing the ambient temperature and dissipation, and the prior entanglement between sender and receiver can approximately double the classical capacity of the generalized amplitude damping channel.  相似文献   

6.
Polarization entangled photon pairs are easily perturbed in noisy channels. We propose a polarization entanglement purification method using temporal degree of freedom, followed by the conventional iterative purification. The entanglement fidelity can be improved to any degree, and the steps needed are less than those using conventional iteration method.  相似文献   

7.
Nguyen Ba An 《Physics letters. A》2008,372(21):3778-3783
In this work we devise a scheme to teleport a type of unknown M-quNit state using only a single non-maximally entangled quNit-pair as the quantum channel. The fidelity is one while the success probability is less than one and depends on N but not on M. The scheme requires M−1 ancillary quNits and 1 qubit at the receiver's and the receiver should be capable of performing some quNit-quNit/qubit operations. The classical message that the teleporter must announce consists only of 2 Nits, though the full set of his/her measurement outcome is as huge as M+1 Nits.  相似文献   

8.
Based on the idea of dense coding of three-photon entangled state and qubit transmission in blocks, we present a multiparty controlled quantum secret direct communication scheme by using Greenberger-Horne-Zeilinger state. In the present scheme, the sender transmits three bits of secret message to the receiver directly and the secret message can only be recovered by the receiver under the permission of all the controllers. All three-photon entangled states are used to transmit the secret message except those chosen for eavesdropping check and the present scheme has a high source capacity because Greenberger-Horne-Zeilinger state forms a large Hilbert space.  相似文献   

9.
We analyze the security of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger (GHZ) state. It is shown that the receiver, using a special property of GHZ state, can illegally obtain 33.3% of the sender’s secret without any controller’s permission. The attack strategy is demonstrated in detail and an improvement of this protocol is discussed. The idea of this attack might be instructive for the cryptanalysis of quantum cryptographic protocols.  相似文献   

10.
We propose a protocol Dn for faithfully teleporting an arbitrary n-qudit state with the tensor product state (TPS) of n generalized Bell states (GBSs) as the quantum channel. We also put forward explicit protocols and for faithfully teleporting an arbitrary n-qudit state with two classes of 2n-qudit GESs as the quantum channel, where the GESs we constructed are a kind of genuine entangled states which cannot be reducible to the TPS of n GBSs.  相似文献   

11.
侯丽珍  方卯发 《中国物理快报》2007,24(12):3308-3311
A general formula for the mutual information of the Paufi channels with memory modelled by correlated noise is derived. It is shown that the mutual information depends on the channel shrinking factor, the input state parameter and the channel memory coefficient. The analyses based on the general formula reveal that the entanglement is always a useful resource to enhance the mutual information of some Pauli channels, such as the bit flip channel and the bit-phase flip channel. Our analyses also show that the entanglement is not advantageous to the reliable transmission of classical information for some Pauli channels at any time, such as the phase flip channel and the phase damping channel.  相似文献   

12.
We propose a protocol for multiparty quantum secret sharing of secure direct communication using single photons. In this protocol, random phase shift operations instead of some special discrete unitary operations used usually are employed to realize the sharing controls. The security of this protocol with respect to various kinds of attacks is discussed. Due to the complete randomicity of the phase shift characterizing the unitary operations, the security of secret sharing is therefore enhanced.  相似文献   

13.
We consider the model of quantum computer, which is represented as a Ising spin lattice, where qubits (spin-half systems) are separated by the isolators (two spin-half systems). In the idle mode or at the single bit operations the total spin of isolators is 0. There are no need of complicated protocols for correcting the phase and probability errors due to permanent interaction between the qubits. We present protocols for implementation of universal quantum gates with the rectangular radio-frequency pulses.  相似文献   

14.
We present a controlled teleportation scheme for teleporting an arbitrary superposition state of an M-qudit quantum system. The scheme employs only one entangled state as quantum channel, which consists of the qudits from Alice, Bob and every agent. The quantum operations used in the teleportation process are a series of qudit Bell measurements, single-qudit projective measurements, qudit H-gates, qudit-Pauli gates and qudit phase gates. It is shown that the original state can be restored by the receiver only on the condition that all the agents collaborate. If any agent does not cooperate, the original state can not be fully recovered.  相似文献   

15.
A solid state quantum circuit where an ensemble of self-assembled quantum dots in a microdisk cavity served as long-lived quantum light memory, is investigated. It is shown that via laser coupling Raman process, the coherent transfer between the light field (qubits) and the ensemble spin states of the quantum dots can be efficient and fast. The coherence properties of the system are analyzed, which enables us to obtain a long coherence time.  相似文献   

16.
We report a scalable linear optical scheme for generating entangled states of multiple ququarts in which the individual single-ququart state is prepared with the biphoton polarization state of frequency-nondegenerate spontaneous parametric down-conversion. The output state is calculated with the full consideration of the higher order effect (double-pair events) of spontaneous parametric down-conversion. Scalability to multiple-ququart entanglement is demonstrated with examples: linear optical entanglement of three and four individual biphoton ququarts.  相似文献   

17.
We present a tripartite quantum information splitting scheme which splits a qutrit state via two GHZ states. The scheme is then generalized to splitting a qudit state among any number of receivers. We show that this scheme is also applicable to splitting any multi-qudit entangled states.  相似文献   

18.
We propose a scheme for generation of multipartite ionic Greenberger-Horne-Zeilinger (GHZ) states only by single-qubit measurements. Our scheme not only does not need joint measurements but also avoids the difficulty of synchronizing the arrival time of the two scattered photons, which is faced by the previous schemes. Therefore our entanglement generation scheme can be implemented more easily than the schemes based on atomic interference in experiment.  相似文献   

19.
We present a generalized telecloning (GTC) protocol where the quantum channel is non-optimally entangled and we study how the fidelity of the telecloned states depends on the entanglement of the channel. We show that one can increase the fidelity of the telecloned states, achieving the optimal value in some situations, by properly choosing the measurement basis at Alice's, albeit turning the protocol to a probabilistic one. We also show how one can convert the GTC protocol to the teleportation protocol via proper unitary operations.  相似文献   

20.
Quantum Key Distribution against Trojan Horse Attacks   总被引:1,自引:0,他引:1       下载免费PDF全文
蔡庆宇  吕桦 《中国物理快报》2007,24(5):1154-1157
Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号