首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
武莹  李锦芳  刘金明 《物理学报》2018,67(14):140304-140304
量子Fisher信息(QFI)是量子度量学中的一个重要物理量,可给出预估参数精度的最优值.本文研究如何引入弱测量和测量反转操作,来提高有限温环境下以Greenberger-Horne-Zeilinger态作为量子通道的隐形传态过程中的QFI.依据隐形传态过程中量子比特的传输情形,考虑了三种不同方案相应的QFI.首先,通过构造每种量子隐形传态方案的量子线路图,分析了QFI与推广振幅衰减噪声参数的变化关系.随后对各种方案中的受噪声粒子施加弱测量和测量反转操作,并对相应的部分测量参数进行优化,着重探讨了施加最优部分测量操作后QFI的改进量.结果表明,经过优化后的部分测量操作能有效提高有限温环境下量子隐形传态过程输出态的QFI;而且量子系统所处的环境温度越低,QFI的提高效果可越显著.  相似文献   

2.
We propose two schemes for quantum dense coding without Bell states measurement. One is deterministic, the other is probabilistic. In the deterministic scheme, the initial entangled state will be not destructed. In the probabilistic scheme, the initial unknown nonmaximal entangled state will be transformed into a maximalentangled one. Our schemes require two auxiliary particles and perform single-qubit measurements on them. Thus our schemes are simple and economic.  相似文献   

3.
梁建武  程资  石金晶  郭迎 《物理学报》2016,65(16):160301-160301
本文基于量子图态的几何结构特征,利用生成矩阵分割法,提出了一种量子秘密共享方案.利用量子图态基本物理性质中的稳定子实现信息转移的模式、秘密信息的可扩展性以及新型的组恢复协议,为安全的秘密共享协议提供了多重保障.更重要的是,方案针对生成矩阵的循环周期问题和因某些元素不存在本原元而不能构造生成矩阵的问题提出了有效的解决方案.在该方案中,利用经典信息与量子信息的对应关系提取经典信息,分发者根据矩阵分割理论获得子秘密集,然后将子秘密通过酉操作编码到量子图态中,并分发给参与者,最后依据该文提出的组恢复协议及图态相关理论得到秘密信息.理论分析表明,该方案具有较好的安全性及信息的可扩展性,适用于量子网络通信中的秘密共享,保护秘密数据并防止泄露.  相似文献   

4.
杨光  廉保旺  聂敏  金娇 《中国物理 B》2017,26(4):40305-040305
Recently,bidirectional quantum teleportation has attracted a great deal of research attention.However,existing bidirectional teleportation schemes are normally discussed on the basis of perfect quantum environments.In this paper,we first put forward a bidirectional teleportation scheme to transport three-qubit Greenberger-Horne-Zeilinger(GHZ) states based on controled-not(CNOT) operation and single-qubit measurement.Then,we generalize it to the teleportation of multi-qubit GHZ states.Further,we discuss the influence of quantum noise on our scheme by the example of an amplitude damping channel,then we obtain the fidelity of the teleportation.Finally,we utilize the weak measurement and the corresponding reversing measurement to protect the quantum entanglement,which shows an effective enhancement of the teleportation fidelity.  相似文献   

5.
We first provide four new schemes for two-party quantum teleportation of an arbitrary unknown multi-particle state by using three-, four-, and five-particle states as the quantum channel, respectively. The successful probability and fidelity of the four schemes reach 1. In the first two schemes, the receiver can only apply one of the unitary transformations to reconstruct the original state, making it easier for these two schemes to be directly realized. In the third and fourth schemes, the sender can preform Bell-state measurements instead of multipartite entanglement measurements of the existing similar schemes, which makes real experiments more suitable. It is found that the last three schemes may become tripartite controlled teleportation schemes of teleporting an arbitrary multi-particle state after a simple modification. Finally, we present a new scheme for three-party sharing an arbitrary unknown multi-particle state. In this scheme, the sender first shares three three-particle GHZ states with two agents. After setting up the secure quantum channel, an arbitrary unknown multi-particle state can be perfectly teleported if the sender performs three Bell-state measurements, and either of two receivers operates an appropriate unitary transformation to obtain the original state with the help of other receiver's three single-particle measurements. The successful probability and fidelity of this scheme also reach 1. It is demonstrated that this scheme can be generalized easily to the case of sharing an arbitrary unknown multi-particle state among several agents.  相似文献   

6.
<正>In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed.In this scheme a message to be signed is coded with unitary operators.Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message.Combining the entangled states generated by the TTP’s Bell measurement with the signature information,the verifier can verify the authentication of a signature through a single quantum state measurement.Compared with previous schemes,our scheme is more efficient and less complex, furthermore,our scheme can ensure the anonymity of the signer.  相似文献   

7.
提出基于三粒子GHZ态的双向量子可控隐形传态方案.方案中,使用两个三粒子GHZ态作为量子通道.而根据在量子通道中发送者,接收者和控制者所拥有的粒子的不同以及所采用的测量基的不同,设计出了三方参与的双向可控量子隐形传态方案和四方参与的双向可控量子隐形传态方案.在方案中,Alice和Bob对所拥有的粒子做合适的投影测量,并将其测量结果通知对方和控制者.若控制者同意此次传态,则会对自己所拥有的粒子做投影测量,并将结果告知接收者.接收者根据发送者和控制者的测量信息,做出相对应的幺正操作来重建发送者的量子态.同时三方参与和四方参与的量子可控隐形传态方案提高了通信的安全性.  相似文献   

8.
修晓明  董莉  高亚军  迟锋 《中国物理》2007,16(8):2194-2199
In this paper a controlled quantum teleportation scheme of an N-particle unknown state is proposed when N groups of three-particle W1 states are utilized as quantum channels. The quantum information of N-particle unknown state is transmitted from the sender to the recipient under the control of all supervisors. It can be realized with a certain probability. After the sender makes Bell-state measurements and the supervisors perform the computational basis measurements, the recipient will introduce auxiliary particles and carry out unitary transformations depending on classical information from the sender and the supervisors. Finally, the computational basis measurement will be performed by the recipient to confirm whether the teleportation succeeds or not. The successful completion of the scheme relies on all supervisors' cooperation. In addition, the fidelity and security of the scheme are discussed.  相似文献   

9.
《中国物理 B》2021,30(10):100303-100303
Recently, measurement-device-independent quantum secure direct communication schemes were proposed by Niu et al. [Sci. Bull. 63 1345(2018)] and Zhou et al. [Sci. China-Phys. Mech. Astron. 63 230362(2020)]. Inspired by their ideas,in this paper, a measurement-device-independent quantum dialogue protocol based on entanglement is designed and proven to be secure. The advantage of this scheme is that it can not only allow two communicators to transmit secret messages between each other, making the application scenarios more extensive, but can also eliminate all the security loopholes related to the measurement device and information leakage. In terms of experimental implementation, the scheme mainly involves the preparation of entangled states, the preparation of single photons, quantum storage, Bell measurement and other technologies, all of which are mature at present, therefore, the scheme is feasible by using current technologies.  相似文献   

10.
The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum tele- portation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entan- glement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay.  相似文献   

11.
In this paper, two new efficient multiparty quantum direct secret sharing schemes are proposed via a six-particle GHZ state and Bell measurements. In the first scheme, based on the theory of security cryptanalysis, the secret message of the sender is directly encoded into the transmitted particles, and all the agents can obtain their information by performing bell measurement on the received particles, and then cooperate to recover the information of the sender. In the second scheme, we define a new secret shared coding method by performing local unitary operations on the transmitted particles, then agents perform Bell measurements on their own particles respectively, and feedback the measurement to the dealer. If the agent's results are matched with the previous coding method, the protocol will work out.In addition, the proposed two schemes have the following common advantages: the sender can send all prepared particles to the receiver, and can send an arbitrary key to the receiver, rather than a random secret key; the proposed schemes do not need to insert any detection sets to detect eavesdropping and can resist both existing attacks and spoofing attacks by dishonest agents. The sender need not to retain any photons, so the sender's quantum memory could be omitted here.  相似文献   

12.
《中国物理 B》2021,30(9):90302-090302
Due to the unavoidable interaction between the quantum channel and its ambient environment, it is difficult to generate and maintain the maximally entanglement. Thus, the research on multiparty information transmission via non-maximally entangled channels is of academic value and general application. Here, we utilize the non-maximally entangled channels to implement two multiparty remote state preparation schemes for transmitting different quantum information from one sender to two receivers synchronously. The first scheme is adopted to transmit two different four-qubit cluster-type entangled states to two receivers with a certain probability. In order to improve success probabilities of such multicast remote state preparation using non-maximally entangled channels, we put forward the second scheme, which deals with the situation that is a synchronous transfer of an arbitrary single-qubit state and an arbitrary two-qubit state from one sender to two receivers. In particular, its success probability can reach 100% in principle, and independent of the entanglement degree of the shared non-maximally entangled channel. Notably, in the second scheme, the auxiliary particle is not required.  相似文献   

13.
基于腔QED的多用户间的多原子量子信道的建立   总被引:3,自引:0,他引:3       下载免费PDF全文
赵晗  周小清  杨小琳 《物理学报》2009,58(9):5970-5977
提出基于腔QED技术的多用户间的多原子W态和GHZ态量子信道的建立方案.在量子网络的空闲时段,各个用户和量子交换机共享EPR对.量子交换机通过原子和腔场的相互作用将两个EPR对制备成W态,再与另一个EPR对进行纠缠交换,经过直接测量后为用户建立三原子W态量子信道;同时讨论了四用户间的W态量子信道的建立方案.量子交换机对三个EPR对进行纠缠交换,将三个原子同时与腔场作用,经过直接测量后为用户建立三原子GHZ态量子信道;并将此方法推广到N个用户间的GHZ态量子信道的建立. 关键词: 腔QED 量子信道 量子交换机 纠缠交换  相似文献   

14.
邓富国  李熙涵  李涛 《物理学报》2018,67(13):130301-130301
量子通信以量子态为信息载体在远距离的通信各方之间传递信息,因此量子态的传输和远距离共享是量子通信的首要步骤.信道噪声不仅会影响通信效率还可能被窃听者利用从而威胁通信安全,对抗信道噪声是实现安全高效量子通信亟需解决的问题.本文介绍基于光量子态的两类对抗信道噪声的实用方法——量子态的避错传输和容错的量子通信,包括对抗噪声的基本原理和两种方法的代表性方案,并从资源消耗和可操作性的角度分析了方案的实用价值.  相似文献   

15.
In order to gain comprehensive knowledge of an arbitrary unknown quantum state, one feasible way is to reconstruct it, which can be realized by finding a series of quantum operations that can refactor the unitary evolution producing the unknown state. We design an adaptive framework that can reconstruct unknown quantum states at high fidelities, which utilizes SWAP test, parameterized quantum circuits (PQCs) and layerwise learning strategy. We conduct benchmarking on the framework using numerical simulations and reproduce states of up to six qubits at more than 96% overlaps with original states on average using PQCs trained by our framework, revealing its high applicability to quantum systems of different scales theoretically. Moreover, we perform experiments on a five-qubit IBM Quantum hardware to reconstruct random unknown single qubit states, illustrating the practical performance of our framework. For a certain reconstructing fidelity, our method can effectively construct a PQC of suitable length, avoiding barren plateaus of shadow circuits and overuse of quantum resources by deep circuits, which is of much significance when the scale of the target state is large and there is no a priori information on it. This advantage indicates that it can learn credible information of unknown states with limited quantum resources, giving a boost to quantum algorithms based on parameterized circuits on near-term quantum processors.  相似文献   

16.
黄江  郭有能  谢钦 《中国物理 B》2016,25(2):20303-020303
We propose a scheme of quantum screening to enhance the parameter-estimation precision in open quantum systems by means of the dynamics of quantum Fisher information.The principle of quantum screening is based on an auxiliary system to inhibit the decoherence processes and erase the excited state to the ground state.By comparing the case without quantum screening,the results show that the dynamics of quantum Fisher information with quantum screening has a larger value during the evolution processes.  相似文献   

17.
陈爱喜 《光学学报》2004,24(4):68-571
纠缠态在量子计算和量子信息中起着十分重要的作用。利用部分纠缠态作为资源提出了一种方案,根据该方案,能够以某些概率成功地复制出未知的EPR(Einstein Podolsky Rosen)态和它的正交态,使得通信双方都能够获得要传送的EPR态。方案的第一步是采用部分纠缠态作为量子信道去实现EPR态的隐形传态。根据量子不可克隆定理,输入态在发送方受到破坏。方案的第二步通过引入一个辅助量子位,发送者Alice在态的配制者Victor的帮助下,将以联合概率成功地获得未知EPR态和它的正交态。从而实现了量子态的重建。  相似文献   

18.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

19.
李艳玲  冯健  於亚飞 《物理学报》2007,56(12):6797-6802
提出一种任意两粒子纠缠态1→2普适远程克隆方案. 此方案仅需一个特殊的四粒子纠缠态作为量子信道, 就可使处于空间不同位置的两个接收者分别以5/6的保真度得到任意输入态的近似拷贝, 该保真度远高于已有方案中的保真度. 将方案推广到任意两粒子纠缠态1→N(N>2)普适远程克隆的情况, 可使处于不同地点的N个接收者分别以(2N+1)/(3N)的保真度得到输入态的近似拷贝. 另外, 提出一种以上述单个特殊四粒子纠缠态作为量子信道, 在多目标量子比特受控非门和 关键词: 量子纠缠态 普适远程克隆 保真度  相似文献   

20.
In this paper we investigate the controlled dense coding with the maximal slice states. Three schemes are presented. Our schemes employ the maximal slice states as quantum channel, which consists of the tripartite entangled state from the first party(Alice), the second party(Bob), the third party(Cliff). The supervisor(Cliff) can supervises and controls the channel between Alice and Bob via measurement. Through carrying out local von Neumann measurement, controlled-NOT operation and positive operator-valued measure(POVM), and introducing an auxiliary particle, we can obtain the success probability of dense coding. It is shown that the success probability of information transmitted from Alice to Bob is usually less than one. The average amount of information for each scheme is calculated in detail. These results offer deeper insight into quantum dense coding via quantum channels of partially entangled states.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号