首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 578 毫秒
1.
I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th~ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack.  相似文献   

2.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique.  相似文献   

3.
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel, quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel  相似文献   

4.
We present a scheme for quantum secure direct communication, in which the message is encoded by local unitary operations, transmitted through entangled photons, and deduced from both the sender and receiver's local measurement results. In such a scheme, only one pair of entangled photons is consumed, and there is no need to transmit the sender's qubit carrying the secret message in a public channel, in order to transmit two-bit classical information.  相似文献   

5.
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.  相似文献   

6.
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed.  相似文献   

7.
杨静  王川  张茹 《理论物理通讯》2010,(11):829-834
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.  相似文献   

8.
GAO Gan 《理论物理通讯》2008,50(8):368-370
We propose a quantum superdense coding secure communication scheme by using GHZ state. This scheme combines the ideas of quantum superdense coding and sequence transmission. Its distinct advantage is high source capacity. In addition, in checking eavesdropping, we need not to destroy quantum entanglement.  相似文献   

9.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitary transformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication.  相似文献   

10.
By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the "two-step" transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used.  相似文献   

11.
We propose a quantum secure communication protocol by using three-particle GHZ states. In this protocol, we utilize the ideas of the rearranging orders and the sequence transmission. The sender of messages, Alice, first disturbs the particle orders in an initial sequence, and then sends the sequence of the disturbed orders to the receiver of messages, Bob. Under Alice's introduction, Bob rearranges the sequence back to the initial sequence. By making a GHZ state measurement on each of the three particles in turn, Bob can attain Alice's secret messages. In addition, we still calculate the efficiency of our three-particle GHZ protocol and generalize it to the case using multi-particle GHZ state.  相似文献   

12.
Abstract A simple scheme for teleporting an unknown M-qubit cat-like state is proposed. The steps of this scheme can be summarized simply: disentangle-teleport-reconstruct entanglement. If proper unitary operations and measurements from senders are given, the teleportation of an unknown M-qubit cat-like state can be converted into single qubit teleportation. In the meantime, the receiver should also carry out right unitary operations with the introduction of appropriate ancillary qubits to confirm the successful teleportation of the demanded entangled state. The present scheme can be generalized to teleport an unknown M-quNit state, i.e., an M-quNit state can be teleported by a single quNit entangled pair.  相似文献   

13.
We present an efficient scheme for sharing an arbitrary m-qubit state with n agents. In our scheme, the sender Alice first shares m Bell states with the agent Bob, who is designated to recover the original m-qubit state. Furthermore, Alice introduces n- 1 auxiliary particles in the initial state |0), applies Hadamard (H) gate and Controlled-Not (CNOT) gate operations on the particles, which make them entangled with one of m particle pairs in Bell states, and then sends them to the controllers (i.e., other n - 1 agents), where each controller only holds one particle in hand. After Alice performing m Bell-basis measurements and each controller a single-particle measurement, the recover Bob can obtain the original unknown quantum state by applying the corresponding local unitary operations on his particles. Its intrinsic efficiency for qubits approaches 100%, and the total efficiency really approaches the maximal value.  相似文献   

14.
Metric of States     
MA Zhi-Hao 《理论物理通讯》2008,50(11):1069-1070
Metric of quantum states plays an important role in quantum information theory. In this letter, we find the deep connection between quantum logic theory and quantum information theory. Using the method of quantum logic, we can get a famous inequality in quantum information theory, and we answer a question raised by S. Gudder.  相似文献   

15.
Y and inverted Y-type four-level schemes for optical quantum coherence systems, which may be intuitively considered to be very simple, have not been studied intensively till now. In this paper, we present the multiformity of these two types of schemes by considering that they can be classified into nine possible level styles as the second-order sub-schemes using laser fields. Further we point out the complexity of their more than one hundred realistic configurations as the third-order four-level sub-schemes that may appear in the optical quantum coherence experiments. Throughout this paper we review which configurations have been studied in some research aspects and which ones not, according to our knowledge, in order to be propitious to next steps of theoretical and experimental investigations, especially for applications in the fields of quantum optics, quantum information science, laser spectroscopy, and so on.  相似文献   

16.
The purpose of the present paper is to study the entropy hs(Ф) of a quantum dynamical systems Ф = ( L, s, Ф), where s is a bayessian state on an orthomodular lattice L. Having introduced the notion of entropy hs( Ф, A) of partition A of a Boolean algebra B with respect to a state s and a state preserving homomorphism Ф, we prove a few results on that, define the entropy of a dynamical system hs(Ф), and show its invariance. The concept of sufficient families is also given and we establish that hs (Ф) comes out to be equal to the supremum of hs (Ф,A), where A varies over any sufficient family. The present theory has then been extended to the quantum dynamical system ( L, s, Ф), which as an effect of the theory of commutators and Bell inequalities can equivalently be replaced by the dynamical system (B, s0, Ф), where B is a Boolean algebra and so is a state on B.  相似文献   

17.
许鹏  王栋  叶柳 《中国物理 B》2013,(10):119-124
We investigate the quantum characteristics of a three-particle W-class state and reveal the relationship between quan- tum discord and quantum entanglement under decoherence. We can also identify the state for which discord takes a maximal value for a given decoherence factor, and present a strong bound on quantum entanglement-quantum discord. In contrast, a striking result will be obtained that the quantum discord is not always stronger than the entanglement of formation in the case of decoherence. Furthermore, we also theoretically study the variation trend of the monogamy of quantum correlations for the three-particle W-class state under the phase flip channel, and find that the three-particle W-class state could transform from polygamous into monogamous, owing to the decoherence.  相似文献   

18.
We extend the method that Banerjee and Majhi have used to discuss Hawking radiation. Under the condition that the total energy and electrical charge of spacetime are conserved, we investigate Hawking radiation of the charged black hole by a new Tortoise coordinate transformation. Taking the reaction of the radiation of the particle to the spacetime into consideration, we not only derive the radiation spectrum that satisfies the unitary principle in quantum mechanics but also show that the contribution of ingoing particles is equal to the one of outgoing particles on the similar chemical potential term in radiation spectrum caused by charged particles.  相似文献   

19.
The full-core plus correlation method with multi-configuration interaction wave functions is extended to the calcu- lation of the non-relativistic energies of ls2nd (n ≤9) states for the lithium isoelectronic sequence from Z = 11 to 20. Relativistic and mass-polarization effects on the energy are calculated as the first-order perturbation correction. The quantum-electrodynamics correction is also included. The fine structure splittings are determined from the expectation values of spin-orbit and spin-other-orbit interaction operators in the Pauli-Breit approximation. Combining the term energies of lowly excited states obtained with the quantum defects calculated by the single channel quantum defect theory, each of which is a smooth function of energy and approximated by a weakly varying function of energy, the ion potentials of highly excited states (n ≥ 6) are obtained with the semi-empirical iteration method. The results are compared with experimental data in the literature and found to be closely consistent with the regularity.  相似文献   

20.
Based on the quantum Vlasov equation, the effect of frequency chirp on electron-positron pair production is investigated. The cycle parameter, which characterizes the laser field cycle degree within the pulse, is also considered. In both supercycle and subcycle laser pulses the frequency chirp can greatly enhance the momentum distribution function of created pairs and the pair number density. The pair number density created by a supercycle laser pulse is larger than that by a subcycle pulse under the same laser frequency and chirping. There exists an optimal cycle parameter corresponding to the maximum value of the created pair number density for different chirp rates. It is found that the pair number density is sensitive/insensitive to chirping rate when the cycle parameter lies below/above the optimal one.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号