首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
张祖荣  刘伟涛  李承祖 《中国物理 B》2011,20(5):50309-050309
Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states.This paper presents how to use a [2k-1,1,k] quantum error-correcting code(QECC) to implement a quantum(k,2k 1) threshold scheme.It also takes advantage of classical enhancement of the [2k-1,1,k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously.Because information is encoded into QECC,these schemes can prevent intercept-resend attacks and be implemented on some noisy channels.  相似文献   

2.
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function,together with high-dimensional superdense-coding, provide convenience, security, and large capability quantum channel forsecret distribution and recovering. Analysis shows the security of the scheme.  相似文献   

3.
We presents a high-capacity three-party quantum secret sharing (QSS) protocol with a sequence of photon pairs in hyperentangled Bell states in both the polarization and the spatial-mode degrees of freedom. In our scheme, the boss Alice prepares a sequence of photon pairs in hyperentangled Bell states and divides them into two photon sequences which are sent the two agents, respectively. Alice exploits four subsets of decoy photons to assure the security of the photon transmission between her and her agents. The present QSS scheme has the advantage of having a high channel capacity as each photon pair can carry 4 bits of secret message in principle, two times of that by Deng et al. (Phys. Lett. A 372: 1957, 2008). We give out the setups for the preparation of the photon pairs in hyperentangled Bell states with a beta barium borate crystal and the manipulation of the photons with linear optical elements. It will be shown that our QSS protocol is feasible with current experimental technology.  相似文献   

4.
Jason Lin 《Optics Communications》2011,284(5):1468-1471
Recently, Shi et al. proposed a multiparty quantum secret sharing (QSS) using Bell states and Bell measurements. In their protocol, for sharing two classical bits, all parties have to possess two photons after entanglement swapping. This paper proposes an enhancement of Shi et al.'s protocol. Based on the idea that all parties (except dealer) possess two photons to share two classical bits, the qubit efficiency has further improved by removing the photons the dealer has to hold in Shi et al.'s protocol. Moreover, an insider attack is also prevented in the proposed scheme.  相似文献   

5.
Based on the famous quantum secure direct communication protocol (i.e., the Boström-Felbinger protocol) [Phys. Rev. Lett. 89 (2002) 187902] and its improvements, we propose a scheme of multiparty quantum secret sharing of classical messages (QSSCM), in which no subset of all the classical message receivers is sufficient to extract the sender’s secret classical messages but all the parties cooperate together. Then we take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI), in which the unknown quantum state in the sender’s qubit can be reconstructed in one receiver’s qubit if and only if all the quantum information receivers collaborate together.  相似文献   

6.
We present an efficient scheme for sharing an arbitrary two-qubit quantum state with n agents. In this scheme, the sender Alice first prepares an n + 2-particle GHZ state and introduces a Controlled-Not (CNOT) gate operation. Then, she utilizes the n + 2-particle entangled state as the quantum resource. After setting up the quantum channel, she performs one Bell-state measurement and another single-particle measurement, rather than two Bell-state measurements. In addition, except that the designated recover of the quantum secret just keeps two particles, almost all agents only hold one particle in their hands respectively, and thus they only need to perform a single-particle measurement on the respective particle with the basis X. Compared with other schemes based on entanglement swapping, our scheme needs less qubits as the quantum resources and exchanges less classical information, and thus obtains higher communication efficiency.  相似文献   

7.
We presents a novel scheme for high-capacity three-party quantum secret sharing (QSS) with the hyperentanglement in both the polarization and the spatial-mode degrees of freedom of photon pairs. The boss Alice need only prepare a sequence of photon pairs and some decoy photons. Her two agents measure their photons received from the boss Alice with two bases by choosing two unsymmetrical probabilities. The present QSS scheme has a high capacity as each pair can carry 2 bits of information, several times as other QSS schemes. Moreover, our setups with linear optical elements show that our QSS scheme does not increase the difficulty of its implementation in experiment and it is feasible with current techniques.  相似文献   

8.
Quantum secret sharing (QSS) and quantum search algorithm (QSA) are considered as two important but different research topics in quantum information science. This paper recognizes an important feature in the well-known Grover’s QSA and then applies it to propose a QSS protocol. In contrast to the existing QSA-based QSS protocols, the newly proposed protocol has the following two advantages: (1)?no quantum memory is required by the agents, whereas the agents in the existing QSA-based QSS protocols need long-term quantum memories to store their secret shadows; (2)?the agents can cooperate to recover the boss’s secret by using shadows in classical bits, whereas, the others have to combine their shadows in photons and perform a unitary operation on the retained photons. The proposed QSS protocol is also shown to be secure against eavesdroppers or malicious agents.  相似文献   

9.
Utilizing three non-maximally entangled qutrit pairs as quantum channels, we first propose a generalized tripartite scheme for sharing an arbitrary two-qutrit state with generalized Bell-state measurements. In the scheme if and only if the two recipients collaborate together, they can recover the split qutrit state with the probability determined uniquely by the smallest coefficients of the non-maximally entangled pairs. Afterwards, we further extend the scheme for sharing an arbitrary 2n-qudit state by taking 3n non-maximally entangled qudit pairs as quantum channels. Moreover, the scheme success probability relative to the inherent entanglement in quantum channels and its structure is simply discussed.  相似文献   

10.
秦国毅 《物理学报》1989,38(3):366-375
本文将包迹函数近似推广用于计算有理数近似下,垂直于超晶格轴的波矢K不等于零时,准周期半导体超晶格(QSS)的电子子带和波函数,对K=0的情形,分别计算了Ⅰ类的GaAs/AlxGa1-xAs和Ⅱ类的InAs/GaSb QSS的电子子带和波函数,直至代序数m=9和6。对于价带对导带影响强的InAs/GaSb QSS,分别计算了m=5和6时电子子带随K的变化关系。并提出了利用本文结果计算Ⅰ类的GaAs/AlxGa1-xAs QSS带间集体激发的具体方法。  相似文献   

11.
A scheme of multiparty quantum secret sharing of classical messages (QSSCM) is proposed based on single photons and local unitary operations. In this scheme, eavesdropping checks are performed only twice, and one photon can generate one bit of classical secret message except those chosen for eavesdropping check; in addition, only the sender and one of the agents are required to store photons. Thus, this scheme is more practical and efficient.  相似文献   

12.
A scheme for quantum state sharing of an arbitrary m-qudit state is proposed with two-qudit entanglements and generalized Bell-state (GBS) measurements. In this scheme, the sender Alice should perform m two-particle GBS measurements on her 2m qudits, and the controllers also take GBS measurements on their qudits and transfer their quantum information to the receiver with entanglement swapping if the agents cooperate. We discuss two topological structures for this quantum state sharing scheme, a dispersive one and a circular one. The former is better at the aspect of security than the latter as it requires the number of the agents who should cooperate for recovering the quantum secret larger than the other one.  相似文献   

13.
We present a high-capacity three-party quantum secret sharing (QSS) protocol with a sequence of single photons in both the polarization and the spatial-mode degrees of freedom. By inserting the boss Alice into the middle position between the two agents Bob and Charlie, our QSS protocol is secure in theory. The boss Alice chooses some unitary operations to encode her information on the single photons. It is interesting to point out the fact that Alice does not change the bases of the single photons which are used to carry the useful information about the private key, which improves its success probability for obtaining a private key. Compared with the QSS protocol by Zhou et al. (Chin. Phys. Lett. 24, 2181 (2007)), our QSS protocol has a higher capacity without increasing the difficulty of its implementation in experiment as each correlated photon can carry two bits of useful information. Compared with those QSS protocols based on entangled photon pairs and Bell-state measurements, our QSS protocol is more feasible as it does not require the complete Bell-state analysis which is not easy with linear optics. We give out the setup for the implementation of our QSS protocol with linear optical elements.  相似文献   

14.
A scheme for implementing a conditional z gate in the decoherence-free subspace of superconducting quantum-interference devices (SQUIDs) is presented based on the dispersive interaction. Each logic qubit is encoded in the ground states of two rf SQUIDs, which own lower energy and can be relatively stable in operation. By switching on/off the classical pulses and selecting the gating time appropriately, a high fidelity is obtained. Moreover, this scheme can be generalized to the multi-qubit case without changing the gating time.  相似文献   

15.
A feasible scheme is presented to generate a generalized superposition of displaced squeezed states, cosθ|α,z〉±sinθ|-α,z〉, in a single mode of the electromagnetic field inside a microwave cavity. The scheme employs a two-level (Rydberg) atom driven by an external classical field. The success probability and the interaction time of such generation are also considered.  相似文献   

16.
A high-fidelity scheme to generate N-photon generalized binomial states (NGBSs) in a single-mode high-Q cavity is proposed. A method to construct superpositions of exact orthogonal NGBSs is also provided. It is then shown that these states, for any value of N, may be used for a realization of a controlled-NOT gate, based on the dispersive interaction between the cavity field and a control two-level atom. The possible implementation of the schemes is finally discussed.  相似文献   

17.
A continuous variable quantum secret sharing (CVQSS) scheme is proposed by using quantum teleportation. In the scheme, the participants Bob and Charlie can recover the classical secret keys only when they cooperate. Meanwhile, the security of the CVQSS scheme is analyzed in detail by calculating the bit error rates (BERs) under different situations. It is shown that our proposed CVQSS scheme not only can resist the external attacks, but also can against the participant’s malicious attacks when the channel transmission efficiency η is above 50 %.  相似文献   

18.
In the regime of weak nonlinearity we present two general, feasible schemes for manipulating photon states. One is an entangler for generating any one of the n-photon Greenberger-Horne-Zeilinger (GHZ) states. Interactions of the incoming photons with cross-Kerr media followed by a phase shift gate and a measurement on a probe beam plus appropriate local operations using classical feed-forward of the measurement results allow one to obtain the desired states in a nearly deterministic manner. The second scheme discussed is an analyzer for multiphoton maximally entangled states, which is derived from the above entangler. In this scheme, all of the 2 n n-photon GHZ states can, nearly deterministically, be discriminated.  相似文献   

19.
We present a scheme for locally concentrating a non-maximally entangled four-photon cluster state into a maximally-entangled four-photon cluster state. This scheme has a high success probability. The controlled-NOT (CNOT) gate is a crucial ingredient in this scheme, and we use a nearly deterministic CNOT gate, which is similar with that first introduced by Nemoto et al. (Phgs. Rev. Lett., 2004, 93: 250502). This CNOT gate has a simple structure and does not need the strong nonlinearity.  相似文献   

20.
A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate operations and Controlled-NOT (CNOT) gate operations on them. Subsequently, the sender leaves one particle sequence and distributes the rest particles to the other participants. And then, the sender makes Bell-state measurements on her particles and publishes the measurement outcomes via the classical channel to realize the quantum state sharing among the others. Only the simple operations are used to realize quantum state sharing. The sender may increase or decrease the number of the participants by changing the number of the auxiliary particles.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号