首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A deterministic secure quantum communication scheme using entanglement swapping is proposed. The sender prepares four-particle genuine entangled states and sends two particles in each state to the receiver and remains the rest particles. If the quantum channel is secure, they begin to communicate. After their four-particle projective measurements, the receiver can obtain the secret information according to his measurement outcomes and classical information from the sender. Using entanglement swapping, there are no particles carrying secret information to be transmitted.  相似文献   

2.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitarytransformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication.  相似文献   

3.
A novel quantum secure direct communication scheme based on four-qubit cluster states is proposed. In this scheme, the quantum channel between the sender Alice and the receiver Bob consists of an ordered sequence of cluster states which are prepared by Alice. After ensuring the security of quantum channel, Alice prepares the encoded Bell-state sequence, and performs Bell-basis measurements on the qubits at hand. Then Alice tells the measured results to Bob, and Bob also performs Bell-basis measurements on his own qubits. Finally Bob can get the secret information through the analysis of their measured results. In our scheme, the qubits carrying the secret message do not need to be transmitted in public channel. We show this scheme is determinate and secure.  相似文献   

4.
An efficient quantum secure direct communication protocol is presented over the amplitude damping channel. The protocol encodes logical bits in two-qubit noiseless states, and so it can function over a quantum channel subjected to collective amplitude damping. The feature of this protocol is that the sender encodes the secret directly on the quantum states, the receiver decodes the secret by performing determinate measurements, and there is no basis mismatch. The transmission’s safety is ensured by the nonorthogonality of the noiseless states traveling forward and backward on the quantum channel. Moreover, we construct the efficient quantum circuits to implement channel encoding and information encoding by means of primitive operations in quantum computation. Supported by the National Natural Science Foundation of China (Grant Nos. 60873191 and 60821001), the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 200800131016), the Natural Science Foundation of Beijing (Grant No. 4072020), the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601), and the ISN Open Foundation  相似文献   

5.
王东  查新未  兰倩  李宁  卫静 《中国物理 B》2011,20(9):90305-090305
In this paper, we propose a controlled quantum state sharing scheme to share an arbitrary two-qubit state using a five-qubit cluster state and the Bell state measurement. In this scheme, the five-qubit cluster state is shared by a sender (Alice), a controller (Charlie), and a receiver (Bob), and the sender only needs to perform the Bell-state measurements on her particles during the quantum state sharing process, the controller performs a single-qubit projective measurement on his particles, then the receiver can reconstruct the arbitrary two-qubit state by performing some appropriate unitary transformations on his particles after he has known the measured results of the sender and the controller.  相似文献   

6.
A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure.  相似文献   

7.
We propose two schemes for splitting single- and two-qubit states by using four-particle genuine entangled state as the quantum channel. After the sender performs Bell-basis (or three-partite GHZ- basis) measurements on her particles, and the cooperators operate single-particle measurements on their particles, the state receiver can reconstruct the original state of the sender by applying the appropriate unitary operation. In particular, in the scheme for splitting two-qubit state, the receiver needs to introduce an auxiliary particle and carries out a C-NOT operation.  相似文献   

8.
In this paper, two new efficient multiparty quantum direct secret sharing schemes are proposed via a six-particle GHZ state and Bell measurements. In the first scheme, based on the theory of security cryptanalysis, the secret message of the sender is directly encoded into the transmitted particles, and all the agents can obtain their information by performing bell measurement on the received particles, and then cooperate to recover the information of the sender. In the second scheme, we define a new secret shared coding method by performing local unitary operations on the transmitted particles, then agents perform Bell measurements on their own particles respectively, and feedback the measurement to the dealer. If the agent's results are matched with the previous coding method, the protocol will work out.In addition, the proposed two schemes have the following common advantages: the sender can send all prepared particles to the receiver, and can send an arbitrary key to the receiver, rather than a random secret key; the proposed schemes do not need to insert any detection sets to detect eavesdropping and can resist both existing attacks and spoofing attacks by dishonest agents. The sender need not to retain any photons, so the sender's quantum memory could be omitted here.  相似文献   

9.
We propose a scheme for remotely preparing a four-qubit cluster-type state with complex coefficients by using six EPR pairs as the quantum channel. To complete the remote state preparation scheme, a novel set of four-qubit mutually orthogonal basis vectors has been introduced. It is shown that, after the sender performs two different four-qubit projective measurements, the receiver can reconstruct the original state (to be prepared remotely) with unit successful probability. Moreover, the scheme is also generalized to the case that non-maximally two-qubit entangled states are taken as the quantum channel.  相似文献   

10.
Using partial entangled states as the quantum channel, two schemes for probabilistic remote preparation of the four-particle cluster-type state with real and complex coefficients are presented. In the first scheme, the sender and the receiver share two partial Bell states and one partial three-qubit GHZ stats as the quantum channel, and the sender can help a remote receiver to prepare a four-particle entangled cluster-type state by using three-qubit projective measurements with certain probability. In the second scheme, the quantum channel is composed of two partial three-qubit GHZ states, the remote state preparation (RSP) can be successfully realized via the positive operator valued measure (POVM), and the two-particle projective measurements are also needed in this process. The total success probability and classical communication cost are calculated.  相似文献   

11.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

12.
A five-qubit entangled state is constructed with the four-qubit genuine entangled state. As one of its applications, a controlled deterministic secure quantum communication scheme is proposed. Firstly, the supervisor prepares the five-qubit entangled state and distributes uniformly the four qubits to two users and keeps the rest one for control function. Then the receiver can perform jointly projective measurement on the encoded qubits from the sender to decrypt the secret information. The two-step security test ensures the security of the communication. Moreover, quantum dense coding is applied to enhance the capacity of quantum channel. The communication is realized under the control of the supervisor.  相似文献   

13.
刘俊昌  李渊华  聂义友 《光子学报》2014,39(11):2073-2077
通过对五粒子团簇态新应用的研究,提出了一个经济和简单的二粒子任意态的可控隐形传态方案.在这个方案中,发送者(Alice)、控制者(Charlie)和接收者(Bob)共享一个五粒子团簇态,发送者只需要执行Bell基测量,而控制者也仅需要执行单粒子投影测量.接受者根据发送者和控制者的测量结果,对自己拥有的粒子做适当的幺正变换,就可以重建发送者的二粒子任意态.这个可控隐形传态方案是决定性的,成功的概率为100%.与使用相同的量子信道进行二粒子任意态的可控隐形传送方案相比,不需要执行多粒子的联合测量,从而使得这个方案更加简单.  相似文献   

14.
通过对五粒子团簇态新应用的研究,提出了一个经济和简单的二粒子任意态的可控隐形传态方案.在这个方案中,发送者(Alice)、控制者(Charlie)和接收者(Bob)共享一个五粒子团簇态,发送者只需要执行Bell基测量,而控制者也仅需要执行单粒子投影测量.接受者根据发送者和控制者的测量结果,对自己拥有的粒子做适当的幺正变换,就可以重建发送者的二粒子任意态.这个可控隐形传态方案是决定性的,成功的概率为100%.与使用相同的量子信道进行二粒子任意态的可控隐形传送方案相比,不需要执行多粒子的联合测量,从而使得这个方案更加简单.  相似文献   

15.
We first provide four new schemes for two-party quantum teleportation of an arbitrary unknown multi-particle state by using three-, four-, and five-particle states as the quantum channel, respectively. The successful probability and fidelity of the four schemes reach 1. In the first two schemes, the receiver can only apply one of the unitary transformations to reconstruct the original state, making it easier for these two schemes to be directly realized. In the third and fourth schemes, the sender can preform Bell-state measurements instead of multipartite entanglement measurements of the existing similar schemes, which makes real experiments more suitable. It is found that the last three schemes may become tripartite controlled teleportation schemes of teleporting an arbitrary multi-particle state after a simple modification. Finally, we present a new scheme for three-party sharing an arbitrary unknown multi-particle state. In this scheme, the sender first shares three three-particle GHZ states with two agents. After setting up the secure quantum channel, an arbitrary unknown multi-particle state can be perfectly teleported if the sender performs three Bell-state measurements, and either of two receivers operates an appropriate unitary transformation to obtain the original state with the help of other receiver's three single-particle measurements. The successful probability and fidelity of this scheme also reach 1. It is demonstrated that this scheme can be generalized easily to the case of sharing an arbitrary unknown multi-particle state among several agents.  相似文献   

16.
利用三粒子W态隐形传送三粒子GHZ态   总被引:7,自引:1,他引:6  
提出一个三粒子GHZ(Greenberger-Horne-Zeilinger)态从发送者传送给两个接收者中任意一个的量子隐形传送方案。此方案用两个三粒子W态作为量子信道。若发送者进行两次贝尔态测量和阿达码门操作,想得到所需传送的三粒子GHZ态的接收者引进一个辅助粒子,进行控制-非操作,同时根据另一个接收者的测量结果实施一个适当的幺正变换操作,可以一定的概率成功地隐形传送三粒子GHZ态。同时,此方案可推广至隐形传送n粒子GHZ态,这时也只需用两个三粒子W态作为量子信道,但这时想得到所需传送的n粒子GHZ态的接收者需引进(n-2)个辅助粒子,进行(n-2)次控制非操作,同时根据另一个接收者的测量结果实施一个适当的幺正变换操作,可以一定的概率成功地隐形传送n粒子GHZ态。  相似文献   

17.
A novel quantum teleportation protocol for certain class of eight-qubit state is proposed. We utilize a six-qubit cluster state as quantum channel. In our scheme, the sender performs four controlled-NOT operations and a six-qubit von-Neumann projective measurement, the original state with deterministic probability can be reconstructed by the receiver. Higher efficiency can be achieved based on our results.  相似文献   

18.
Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit state. In this scheme, the sender transmits the two-qubit secret state to three agents who are divided into two grades with two Bell-state measurements,and broadcasts the measurement results via a classical channel. One agent is in the upper grade and two agents are in the lower grade. The agent in the upper grade only needs to cooperate with one of the other two agents to recover the secret state but both of the agents in the lower grade need help from all of the agents. Every agent who wants to recover the secret state needs to introduce two ancillary qubits and performs a positive operator-valued measurement(POVM) instead of the usual projective measurement. Moreover, due to the symmetry of the cluster state, we extend this protocol to multiparty agents.  相似文献   

19.

The main defects of the existing quantum secret sharing schemes are as follows: (1) The identity of the secret sender cannot be confirmed. Receivers of shared secret information may be vulnerable to Trojan attacks; (2) If a malicious attacker Eve impersonates the identity of the receiver, she can finally obtain all the information of the secret that Alice shared; (3) In the process of secret recovery, it is necessary to transmit qubits among all participants involved in secret recovery. Sometimes, the same particle needs to be operated on by all participants to achieve secret sharing, which increases the possibility of eavesdropping and also increases the probability of errors. In this work, we proposed a quantum secret sharing scheme with authentication, the receiver performs corresponding operations on qubits of Greenberger-Horne-Zeilinger(GHZ) state based on the key string calculated by the shared identity number and random Error Correction Code(ECC), the secret sender can calculate the corresponding measurement basis(MB) through the information she has, and then inform the measurement party. This process realizes the mutual authentication between the sender and the receiver. It can protect against identity impersonation attacks, through the ECC verification, it also can resist intercept-resend attacks.

  相似文献   

20.
A scheme for remotely preparingan arbitrary five-qubit Brown state by using three three-qubit GHZ states as the quantum channel is proposed. It is shown that, after the sender performs two different three-qubit projective measurements, the receiver should introduce two auxiliary qubits and employ suitable C-NOT gates, Toffoli gate and unitary operations on his qubits, the original state can be recovered with unit probability. Compared with the previous scheme, the advantage of the present scheme is that the entanglement resource can be reduced.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号