排序方式: 共有118条查询结果,搜索用时 234 毫秒
11.
This paper reports that a quantum dense coding can be implemented
with ions confined in a linear trap and interacting with laser
beams. The scheme is insensitive to the interaction between the
quantum channel and the environment. The Bell-state measurement is
not involved and the probability of success in our scheme is $1.0$. 相似文献
12.
ZHANG Zhan-Jun LIU Yi-Min MAN Zhong-Xiao 《理论物理通讯》2005,44(11)
We present a method to teleport multi-qubit quantum information in an easy way from a sender to a receiver via the control of many agents in a network. Only when all the agents collaborate with the quantum information receiver can the unknown states in the sender‘s qubits be fully reconstructed in the receiver‘s qubits. In our method,agents‘s control parameters are obtained via quantum entanglement swapping. As the realization of the many-agent controlled teleportation is concerned, compared to the recent method [C.P. Yang, et al., Phys. Rev. A 70 (2004) 022329],our present method considerably reduces the preparation difficulty of initial states and the identification difficulty of entangled states, moreover, it does not need local Hadamard operations and it is more feasible in technology. 相似文献
13.
提出基于腔QED技术的多用户间的多原子W态和GHZ态量子信道的建立方案.在量子网络的空闲时段,各个用户和量子交换机共享EPR对.量子交换机通过原子和腔场的相互作用将两个EPR对制备成W态,再与另一个EPR对进行纠缠交换,经过直接测量后为用户建立三原子W态量子信道;同时讨论了四用户间的W态量子信道的建立方案.量子交换机对三个EPR对进行纠缠交换,将三个原子同时与腔场作用,经过直接测量后为用户建立三原子GHZ态量子信道;并将此方法推广到N个用户间的GHZ态量子信道的建立.
关键词:
腔QED
量子信道
量子交换机
纠缠交换 相似文献
14.
Su-Juan Qin Qiao-Yan Wen Song Lin Fen-Zhuo Guo Fu-Chen Zhu 《Optics Communications》2009,282(19):4017-4019
The security of a deterministic secure quantum communication using four-particle genuine entangled state and entanglement swapping [X.M. Xiu, H.K. Dong, L. Dong, Y.J. Cao, F. Chi, Opt. Commun. 282 (2009) 2457] is analyzed. It is shown that an eavesdropper can entangle an ancilla without introducing any error in the security test utilizing a speciality of the four-particle genuine entangled state. Moreover, the eavesdropper can distill a quarter of the secret information from her entangled ancilla. Finally, a simple improvement to resist this attack is proposed. 相似文献
15.
16.
A novel scheme of hybrid entanglement swapping and teleportation using cavity QED in the small and large detuning regimes and quasi-Bell state measurement method
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
We outline a scheme for entanglement swapping based on cavity QED as well as quasi-Bell state measurement(quasiBSM) methods. The atom–field interaction in the cavity QED method is performed in small and large detuning regimes.We assume two atoms are initially entangled together and, distinctly two cavities are prepared in an entangled coherent–coherent state. In this scheme, we want to transform entanglement to the atom-field system. It is observed that, the fidelities of the swapped entangled state in the quasi-BSM method can be compatible with those obtained in the small and large detuning regimes in the cavity QED method(the condition of this compatibility will be discussed). In addition, in the large detuning regime, the swapped entangled state is obtained by detecting and quasi-BSM approaches. In the continuation,by making use of the atom–field entangled state obtained in both approaches in a large detuning regime, we show that the atomic as well as field states teleportation with complete fidelity can be achieved. 相似文献
17.
Tian-Yu Ye 《理论物理通讯》2016,66(3):280-290
Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently, Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. 相似文献
18.
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps. 相似文献
19.
WU Dao-Hua DONG Ping YANG Ming CAO Zhuo-Liang 《理论物理通讯》2008,49(4):877-880
We propose a scheme for controlled entanglement swapping of continuous variable, where an EPR pair shared by two parties (Alice and Debbie) and a GHZ entangled state shared by three parties (Alice, Bob and Claire) are required. One optical beams of the EPR state will be entangled with the output mode displaced by Bob with the help of Claire. It is shown that the entanglement swapping can occur controlled by the third party (Claire) 相似文献
20.
Based on entanglement swapping, a quantum key distribution (QKD) scheme is proposed. In this scheme, the secret keys are formed by comparing initial Bell states and outcomes of entanglement swapping. Moreover, all initial Bell states prepared by Alice and Bob are completely arbitrary. As the classical information exchanged between two parties is very little, this QKD scheme has a high efficiency. In addition, in order to prevent eavesdropping, decoy particles are used. 相似文献