Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation
|
|
- Nancy Lee
- 5 years ago
- Views:
Transcription
1 Commun. Theor. Phys. 70 (208) Vol. 70, No. 5, November, 208 Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation Jin Shi ( 施锦 ) and You-Bang Zhan ( 詹佑邦 ) School of Physics and Electronic Electrical Engineering, Jiangsu Province Key Laboratory of Modern Measurement Technology and Intellige, Huaiyin Normal University, Huaian , China (Received April 3, 208; revised manuscript received June, 208) Abstract The scheme for asymmetric and deterministic controlled bidirectional joint remote state preparation by using one ten-qubit entangled state as the quantum channel is proposed. In this scheme, Alice and David want to remotely prepare an arbitrary single-qubit state at Bob s site, at the same time, Bob and Eve wish to help Alice remotely prepare an arbitrary two-qubit entangled state. Alice and Bob can simultaneously prepare the desired states with the cooperation of David and Eve under the control of Charlie. DOI: 0.088/ /70/5/55 Key words: joint remote state preparation, entangled state, unitary transformation Introduction As the carrier of information, quantum states are easily intercepted or replaced by eavesdroppers when direct transmission. Quantum teleportation (QT) [] and remote state preparation (RSP) [2 ] are two important techniques for transferring information in quantum communication. Based on quantum entanglement, many QT and RSP schemes can be realized via local operations and classical communication. Different from QT protocols, the prepared state is completely known to the sender in RSP schemes. RSP can consume less resources than QT, especially for reconstructing large quantum states. RSP protocols are widely used in quantum information. Various theoretical and experimental RSP schemes [5 6] have been proposed. In order to avoid the combination of information concentrated on one person, joint remote state preparation (JRSP) schemes [7 37] have been put forward. Each of senders knows partly the state to be prepared in JRSP, which is a secure method for transmitting quantum state. Deterministic joint remote state preparation is that the total successful probability reaches 00%. [32 37] Recently, as the new type of quantum communication schemes, bidirectional RSP schemes include symmetric bidirectional RSP [38 ] and asymmetric bidirectional RSP [2 6] have been proposed. The schemes of controlled bidirectional RSP (CBRSP) were presented. [7 8] The distant collaborators can simultaneously prepare the desired states with permission of the controller in CBRSP protocols. In this paper, a novel scheme for asymmetric and deterministic controlled bidirectional JRSP (CBJRSP) is proposed by using one ten-qubit entangled state as the quantum channel. In our asymmetric and deterministic CBJRSP scheme, Alice and David wish to remotely prepare an arbitrary single-qubit state at distant Bob s site, meanwhile, Bob and Eve want to remotely prepare an arbitrary two-qubit state at distant Alice s site under the control of the supervisor Charlie. It is shown that, only if the controller Charlie agrees to collaborate with four senders, they can remotely prepare the desired states by means of some appropriate basis vectors measurement and unitary operations. 2 Asymmetric and Deterministic CBJRSP by Using One Ten-Qubit Entangled State Since bidirectional QT schemes and bidirectional JRSP schemes by using multi-qubit entangled state have been reported in many papers, we try to propose the scheme for asymmetric and deterministic CBJRSP by using one ten-qubit entangled state as the quantum channel in this section. Suppose Alice and David wish to help Bob remotely prepare an arbitrary one-qubit state ϕ, at the same time, Bob and Eve wish to help Alice remotely prepare an arbitrary two-qubit state ϕ under the control of Charlie. ϕ = x 0 + y e iθ, () ϕ = a 00 + b e iα 0 + c e iα d e iα 3, (2) where modulus coefficients (x, y, a, b, c and d) are real and x 2 +y 2 =, a 2 +b 2 +c 2 +d 2 =. Alice knows modulus coefficients (x and y). David knows phase coefficient θ. Bob knows modulus coefficients (a, b, c and d). Eve knows phase coefficients α j, (j =, 2, 3). Alice, Bob, Charlie, David, and Eve share one ten-qubit entangled state as the quantum channel. φ,2,...,0 = 2 ( Supported by the National Natural Science Foundation of China under Grant No. 605 Corresponding author, altsj@hytc.edu.cn c 208 Chinese Physical Society and IOP Publishing Ltd
2 56 Communications in Theoretical Physics Vol ),2,...,0, (3) where the qubits, 9, and 0 belong to Alice, the qubits 3, 5, and 6 belong to Bob, the qubit belongs to Charlie, the qubit 2 belongs to David, the qubits 7 and 8 belong to Eve. As shown in Fig., we have presented the sketch of the protocol for CBJRSP via a ten-qubit entangled state as the quantum channel. Fig. The sketch of our CBJRSP protocol. The state φ,2,...,0 can be rewritten as φ,2,...,0 = [( ),2,3,5,...,0 + + ( ),2,3,5,...,0 ], () ± = ( 0 ± ). 2 (5) Asymmetric and deterministic CBJRSP can be realized under control of Charlie. The controller Charlie performs a one-qubit measurement on the qubit under the measuring basis { +, }. If the measuring result is +, then the state φ,2,...,0 can be transformed into ψ,2,3,5,...,0 = ( ),2,3,5,...,0. (6) Alice operates CNOT on her qubits and 9. The qubit as controlled qubit and the qubit 9 as target qubit (C NOT 9 ). Bob also operates CNOT on his qubits 3 and 5. The qubit 3 as controlled qubit and the qubit 5 as target qubit (C 3 NOT 5 ). Then the state ψ,2,3,5,...,0 can be transformed into ψ,2,3,5,...,0 = ( ),2,3,5,...,0. (7) The state can be rewritten as ψ,2,3,5,...,0 = ( ),2,3 ( ) 5,6,...,0. (8) If the measuring result is, then the state φ can be transformed into χ,2,3,5,...,0 = ( ),2,3,5,...,0. (9) Alice operates C NOT 9 on her qubits and 9. Bob also operates C 3 NOT 5 on his qubits 3 and 5. Then the state χ,2,3,5,...,0 can be transformed into χ,2,3,5,...,0 = ( ),2,3,5,...,0. (0) The state can be rewritten as χ,2,3,5,...,0 = ( 000 ),2,3 ( ) 5,...,0. ()
3 No. 5 Communications in Theoretical Physics 57 In order to complete the asymmetric and deterministic CBJRSP, Alice chooses a set of mutually orthogonal basis vectors { ν j } (j = 0, ) as the measuring basis of the qubit, which are given by ( ν0 ν ) = γ ( ) 0, (2) where γ is given ( ) x y γ =, (3) y x David chooses a set of mutually orthogonal basis vectors { κ (m) j }, (j, m = 0, ) as the measuring basis of the qubit 2, which are given by ( (m) ) κ 0 κ (m) = ( ) 0 χ (m), () 2 where ( e χ (0) iθ = e iθ ) ( e, χ () iθ ) = e iθ. (5) Bob chooses a set of mutually orthogonal basis vectors { δ j } (j = 0,, 2, 3) as the measuring basis of the qubits 5 and 6, which are given by δ 0 00 δ 0 δ 2 δ 3 = B 0, (6) where B is given a b c d b a d c B c d a b. (7) d c b a Eve chooses a set of mutually orthogonal basis vectors { η (m) j } (j, m = 0,, 2, 3) as the measuring basis of the qubits 7 and 8, which are given by η (m) 0 00 η (m) η (m) 2 = 0 2 ξ(m) 0, (8) η (m) 3 where e iα e iα 3 ξ (0) e iα e iα2 e iα3 e iα e iα 3, e iα e iα e iα 2 ξ () e iα e iα e iα3 e iα2, e iα e iα ξ (2) e iα2 e iα3 e iα e iα, e iα e iα ξ (3) e iα3 e iα2 e iα e iα. e iα Suppose the measuring results are +, ν 0, κ (0) 0 2, δ 0 5,6, and η (0), the state can be expressed as 7,8 η (0) 0 5,6 δ 0 2 κ (0) 0 ν 0 ψ,2,3,5,...,0 = 8 2 (x 0 + y e iθ ) 3 (a 00 + b e iα 0 + c e iα2 0 d e iα3 ) 9,0. (9) Bob makes unitary transformation (I) 3. Alice operates controlled σ z gate. The qubit 9 as controlled qubit and qubit 0 as target qubit [C 9 (σ z ) 0 ]. Then Alice and David help Bob remotely prepare the one-qubit state ϕ 3 = x y e iθ 3. Bob and Eve help Alice remotely prepare the two-qubit state ϕ 9,0 = (a 00 + b e iα 0 + c e iα d e iα 3 ) 9,0 simultaneously. If Charlie s measuring result is, Bob makes unitary transformation (σ z ) 3. Alice operates C 9 (σ z ) 0. Then Alice and David help Bob remotely prepare ϕ 3. At the same time, Bob and Eve help Alice remotely prepare the two-qubit state ϕ 9,0. All measuring results and operations of Alice and Bob, the measuring results of David and Eve are listed in Table. As we can see from Table, the measuring results are ν 0, δ 2 5,6,, κ (0) 2, η (2), then Bob makes unitary transformation (I) 3. Bob can obtain one-qubit state ϕ 3. Alice makes unitary transformation (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, and (σ x ) 9. Alice can obtain two-qubit state ϕ 9,0. Table and Eve. The measuring results and operations of Alice and Bob, the measuring results of David Alice (C NOT 9 ) Bob (C 3 NOT 5 ) David Eve ν 0, C 9 (σ z ) 0 δ 0 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 7,8 ν 0, (σ z ) 9, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (I) 3 ( + ) or(σ z ) 3 ( ) κ (0) ν 0, (σ z) 9, C 9 (σ z) 0 δ 0 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) ν 0, (σ z) 0, C 9 (σ z) 0, (σ x) 0 δ 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) 0 2 η ()
4 58 Communications in Theoretical Physics Vol. 70 Table (continued) ν 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 0 2 η () 7,8 ν 0, (σ z ) 9, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 0 2 η () ν 0, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 0 2 η () ν 0, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) ν 0, (σ z) 9, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) 7,8 ν 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, (σ x ) 9 (iσ y ) 0, C 9 (σ z ) 0 δ 3 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 7,8 ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, C 9 (σ z) 0 δ 0 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (0) ν 0, (σ z) 0, C 9 (σ z) 0 δ 0 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (0) 7,8 ν 0, (σ z ) 9, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (0) ν 0, (σ z ) 9, C 9 (σ z ) 0 δ 0 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (0) ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η () ν 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η () 7,8 ν 0, (σ z ) 9, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η () ν 0, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 0 δ 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η () ν 0, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (2) ν 0, (σ z) 9, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (2) 7,8 ν 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (2) ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (2) ν 0, (σ x ) 9 (iσ y ) 0, C 9 (σ z ) 0 δ 3 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (3) ν 0, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (3) 7,8 ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (3) ν 0, C 9 (σ z) 0, (σ x) 9 (σ x) 0 δ 3 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (3) ν, C 9 (σ z) 0 δ 0 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () ν, (σ z) 0, C 9 (σ z) 0 δ 0 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () 7,8 ν, (σ z ) 9, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ z ) 9, C 9 (σ z ) 0 δ 0 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () 0 2 η () ν, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () 0 2 η () 7,8 ν, (σ z) 9, C 9 (σ z) 0, (σ x) 0 δ 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () 0 2 η () ν, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 0 δ 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () 0 2 η () ν, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () ν, (σ z ) 9, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () 7,8 ν, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ x ) 9 ( iσ y ) 0, C 9 (σ z ) 0 δ 3 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () 7,8 ν, (σ z) 0, C 9 (σ z) 0, (σ x) 9 (σ x) 0 δ 3 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () ν, C 9 (σ z) 0, (σ x) 9 (σ x) 0 δ 3 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () ν, C 9 (σ z) 0 δ 0 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η (0) ν, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (0) 7,8 ν, (σ z ) 9, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (0) ν, (σ z ) 9, C 9 (σ z ) 0 δ 0 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (0)
5 No. 5 Communications in Theoretical Physics 59 Table (continued) ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η () ν, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η () 7,8 ν, (σ z ) 9, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η () ν, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 0 δ 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η () ν, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η (2) ν, (σ z) 9, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η (2) 7,8 ν, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (2) ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (2) ν, (σ x ) 9 ( iσ y ) 0, C 9 (σ z ) 0 δ 3 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (3) ν, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (3) 7,8 ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (3) ν, C 9 (σ z) 0, (σ x) 9 (σ x) 0 δ 3 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η (3) 3 Conclusion In summary, by using basis vectors measurement, controlled not gate operation, controlled σ z gate operation, and appropriate unitary transformations, the new scheme for asymmetric and deterministic CBJRSP is proposed. In this scheme, Alice and David remotely prepare an arbitrary single-qubit state at distant Bob s site. Meanwhile, Bob and Eve remotely prepare an arbitrary twoqubit state at distant Alice s site under the control of Charlie. Our CBJRSP process can be divided into two JRSP processes with only one controller. Different from former controlled JRSP schemes, the asymmetric and deterministic CBJRSP scheme proposed in this paper has higher efficiency and lower resource costs. The asymmetric and deterministic CBJRSP scheme herein has many potential applications in the field of quantum information. For example, in our asymmetric and deterministic CBJRSP scheme, Alice and Bob can exchange their quantum states simultaneously with the cooperators under the controller Charlie, which can realize long-distance safe transmission of information. Similarly, the asymmetric and deterministic CBJRSP scheme can be extended to CBJRSP of N (N > 2) different M-qubit (M > 2) quantum states. Multi-party exchange their quantum states at the same time with the cooperators under the controller, which can be applied in the quantum internet. Compared with other bidirectional JRSP protocols, our scheme is more secret. We have provided a new way to construct safer quantum channel for quantum secure communication. References [] C. H. Bennett, G. Brassard, C. Crépeau, et al., Phys. Rev. Lett. 70 (993) 895. [2] H. K. Lo, Phys. Rev. A 62 (2000) [3] A. K. Pati, Phys. Rev. A 63 (200) [] C. H. Bennett, P. Hayden, D. W. Leung, et al., Phys. Rev. Lett. 87 (200) [5] N. A. Peters, J. T. Barreiro, M. E. Goggin, et al., Phys. Rev. Lett. 9 (2005) [6] C. S. Yu, H. S. Song, and Y. H. Wang, Phys. Rev. A 73 (2006) [7] W. T. Liu, W. Wu, B. Q. Ou, et al., Phys. Rev. A 76(2) (2007) [8] M. A. Solis-Prosser and L. Neves, Phys. Rev. A 8 (20) [9] M. Radmark, M. Wiesniak, M. Zukowski, and M. Bourennane, Phys. Rev. A 88 (203) [0] J. H. Wei, H. Y. Dai, M. Zhang, et al., Int. J. Quantum Inf. (206) [] Y. S. Ra, H. T. Lim, and Y. H. Kim, Phys. Rev. A 9 (206) [2] M. G. Moreno, M. Cunha, and M. M. Parisio, Quantum Inf. Process. 5 (206) [3] J. M. Liu, X. L. Feng, and C. H Oh, J. Phys. B At. Mol. Opt. Phys. 2 (2009) [] L. F. Han and H. Yuan, Int. J. Quantum Inf. 9 (20) 539. [5] Y. B. Zhan, Europhys. Lett. 98 (202) [6] Y. Y. Nie, M. H. Sang, and L. P. Nie, Int. J. Theor. Phys. 56 (207) 883. [7] B. A. Nguyen and J. Kim, J. Phys. B At. Mol. Opt. Phys. (2008) [8] B. A. Nguyen, J. Phys. B At. Mol. Opt. Phys. 2 (2009) [9] B. A. Nguyen, Opt. Commun. 283 (200) 3. [20] Z. Y. Wang, Int. J. Quantum Inf. 9 (20) 809. [2] X. Q. Xiao, J. M. Liu, and G. H. Zeng, J. Phys. B At. Mol. Opt. Phys. (20) [22] M. X. Luo and Y. Deng, Int. J. Theor. Phys. 5 (202) [23] D. Wang and L. Ye, Int. J. Theor. Phys. 52 (203) [2] J. Y. Peng, M. X. Luo, and Z. W. Mo, Quantum Inf. Process. 2 (203) 2325.
6 520 Communications in Theoretical Physics Vol. 70 [25] J. Y. Peng, M. X. Luo, Z. W. Mo, and Z. G. Qu, Mod. Phys. Lett. B 27 (203) [26] B. S. Choudhury and A. Dhara, Quantum Inf. Process. (205) 373. [27] R. F. Yu, Y. J. Lin, and P. Zhou, Quantum Inf. Process. 5 (206) 785. [28] A. G. Adepoju, B. J. Falaye, G. H. Sun, et al., Phys. Lett. A 38 (207) 58. [29] Z. H. Wei, X. W. Zha, and Y. Yu, Int. J. Theor. Phys. 55 (206) 506. [30] D. Wang and L. Ye, Quantum Inf. Process. 2 (203) [3] Z. H. Zhang, L. Shu, Z. W. Mo, et al., Quantum Inf. Process. 3 (20) 979. [32] P. C. Ma, G. B. Chen, X. W. Li, and Y. B. Zhan, Laser Phys. 26 (206) 520. [33] M. M. Wang and Z. G. Qu, Quantum Inf. Process. 5 (206) 805. [3] Y. B. Zhan and P. C. Ma, Quantum Inf. Process. 2 (203) 997. [35] N. B. An, C. T. Bich, and N. Van Don, Phys. Lett. A 375 (20) [36] M. X. Ding, M. Jiang, and Y. H. Liu, Optik 27 (206) 068. [37] C. T. Bich, N. V. Don, and N. B. An, Int. J. Theor. Phys. 5 (202) [38] D. Zhang, X. W. Zha, Y. J. Duan, and Y. Q. Yang, Quantum Inf. Process. 5 (206) 269. [39] X. B. Chen, Y. R. Sun, G. Xu, et al., Quantum Inf. Process. 6 (207) 2. [0] V. Sharma, C. Shukla, S. Banerjee, and A. Pathak, Quantum Inf. Process. (205) 3. [] X. Y. Wang and Z. W. Mo, Int. J. Theor. Phys. 56 (207) 052. [2] Z. W. Sang, Int. J. Theor. Phys. 56 (207) [3] P. C. Ma, G. B. Chen, X. W. Li, et al., Int. J. Theor. Phys. 56 (206) 276. [] P. C. Ma, G. B. Chen, X. W. Li, and Y. B. Zhan, Laser Phys. 27 (207) [5] Y. Song, J. L. Ni, Z. Y. Wang, et al., Int. J. Theor. Phys. 56 (207) 375. [6] P. C. Ma, G. B. Chen, X. W. Li, and Y. B. Zhan, Quantum Inf. Process. 6 (207) 308. [7] D. Zhang, X. W. Zha, Y. J. Duan, and Z. H. Wei, Int. J. Theor. Phys. 55 (206) 0. [8] J. Y. Peng, M. Q. Bai, and Z. W. Mo, Quantum Inf. Process. (205) 263.
Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties
Commun. Theor. Phys. 67 (2017) 377 382 Vol. 67, No. 4, April 1, 2017 Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties Lei Shi ( 石磊
More informationPerfect quantum teleportation and dense coding protocols via the 2N-qubit W state
Perfect quantum teleportation and dense coding protocols via the -qubit W state Wang Mei-Yu( ) a)b) and Yan Feng-Li( ) a)b) a) College of Physics Science and Information Engineering, Hebei ormal University,
More informationControlled Quantum Teleportation via Four Particle Asymmetric Entangled State *
IOSR Journal of Applied Physics (IOSR-JAP) e-issn: 2278-4861.Volume 9, Issue 1 Ver. III (Jan. Feb. 2017), PP 32-37 www.iosrjournals.org Controlled Quantum Teleportation via Four Particle Asymmetric Entangled
More informationBidirectional quantum teleportation and secure direct communication via entanglement swapping
Bidirectional quantum teleportation and secure direct communication via entanglement swapping Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International
More informationEfficient controlled quantum secure direct communication based on GHZ-like states
Efficient controlled quantum secure direct communication based on GHZ-like states Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International
More informationControlled Remote Preparation of a Two-Qubit State via an Asymmetric Quantum Channel
Commun. Theor. Phys. 55 (0) 44 50 Vol. 55 No. February 5 0 Controlled Remote Preparation of a Two-Qubit State via an Asymmetric Quantum Channel WANG Zhang-Yin ( ) Key Laboratory of Optoelectronic Information
More informationarxiv:quant-ph/ v1 27 Dec 2004
Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,
More informationQuantum secret sharing based on quantum error-correcting codes
Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,
More informationMultiparty Quantum Remote Control
Multiparty Quantum Remote Control Yu-Ting Chen and Tzonelih Hwang Abstract This paper proposes a multiparty quantum remote control (MQRC) protocol, which allows several controllers to perform remote operations
More informationSymmetric remote two-qubit preparation via positive operator-valued measure
J. At. Mol. Sci. doi: 0.4208/jams.0630.0720a Vol., No. 4, pp. 352-368 November 200 Symmetric remote two-qubit preparation via positive operator-valued measure Zhang-Yin Wang a, and Xing-Qiang Yang b, a
More informationarxiv:quant-ph/ v2 2 Jan 2007
Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1
More informationMultiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State
Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure
More informationRemote Preparation of Multipartite Equatorial Entangled States in High Dimensions with Three Parties
Commun. Theor. Phys. (Beiing, China) 51 (2009) pp. 641 647 c Chinese Physical Society an IOP Publishing Lt Vol. 51, No. 4, April 15, 2009 Remote Preparation of Multipartite Equatorial Entangle States in
More informationSelection of unitary operations in quantum secret sharing without entanglement
. RESEARCH PAPERS. SCIENCE CHINA Information Sciences September 2011 Vol. 54 No. 9: 1837 1842 doi: 10.1007/s11432-011-4240-9 Selection of unitary operations in quantum secret sharing without entanglement
More information(Received 22 October 2009; revised manuscript received 30 December 2010)
Chin. Phys. B Vol. 19 No. 9 010) 090313 Teleportation and thermal entanglement in two-qubit Heisenberg XY Z spin chain with the Dyaloshinski Moriya interaction and the inhomogeneous magnetic field Gao
More informationTwo-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State
Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang
More informationarxiv:quant-ph/ v1 10 Apr 2006
Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification
More informationGeneration and classification of robust remote symmetric Dicke states
Vol 17 No 10, October 2008 c 2008 Chin. Phys. Soc. 1674-1056/2008/17(10)/3739-05 Chinese Physics B and IOP Publishing Ltd Generation and classification of robust remote symmetric Dicke states Zhu Yan-Wu(
More informationScheme for implementing perfect quantum teleportation with four-qubit entangled states in cavity quantum electrodynamics
Scheme for implementing perfect quantum teleportation with four-qubit entangled states in cavity quantum electrodynamics Tang Jing-Wu( ), Zhao Guan-Xiang( ), and He Xiong-Hui( ) School of Physics, Hunan
More informationTeleportation of an n-bit one-photon and vacuum entangled GHZ cavity-field state
Vol 6 No, January 007 c 007 Chin. Phys. Soc. 009-963/007/6(0)/08-05 Chinese Physics and IOP Publishing Ltd Teleportation of an n-bit one-photon and vacuum entangled GHZ cavity-field state Lai Zhen-Jiang(
More informationQuantum communication protocols based on entanglement swapping
Journal of Physics: Conference Series PAPER OPEN ACCESS Quantum communication protocols based on entanglement swapping To cite this article: Guillermo Morales-Luna 015 J. Phys.: Conf. Ser. 64 01003 View
More informationA Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State
Commun. Theor. Phys. 70 (018) 43 48 Vol. 70, No. 1, July 1, 018 A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State Xu-Feng Niu ( 牛旭峰 ), 1 Jian-Zhong Zhang ( 张建中 ),
More informationAn Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States
Commun. Theor. Phys. 65 (2016) 705 710 Vol. 65, No. 6, June 1, 2016 An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Shu-Jiang Xu (Å ), 1, Xiu-Bo
More informationNo. 12 Probabilistic teleportation of an arbitrary Suppose that the sender (Ali) wants to transmit an unknown arbitrary three-particle state t
Vol 12 No 12, Demr 2003 cfl 2003 Chin. Phys. Soc. 1009-1963/2003/12(12)/1354-06 Chinese Physics and IOP Publishing Ltd Probabilistic teleportation of an arbitrary three-particle state via a partial entangled
More informationCircular Semi-Quantum Secret Sharing Using Single Particles
Commun. Theor. Phys. 70 (018) 661 671 Vol. 70 No. 6 December 1 018 Circular Semi-Quantum Secret Sharing Using Single Particles Chong-Qiang Ye ( 叶崇强 ) and Tian-Yu Ye ( 叶天语 ) College of Information & Electronic
More informationSingle-Qubit Operation Sharing with Bell and W Product States
Commun. Theor. Phys. 60 (013) 165 170 Vol. 60, No., August 15, 013 Single-Qubit Operation Sharing with Bell and W Product States JI Qi-Bin ( É), 1 LIU Yi-Min ( ), LIU Xian-Song ( Ø), 1 YIN Xiao-Feng (
More informationQuantum Secure Direct Communication with Authentication Expansion Using Single Photons
Commun. Theor. Phys. (Beijing, China) 54 (2010) pp. 829 834 c Chinese Physical Society and IOP Publishing Ltd Vol. 54, No. 5, November 15, 2010 Quantum Secure Direct Communication with Authentication Expansion
More informationarxiv: v1 [quant-ph] 7 Feb 2016
Entanglement concentration for concatenated Greenberger-Horne-Zeiglinger state with feasible linear optics Yu-Bo Sheng, 1 Chang-Cheng Qu, 1 Lan Zhou 1, 1 Key Lab of Broadband Wireless Communication and
More informationo. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c
Vol 14 o 5, May 005 cfl 005 Chin. Phys. Soc. 1009-1963/005/14(05)/0974-06 Chinese Physics and IOP Publishing Ltd Proposal of many-party controlled teleportation for multi-qubit entangled W state * Huang
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationTeleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)
Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis
More informationarxiv:quant-ph/ v1 6 Dec 2005
Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School
More informationQuantum Dense Coding and Quantum Teleportation
Lecture Note 3 Quantum Dense Coding and Quantum Teleportation Jian-Wei Pan Bell states maximally entangled states: ˆ Φ Ψ Φ x σ Dense Coding Theory: [C.. Bennett & S. J. Wiesner, Phys. Rev. Lett. 69, 88
More informationQuantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State
Entropy 5, 7, 67-675; doi:.9/e767 rticle OPEN CCESS entropy ISSN 99- www.mdpi.com/journal/entropy Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle
More informationInstantaneous Nonlocal Measurements
Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.
More informationFault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States
Commun. Theor. Phys. 63 (015) 431 438 Vol. 63, No. 4, April 1, 015 Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States YE Tian-Yu
More informationAttacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
entropy Article Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol Michel Boyer, Rotem Liss, * and Tal Mor Département d Informatique et de Recherche Opérationnelle
More informationTwo-mode excited entangled coherent states and their entanglement properties
Vol 18 No 4, April 2009 c 2009 Chin. Phys. Soc. 1674-1056/2009/18(04)/1328-05 Chinese Physics B and IOP Publishing Ltd Two-mode excited entangled coherent states and their entanglement properties Zhou
More informationQuantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement
Commun. Theor. Phys. 56 (2011) 81 86 Vol. 56, No. 5, November 15, 2011 Quantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement SHI Jin (æ ), 1,2 GONG Yan-Xiao ( ), 1 XU Ping (Å
More informationarxiv: v1 [quant-ph] 18 May 2018
Measurement-Device-Independent Quantum Secure Direct Communication, arxiv:1805.078v1 [quant-ph] 18 May 018 Zeng-Rong Zhou, 1,, 3, 4, 5, 6, Yu-Bo Sheng, 7, 8, 9, Peng-Hao Niu, 1,, 3, 4, 5, 6 Liu-Guo Yin,
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationScheme for teleportation of unknown states of trapped ion
Vol 17 No, February 008 c 008 Chin. Phys. Soc. 1674-1056/008/17(0/0451-05 Chinese Physics B and IOP Publishing Ltd Scheme for teleportation of unknown states of trapped ion Chen Mei-Feng( and Ma Song-She(
More informationarxiv: v2 [quant-ph] 9 Nov 2011
Intercept-resend attacks on Semiquantum secret sharing and the Improvements arxiv:1106.4908v2 [quant-ph] 9 Nov 2011 Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, and Tzonelih Hwang Abstract Recently, Li et
More informationarxiv: v7 [quant-ph] 20 Mar 2017
Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute
More informationAnalysing the role of entanglement in the three-qubit Vaidman s game
Analysing the role of entanglement in the three-qubit Vaidman s game arxiv:807.056v [quant-ph] Jul 08 Hargeet Kaur Department of Chemistry Indian Institute of Technology Jodhpur, Rajasthan Email: kaur.@iitj.ac.in
More informationMultiparty Secure Communication by Using Quantum Key Distribution Protocols
Multiparty Secure Communication by Using Quantum Key Distribution Protocols K.Gopinath 1, B.J.Job karuna sagar 2 1. Associate Professor,Department of Computer Science and Engineering, K.S.R.M.College of
More informationTransmitting and Hiding Quantum Information
2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents
More informationarxiv:quant-ph/ v1 13 Jan 2003
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The
More informationExperimental demonstrations of teleportation of photons. Manuel Chinotti and Nikola Đorđević
Experimental demonstrations of teleportation of photons Manuel Chinotti and Nikola Đorđević Outline Quantum teleportation (QT) protocol. Laboratory experimental demonstration: Bouwmeester at al. (1997).
More informationQuantum Teleportation Pt. 3
Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation
More informationMultiparty Quantum Secret Sharing Using Quantum Fourier Transform
Commun. Theor. Phys. (Beijing, China) 51 (2009) pp. 221 226 c Chinese Physical Society and IOP Publishing Ltd Vol. 51, No. 2, February 15, 2009 Multiparty Quantum Secret Sharing Using Quantum Fourier Transform
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationExperimental realization of quantum cryptography communication in free space
Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao
More informationON THE ROLE OF THE BASIS OF MEASUREMENT IN QUANTUM GATE TELEPORTATION. F. V. Mendes, R. V. Ramos
ON THE ROLE OF THE BASIS OF MEASREMENT IN QANTM GATE TELEPORTATION F V Mendes, R V Ramos fernandovm@detiufcbr rubens@detiufcbr Lab of Quantum Information Technology, Department of Teleinformatic Engineering
More informationQuantum Cryptography
http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.
More informationarxiv:quant-ph/ v2 11 Jan 2006
Quantum Authentication and Quantum Key Distribution Protocol Hwayean Lee 1,,3, Jongin Lim 1,, and HyungJin Yang,4 arxiv:quant-ph/0510144v 11 Jan 006 Center for Information Security Technologies(CIST) 1,
More informationProbabilistic exact cloning and probabilistic no-signalling. Abstract
Probabilistic exact cloning and probabilistic no-signalling Arun Kumar Pati Quantum Optics and Information Group, SEECS, Dean Street, University of Wales, Bangor LL 57 IUT, UK (August 5, 999) Abstract
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationSquashed entanglement
Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication
More informationChapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution
Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation
More informationarxiv:quant-ph/ v1 1 Jun 2000
Probabilistic teleportation of two-particle entangled state Bao-Sen Shi, Yun-Kun Jiang and Guang-Can Guo Lab. of Quantum Communication and Quantum Computation Department of Physics University of Science
More informationHilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.
CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as
More informationEntanglement concentration for multi-atom GHZ class state via cavity QED
Vol 5 No, December 006 c 006 Chin. Phys. Soc. 009-963/006/5()/953-06 Chinese Physics and IOP Publishing Ltd Entanglement concentration for multi-atom GHZ class state via cavity QED Jiang Chun-Lei( ), Fang
More informationTheory of Quantum Entanglement
Theory of Quantum Entanglement Shao-Ming Fei Capital Normal University, Beijing Universität Bonn, Bonn Richard Feynman 1980 Certain quantum mechanical effects cannot be simulated efficiently on a classical
More informationNew Feedback Control Model in the Lattice Hydrodynamic Model Considering the Historic Optimal Velocity Difference Effect
Commun. Theor. Phys. 70 (2018) 803 807 Vol. 70, No. 6, December 1, 2018 New Feedback Control Model in the Lattice Hydrodynamic Model Considering the Historic Optimal Velocity Difference Effect Guang-Han
More informationUniversal Blind Quantum Computing
Universal Blind Quantum Computing Elham Kashefi Laboratoire d Informatique de Grenoble Joint work with Anne Broadbent Montreal Joe Fitzsimons Oxford Classical Blind Computing Fundamentally asymmetric unlike
More informationarxiv:quant-ph/ May 2002
Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of
More informationDeterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States
Commun. Theor. Phys. 56 (2011) 664 668 Vol. 56, No. 4, October 15, 2011 Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States HE Guang-Qiang (¾Ö), ZHU Jun (ý ), and ZENG Gui-Hua
More informationEntanglement and Quantum Teleportation
Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,
More informationLecture 4: Postulates of quantum mechanics
Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying
More informationRadiation energy flux of Dirac field of static spherically symmetric black holes
Radiation energy flux of Dirac field of static spherically symmetric black holes Meng Qing-Miao( 孟庆苗 ), Jiang Ji-Jian( 蒋继建 ), Li Zhong-Rang( 李中让 ), and Wang Shuai( 王帅 ) Department of Physics, Heze University,
More informationThermal quantum discord in Heisenberg models with Dzyaloshinski Moriya interaction
Thermal quantum discord in Heisenberg models with Dzyaloshinski Moriya interaction Wang Lin-Cheng(), Yan Jun-Yan(), and Yi Xue-Xi() School of Physics and Optoelectronic Technology, Dalian University of
More informationEavesdropping or Disrupting a Communication On the Weakness of Quantum Communications
Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Zhengjun Cao Abstract What is the behavior of an adversary to launch attacks against a communication? The good choice
More informationAn Efficient and Economic Scheme for Remotely Preparing a Multi-Qudit State via a Single Entangled Qudit Pair
Commun. Theor. Phys. (Beijing, China) 54 (2010) pp. 46 468 c Chinese Physical Society an IOP Publishing Lt Vol. 54, No., September 15, 2010 An Efficient an Economic Scheme for Remotely Preparing a Multi-Quit
More informationExperimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger
Experimental quantum teleportation Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger NATURE VOL 390 11 DECEMBER 1997 Overview Motivation General theory behind
More informationQuantum Teleportation Pt. 1
Quantum Teleportation Pt. 1 PHYS 500 - Southern Illinois University April 17, 2018 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 1 April 17, 2018 1 / 13 Types of Communication In the
More informationarxiv: v1 [quant-ph] 25 Apr 2017
Deterministic creation of a four-qubit W state using one- and two-qubit gates Firat Diker 1 and Can Yesilyurt 2 1 Faculty of Engineering and Natural Sciences, arxiv:170.0820v1 [quant-ph] 25 Apr 2017 Sabanci
More informationQuantum Gates, Circuits & Teleportation
Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary
More informationCritical entanglement and geometric phase of a two-qubit model with Dzyaloshinski Moriya anisotropic interaction
Chin. Phys. B Vol. 19, No. 1 010) 010305 Critical entanglement and geometric phase of a two-qubit model with Dzyaloshinski Moriya anisotropic interaction Li Zhi-Jian 李志坚 ), Cheng Lu 程璐 ), and Wen Jiao-Jin
More informationIntroduction to Quantum Information Hermann Kampermann
Introduction to Quantum Information Hermann Kampermann Heinrich-Heine-Universität Düsseldorf Theoretische Physik III Summer school Bleubeuren July 014 Contents 1 Quantum Mechanics...........................
More informationDeterministic secure communications using two-mode squeezed states
Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May
More informationQuantum information and quantum computing
Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement
More informationKnotted Pictures of Hadamard Gate and CNOT Gate
Commun. Theor. Phys. (Beijing, China) 51 (009) pp. 967 97 c Chinese Physical Society and IOP Publishing Ltd Vol. 51, No. 6, June 15, 009 Knotted Pictures of Hadamard Gate and CNOT Gate GU Zhi-Yu 1 and
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More informationarxiv:quant-ph/ v2 23 Aug 2003
An Architecture of Deterministic Quantum Central Processing Unit arxiv:quant-ph/0207032v2 23 Aug 2003 Fei Xue a, Zeng-Bing Chen a Mingjun Shi a Xianyi Zhou a Jiangfeng Du a Rongdian Han a a Department
More informationarxiv: v5 [quant-ph] 28 Oct 2015
arxiv:140.643v5 [quant-ph] 8 Oct 015 Quantum Entanglement Establishment between two Strangers Tzonelih Hwang, Tzu-Han Lin, and Shih-Hung Kao February 7, 018 Abstract This paper presents the first quantum
More informationQuantum Optical Implementation of Quantum Communication
Quantum Optical Implementation of Quantum Communication Li Yongmin, Zhang Kuanshou State Key Lab of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan,
More informationLecture 11 September 30, 2015
PHYS 7895: Quantum Information Theory Fall 015 Lecture 11 September 30, 015 Prof. Mark M. Wilde Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike
More informationGeneralized projective synchronization of a class of chaotic (hyperchaotic) systems with uncertain parameters
Vol 16 No 5, May 2007 c 2007 Chin. Phys. Soc. 1009-1963/2007/16(05)/1246-06 Chinese Physics and IOP Publishing Ltd Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with
More informationSingle qubit + CNOT gates
Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose
More informationTeleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels 1
Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels Charles H. Bennet, Gilles Brassard, Claude Crépeau, Richard Jozsa, Asher Peres, and William K. Wootters Team
More informationQuantum Cryptography
Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum
More informationHigh rate quantum cryptography with untrusted relay: Theory and experiment
High rate quantum cryptography with untrusted relay: Theory and experiment CARLO OTTAVIANI Department of Computer Science, The University of York (UK) 1st TWQI Conference Ann Arbor 27-3 July 2015 1 In
More informationarxiv: v3 [quant-ph] 6 Sep 2009
Semi-quantum secret sharing using entangled states Qin Li, 1 W. H. Chan, and Dong-Yang Long 1 1 Department of Computer Science, Sun Yat-sen University, Guangzhou 51075, China Department of Mathematics,
More informationAsymptotic Analysis of a Three State Quantum Cryptographic Protocol
Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key
More informationUniversal Associated Legendre Polynomials and Some Useful Definite Integrals
Commun. Theor. Phys. 66 0) 158 Vol. 66, No., August 1, 0 Universal Associated Legendre Polynomials and Some Useful Definite Integrals Chang-Yuan Chen í ), 1, Yuan You ), 1 Fa-Lin Lu öß ), 1 Dong-Sheng
More informationRemote State Preparation: Arbitrary remote control of photon polarizations for quantum communication
Remote State Preparation: Arbitrary remote control of photon polarizations for quantum communication N. A. Peters a, J. T. Barreiro a, M. E. Goggin a,b, T.-C. Wei a, and P. G. Kwiat a a Physics Department,
More informationNew Homoclinic and Heteroclinic Solutions for Zakharov System
Commun. Theor. Phys. 58 (2012) 749 753 Vol. 58, No. 5, November 15, 2012 New Homoclinic and Heteroclinic Solutions for Zakharov System WANG Chuan-Jian ( ), 1 DAI Zheng-De (à ), 2, and MU Gui (½ ) 3 1 Department
More informationTechnical Report Communicating Secret Information Without Secret Messages
Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,
More information