Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation

Size: px
Start display at page:

Download "Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation"

Transcription

1 Commun. Theor. Phys. 70 (208) Vol. 70, No. 5, November, 208 Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation Jin Shi ( 施锦 ) and You-Bang Zhan ( 詹佑邦 ) School of Physics and Electronic Electrical Engineering, Jiangsu Province Key Laboratory of Modern Measurement Technology and Intellige, Huaiyin Normal University, Huaian , China (Received April 3, 208; revised manuscript received June, 208) Abstract The scheme for asymmetric and deterministic controlled bidirectional joint remote state preparation by using one ten-qubit entangled state as the quantum channel is proposed. In this scheme, Alice and David want to remotely prepare an arbitrary single-qubit state at Bob s site, at the same time, Bob and Eve wish to help Alice remotely prepare an arbitrary two-qubit entangled state. Alice and Bob can simultaneously prepare the desired states with the cooperation of David and Eve under the control of Charlie. DOI: 0.088/ /70/5/55 Key words: joint remote state preparation, entangled state, unitary transformation Introduction As the carrier of information, quantum states are easily intercepted or replaced by eavesdroppers when direct transmission. Quantum teleportation (QT) [] and remote state preparation (RSP) [2 ] are two important techniques for transferring information in quantum communication. Based on quantum entanglement, many QT and RSP schemes can be realized via local operations and classical communication. Different from QT protocols, the prepared state is completely known to the sender in RSP schemes. RSP can consume less resources than QT, especially for reconstructing large quantum states. RSP protocols are widely used in quantum information. Various theoretical and experimental RSP schemes [5 6] have been proposed. In order to avoid the combination of information concentrated on one person, joint remote state preparation (JRSP) schemes [7 37] have been put forward. Each of senders knows partly the state to be prepared in JRSP, which is a secure method for transmitting quantum state. Deterministic joint remote state preparation is that the total successful probability reaches 00%. [32 37] Recently, as the new type of quantum communication schemes, bidirectional RSP schemes include symmetric bidirectional RSP [38 ] and asymmetric bidirectional RSP [2 6] have been proposed. The schemes of controlled bidirectional RSP (CBRSP) were presented. [7 8] The distant collaborators can simultaneously prepare the desired states with permission of the controller in CBRSP protocols. In this paper, a novel scheme for asymmetric and deterministic controlled bidirectional JRSP (CBJRSP) is proposed by using one ten-qubit entangled state as the quantum channel. In our asymmetric and deterministic CBJRSP scheme, Alice and David wish to remotely prepare an arbitrary single-qubit state at distant Bob s site, meanwhile, Bob and Eve want to remotely prepare an arbitrary two-qubit state at distant Alice s site under the control of the supervisor Charlie. It is shown that, only if the controller Charlie agrees to collaborate with four senders, they can remotely prepare the desired states by means of some appropriate basis vectors measurement and unitary operations. 2 Asymmetric and Deterministic CBJRSP by Using One Ten-Qubit Entangled State Since bidirectional QT schemes and bidirectional JRSP schemes by using multi-qubit entangled state have been reported in many papers, we try to propose the scheme for asymmetric and deterministic CBJRSP by using one ten-qubit entangled state as the quantum channel in this section. Suppose Alice and David wish to help Bob remotely prepare an arbitrary one-qubit state ϕ, at the same time, Bob and Eve wish to help Alice remotely prepare an arbitrary two-qubit state ϕ under the control of Charlie. ϕ = x 0 + y e iθ, () ϕ = a 00 + b e iα 0 + c e iα d e iα 3, (2) where modulus coefficients (x, y, a, b, c and d) are real and x 2 +y 2 =, a 2 +b 2 +c 2 +d 2 =. Alice knows modulus coefficients (x and y). David knows phase coefficient θ. Bob knows modulus coefficients (a, b, c and d). Eve knows phase coefficients α j, (j =, 2, 3). Alice, Bob, Charlie, David, and Eve share one ten-qubit entangled state as the quantum channel. φ,2,...,0 = 2 ( Supported by the National Natural Science Foundation of China under Grant No. 605 Corresponding author, altsj@hytc.edu.cn c 208 Chinese Physical Society and IOP Publishing Ltd

2 56 Communications in Theoretical Physics Vol ),2,...,0, (3) where the qubits, 9, and 0 belong to Alice, the qubits 3, 5, and 6 belong to Bob, the qubit belongs to Charlie, the qubit 2 belongs to David, the qubits 7 and 8 belong to Eve. As shown in Fig., we have presented the sketch of the protocol for CBJRSP via a ten-qubit entangled state as the quantum channel. Fig. The sketch of our CBJRSP protocol. The state φ,2,...,0 can be rewritten as φ,2,...,0 = [( ),2,3,5,...,0 + + ( ),2,3,5,...,0 ], () ± = ( 0 ± ). 2 (5) Asymmetric and deterministic CBJRSP can be realized under control of Charlie. The controller Charlie performs a one-qubit measurement on the qubit under the measuring basis { +, }. If the measuring result is +, then the state φ,2,...,0 can be transformed into ψ,2,3,5,...,0 = ( ),2,3,5,...,0. (6) Alice operates CNOT on her qubits and 9. The qubit as controlled qubit and the qubit 9 as target qubit (C NOT 9 ). Bob also operates CNOT on his qubits 3 and 5. The qubit 3 as controlled qubit and the qubit 5 as target qubit (C 3 NOT 5 ). Then the state ψ,2,3,5,...,0 can be transformed into ψ,2,3,5,...,0 = ( ),2,3,5,...,0. (7) The state can be rewritten as ψ,2,3,5,...,0 = ( ),2,3 ( ) 5,6,...,0. (8) If the measuring result is, then the state φ can be transformed into χ,2,3,5,...,0 = ( ),2,3,5,...,0. (9) Alice operates C NOT 9 on her qubits and 9. Bob also operates C 3 NOT 5 on his qubits 3 and 5. Then the state χ,2,3,5,...,0 can be transformed into χ,2,3,5,...,0 = ( ),2,3,5,...,0. (0) The state can be rewritten as χ,2,3,5,...,0 = ( 000 ),2,3 ( ) 5,...,0. ()

3 No. 5 Communications in Theoretical Physics 57 In order to complete the asymmetric and deterministic CBJRSP, Alice chooses a set of mutually orthogonal basis vectors { ν j } (j = 0, ) as the measuring basis of the qubit, which are given by ( ν0 ν ) = γ ( ) 0, (2) where γ is given ( ) x y γ =, (3) y x David chooses a set of mutually orthogonal basis vectors { κ (m) j }, (j, m = 0, ) as the measuring basis of the qubit 2, which are given by ( (m) ) κ 0 κ (m) = ( ) 0 χ (m), () 2 where ( e χ (0) iθ = e iθ ) ( e, χ () iθ ) = e iθ. (5) Bob chooses a set of mutually orthogonal basis vectors { δ j } (j = 0,, 2, 3) as the measuring basis of the qubits 5 and 6, which are given by δ 0 00 δ 0 δ 2 δ 3 = B 0, (6) where B is given a b c d b a d c B c d a b. (7) d c b a Eve chooses a set of mutually orthogonal basis vectors { η (m) j } (j, m = 0,, 2, 3) as the measuring basis of the qubits 7 and 8, which are given by η (m) 0 00 η (m) η (m) 2 = 0 2 ξ(m) 0, (8) η (m) 3 where e iα e iα 3 ξ (0) e iα e iα2 e iα3 e iα e iα 3, e iα e iα e iα 2 ξ () e iα e iα e iα3 e iα2, e iα e iα ξ (2) e iα2 e iα3 e iα e iα, e iα e iα ξ (3) e iα3 e iα2 e iα e iα. e iα Suppose the measuring results are +, ν 0, κ (0) 0 2, δ 0 5,6, and η (0), the state can be expressed as 7,8 η (0) 0 5,6 δ 0 2 κ (0) 0 ν 0 ψ,2,3,5,...,0 = 8 2 (x 0 + y e iθ ) 3 (a 00 + b e iα 0 + c e iα2 0 d e iα3 ) 9,0. (9) Bob makes unitary transformation (I) 3. Alice operates controlled σ z gate. The qubit 9 as controlled qubit and qubit 0 as target qubit [C 9 (σ z ) 0 ]. Then Alice and David help Bob remotely prepare the one-qubit state ϕ 3 = x y e iθ 3. Bob and Eve help Alice remotely prepare the two-qubit state ϕ 9,0 = (a 00 + b e iα 0 + c e iα d e iα 3 ) 9,0 simultaneously. If Charlie s measuring result is, Bob makes unitary transformation (σ z ) 3. Alice operates C 9 (σ z ) 0. Then Alice and David help Bob remotely prepare ϕ 3. At the same time, Bob and Eve help Alice remotely prepare the two-qubit state ϕ 9,0. All measuring results and operations of Alice and Bob, the measuring results of David and Eve are listed in Table. As we can see from Table, the measuring results are ν 0, δ 2 5,6,, κ (0) 2, η (2), then Bob makes unitary transformation (I) 3. Bob can obtain one-qubit state ϕ 3. Alice makes unitary transformation (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, and (σ x ) 9. Alice can obtain two-qubit state ϕ 9,0. Table and Eve. The measuring results and operations of Alice and Bob, the measuring results of David Alice (C NOT 9 ) Bob (C 3 NOT 5 ) David Eve ν 0, C 9 (σ z ) 0 δ 0 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 7,8 ν 0, (σ z ) 9, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (I) 3 ( + ) or(σ z ) 3 ( ) κ (0) ν 0, (σ z) 9, C 9 (σ z) 0 δ 0 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) ν 0, (σ z) 0, C 9 (σ z) 0, (σ x) 0 δ 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) 0 2 η ()

4 58 Communications in Theoretical Physics Vol. 70 Table (continued) ν 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 0 2 η () 7,8 ν 0, (σ z ) 9, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 0 2 η () ν 0, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 0 2 η () ν 0, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) ν 0, (σ z) 9, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) 7,8 ν 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (I) 3 ( + ) or (σ z) 3 ( ) κ (0) ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, (σ x ) 9 (iσ y ) 0, C 9 (σ z ) 0 δ 3 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) 7,8 ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (I) 3 ( + ) or (σ z ) 3 ( ) κ (0) ν 0, C 9 (σ z) 0 δ 0 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (0) ν 0, (σ z) 0, C 9 (σ z) 0 δ 0 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (0) 7,8 ν 0, (σ z ) 9, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (0) ν 0, (σ z ) 9, C 9 (σ z ) 0 δ 0 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (0) ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η () ν 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η () 7,8 ν 0, (σ z ) 9, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η () ν 0, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 0 δ 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η () ν 0, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (2) ν 0, (σ z) 9, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (2) 7,8 ν 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (2) ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (2) ν 0, (σ x ) 9 (iσ y ) 0, C 9 (σ z ) 0 δ 3 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (3) ν 0, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (3) 7,8 ν 0, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (σ z ) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (3) ν 0, C 9 (σ z) 0, (σ x) 9 (σ x) 0 δ 3 5,6, (σ z) 3 ( + ) or (I) 3 ( ) κ (0) 2 η (3) ν, C 9 (σ z) 0 δ 0 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () ν, (σ z) 0, C 9 (σ z) 0 δ 0 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () 7,8 ν, (σ z ) 9, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ z ) 9, C 9 (σ z ) 0 δ 0 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () 0 2 η () ν, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () 0 2 η () 7,8 ν, (σ z) 9, C 9 (σ z) 0, (σ x) 0 δ 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () 0 2 η () ν, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 0 δ 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () 0 2 η () ν, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () ν, (σ z ) 9, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () 7,8 ν, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ x ) 9 ( iσ y ) 0, C 9 (σ z ) 0 δ 3 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () ν, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, ( iσ y ) 3 ( + ) or (σ x ) 3 ( ) κ () 7,8 ν, (σ z) 0, C 9 (σ z) 0, (σ x) 9 (σ x) 0 δ 3 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () ν, C 9 (σ z) 0, (σ x) 9 (σ x) 0 δ 3 5,6, ( iσ y) 3 ( + ) or (σ x) 3 ( ) κ () ν, C 9 (σ z) 0 δ 0 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η (0) ν, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (0) 7,8 ν, (σ z ) 9, (σ z ) 0, C 9 (σ z ) 0 δ 0 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (0) ν, (σ z ) 9, C 9 (σ z ) 0 δ 0 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (0)

5 No. 5 Communications in Theoretical Physics 59 Table (continued) ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η () ν, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η () 7,8 ν, (σ z ) 9, C 9 (σ z ) 0, (σ x ) 0 δ 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η () ν, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 0 δ 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η () ν, (σ z) 9 (σ z) 0, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η (2) ν, (σ z) 9, C 9 (σ z) 0, (σ x) 9 δ 2 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η (2) 7,8 ν, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (2) ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 δ 2 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (2) ν, (σ x ) 9 ( iσ y ) 0, C 9 (σ z ) 0 δ 3 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (3) ν, (σ z ) 9 (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (3) 7,8 ν, (σ z ) 0, C 9 (σ z ) 0, (σ x ) 9 (σ x ) 0 δ 3 5,6, (σ x ) 3 ( + ) or ( iσ y ) 3 ( ) κ () 2 η (3) ν, C 9 (σ z) 0, (σ x) 9 (σ x) 0 δ 3 5,6, (σ x) 3 ( + ) or ( iσ y) 3 ( ) κ () 2 η (3) 3 Conclusion In summary, by using basis vectors measurement, controlled not gate operation, controlled σ z gate operation, and appropriate unitary transformations, the new scheme for asymmetric and deterministic CBJRSP is proposed. In this scheme, Alice and David remotely prepare an arbitrary single-qubit state at distant Bob s site. Meanwhile, Bob and Eve remotely prepare an arbitrary twoqubit state at distant Alice s site under the control of Charlie. Our CBJRSP process can be divided into two JRSP processes with only one controller. Different from former controlled JRSP schemes, the asymmetric and deterministic CBJRSP scheme proposed in this paper has higher efficiency and lower resource costs. The asymmetric and deterministic CBJRSP scheme herein has many potential applications in the field of quantum information. For example, in our asymmetric and deterministic CBJRSP scheme, Alice and Bob can exchange their quantum states simultaneously with the cooperators under the controller Charlie, which can realize long-distance safe transmission of information. Similarly, the asymmetric and deterministic CBJRSP scheme can be extended to CBJRSP of N (N > 2) different M-qubit (M > 2) quantum states. Multi-party exchange their quantum states at the same time with the cooperators under the controller, which can be applied in the quantum internet. Compared with other bidirectional JRSP protocols, our scheme is more secret. We have provided a new way to construct safer quantum channel for quantum secure communication. References [] C. H. Bennett, G. Brassard, C. Crépeau, et al., Phys. Rev. Lett. 70 (993) 895. [2] H. K. Lo, Phys. Rev. A 62 (2000) [3] A. K. Pati, Phys. Rev. A 63 (200) [] C. H. Bennett, P. Hayden, D. W. Leung, et al., Phys. Rev. Lett. 87 (200) [5] N. A. Peters, J. T. Barreiro, M. E. Goggin, et al., Phys. Rev. Lett. 9 (2005) [6] C. S. Yu, H. S. Song, and Y. H. Wang, Phys. Rev. A 73 (2006) [7] W. T. Liu, W. Wu, B. Q. Ou, et al., Phys. Rev. A 76(2) (2007) [8] M. A. Solis-Prosser and L. Neves, Phys. Rev. A 8 (20) [9] M. Radmark, M. Wiesniak, M. Zukowski, and M. Bourennane, Phys. Rev. A 88 (203) [0] J. H. Wei, H. Y. Dai, M. Zhang, et al., Int. J. Quantum Inf. (206) [] Y. S. Ra, H. T. Lim, and Y. H. Kim, Phys. Rev. A 9 (206) [2] M. G. Moreno, M. Cunha, and M. M. Parisio, Quantum Inf. Process. 5 (206) [3] J. M. Liu, X. L. Feng, and C. H Oh, J. Phys. B At. Mol. Opt. Phys. 2 (2009) [] L. F. Han and H. Yuan, Int. J. Quantum Inf. 9 (20) 539. [5] Y. B. Zhan, Europhys. Lett. 98 (202) [6] Y. Y. Nie, M. H. Sang, and L. P. Nie, Int. J. Theor. Phys. 56 (207) 883. [7] B. A. Nguyen and J. Kim, J. Phys. B At. Mol. Opt. Phys. (2008) [8] B. A. Nguyen, J. Phys. B At. Mol. Opt. Phys. 2 (2009) [9] B. A. Nguyen, Opt. Commun. 283 (200) 3. [20] Z. Y. Wang, Int. J. Quantum Inf. 9 (20) 809. [2] X. Q. Xiao, J. M. Liu, and G. H. Zeng, J. Phys. B At. Mol. Opt. Phys. (20) [22] M. X. Luo and Y. Deng, Int. J. Theor. Phys. 5 (202) [23] D. Wang and L. Ye, Int. J. Theor. Phys. 52 (203) [2] J. Y. Peng, M. X. Luo, and Z. W. Mo, Quantum Inf. Process. 2 (203) 2325.

6 520 Communications in Theoretical Physics Vol. 70 [25] J. Y. Peng, M. X. Luo, Z. W. Mo, and Z. G. Qu, Mod. Phys. Lett. B 27 (203) [26] B. S. Choudhury and A. Dhara, Quantum Inf. Process. (205) 373. [27] R. F. Yu, Y. J. Lin, and P. Zhou, Quantum Inf. Process. 5 (206) 785. [28] A. G. Adepoju, B. J. Falaye, G. H. Sun, et al., Phys. Lett. A 38 (207) 58. [29] Z. H. Wei, X. W. Zha, and Y. Yu, Int. J. Theor. Phys. 55 (206) 506. [30] D. Wang and L. Ye, Quantum Inf. Process. 2 (203) [3] Z. H. Zhang, L. Shu, Z. W. Mo, et al., Quantum Inf. Process. 3 (20) 979. [32] P. C. Ma, G. B. Chen, X. W. Li, and Y. B. Zhan, Laser Phys. 26 (206) 520. [33] M. M. Wang and Z. G. Qu, Quantum Inf. Process. 5 (206) 805. [3] Y. B. Zhan and P. C. Ma, Quantum Inf. Process. 2 (203) 997. [35] N. B. An, C. T. Bich, and N. Van Don, Phys. Lett. A 375 (20) [36] M. X. Ding, M. Jiang, and Y. H. Liu, Optik 27 (206) 068. [37] C. T. Bich, N. V. Don, and N. B. An, Int. J. Theor. Phys. 5 (202) [38] D. Zhang, X. W. Zha, Y. J. Duan, and Y. Q. Yang, Quantum Inf. Process. 5 (206) 269. [39] X. B. Chen, Y. R. Sun, G. Xu, et al., Quantum Inf. Process. 6 (207) 2. [0] V. Sharma, C. Shukla, S. Banerjee, and A. Pathak, Quantum Inf. Process. (205) 3. [] X. Y. Wang and Z. W. Mo, Int. J. Theor. Phys. 56 (207) 052. [2] Z. W. Sang, Int. J. Theor. Phys. 56 (207) [3] P. C. Ma, G. B. Chen, X. W. Li, et al., Int. J. Theor. Phys. 56 (206) 276. [] P. C. Ma, G. B. Chen, X. W. Li, and Y. B. Zhan, Laser Phys. 27 (207) [5] Y. Song, J. L. Ni, Z. Y. Wang, et al., Int. J. Theor. Phys. 56 (207) 375. [6] P. C. Ma, G. B. Chen, X. W. Li, and Y. B. Zhan, Quantum Inf. Process. 6 (207) 308. [7] D. Zhang, X. W. Zha, Y. J. Duan, and Z. H. Wei, Int. J. Theor. Phys. 55 (206) 0. [8] J. Y. Peng, M. Q. Bai, and Z. W. Mo, Quantum Inf. Process. (205) 263.

Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties

Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties Commun. Theor. Phys. 67 (2017) 377 382 Vol. 67, No. 4, April 1, 2017 Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties Lei Shi ( 石磊

More information

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state Perfect quantum teleportation and dense coding protocols via the -qubit W state Wang Mei-Yu( ) a)b) and Yan Feng-Li( ) a)b) a) College of Physics Science and Information Engineering, Hebei ormal University,

More information

Controlled Quantum Teleportation via Four Particle Asymmetric Entangled State *

Controlled Quantum Teleportation via Four Particle Asymmetric Entangled State * IOSR Journal of Applied Physics (IOSR-JAP) e-issn: 2278-4861.Volume 9, Issue 1 Ver. III (Jan. Feb. 2017), PP 32-37 www.iosrjournals.org Controlled Quantum Teleportation via Four Particle Asymmetric Entangled

More information

Bidirectional quantum teleportation and secure direct communication via entanglement swapping

Bidirectional quantum teleportation and secure direct communication via entanglement swapping Bidirectional quantum teleportation and secure direct communication via entanglement swapping Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

Efficient controlled quantum secure direct communication based on GHZ-like states

Efficient controlled quantum secure direct communication based on GHZ-like states Efficient controlled quantum secure direct communication based on GHZ-like states Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

Controlled Remote Preparation of a Two-Qubit State via an Asymmetric Quantum Channel

Controlled Remote Preparation of a Two-Qubit State via an Asymmetric Quantum Channel Commun. Theor. Phys. 55 (0) 44 50 Vol. 55 No. February 5 0 Controlled Remote Preparation of a Two-Qubit State via an Asymmetric Quantum Channel WANG Zhang-Yin ( ) Key Laboratory of Optoelectronic Information

More information

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 27 Dec 2004 Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,

More information

Quantum secret sharing based on quantum error-correcting codes

Quantum secret sharing based on quantum error-correcting codes Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,

More information

Multiparty Quantum Remote Control

Multiparty Quantum Remote Control Multiparty Quantum Remote Control Yu-Ting Chen and Tzonelih Hwang Abstract This paper proposes a multiparty quantum remote control (MQRC) protocol, which allows several controllers to perform remote operations

More information

Symmetric remote two-qubit preparation via positive operator-valued measure

Symmetric remote two-qubit preparation via positive operator-valued measure J. At. Mol. Sci. doi: 0.4208/jams.0630.0720a Vol., No. 4, pp. 352-368 November 200 Symmetric remote two-qubit preparation via positive operator-valued measure Zhang-Yin Wang a, and Xing-Qiang Yang b, a

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure

More information

Remote Preparation of Multipartite Equatorial Entangled States in High Dimensions with Three Parties

Remote Preparation of Multipartite Equatorial Entangled States in High Dimensions with Three Parties Commun. Theor. Phys. (Beiing, China) 51 (2009) pp. 641 647 c Chinese Physical Society an IOP Publishing Lt Vol. 51, No. 4, April 15, 2009 Remote Preparation of Multipartite Equatorial Entangle States in

More information

Selection of unitary operations in quantum secret sharing without entanglement

Selection of unitary operations in quantum secret sharing without entanglement . RESEARCH PAPERS. SCIENCE CHINA Information Sciences September 2011 Vol. 54 No. 9: 1837 1842 doi: 10.1007/s11432-011-4240-9 Selection of unitary operations in quantum secret sharing without entanglement

More information

(Received 22 October 2009; revised manuscript received 30 December 2010)

(Received 22 October 2009; revised manuscript received 30 December 2010) Chin. Phys. B Vol. 19 No. 9 010) 090313 Teleportation and thermal entanglement in two-qubit Heisenberg XY Z spin chain with the Dyaloshinski Moriya interaction and the inhomogeneous magnetic field Gao

More information

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang

More information

arxiv:quant-ph/ v1 10 Apr 2006

arxiv:quant-ph/ v1 10 Apr 2006 Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification

More information

Generation and classification of robust remote symmetric Dicke states

Generation and classification of robust remote symmetric Dicke states Vol 17 No 10, October 2008 c 2008 Chin. Phys. Soc. 1674-1056/2008/17(10)/3739-05 Chinese Physics B and IOP Publishing Ltd Generation and classification of robust remote symmetric Dicke states Zhu Yan-Wu(

More information

Scheme for implementing perfect quantum teleportation with four-qubit entangled states in cavity quantum electrodynamics

Scheme for implementing perfect quantum teleportation with four-qubit entangled states in cavity quantum electrodynamics Scheme for implementing perfect quantum teleportation with four-qubit entangled states in cavity quantum electrodynamics Tang Jing-Wu( ), Zhao Guan-Xiang( ), and He Xiong-Hui( ) School of Physics, Hunan

More information

Teleportation of an n-bit one-photon and vacuum entangled GHZ cavity-field state

Teleportation of an n-bit one-photon and vacuum entangled GHZ cavity-field state Vol 6 No, January 007 c 007 Chin. Phys. Soc. 009-963/007/6(0)/08-05 Chinese Physics and IOP Publishing Ltd Teleportation of an n-bit one-photon and vacuum entangled GHZ cavity-field state Lai Zhen-Jiang(

More information

Quantum communication protocols based on entanglement swapping

Quantum communication protocols based on entanglement swapping Journal of Physics: Conference Series PAPER OPEN ACCESS Quantum communication protocols based on entanglement swapping To cite this article: Guillermo Morales-Luna 015 J. Phys.: Conf. Ser. 64 01003 View

More information

A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State

A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State Commun. Theor. Phys. 70 (018) 43 48 Vol. 70, No. 1, July 1, 018 A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State Xu-Feng Niu ( 牛旭峰 ), 1 Jian-Zhong Zhang ( 张建中 ),

More information

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Commun. Theor. Phys. 65 (2016) 705 710 Vol. 65, No. 6, June 1, 2016 An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Shu-Jiang Xu (Å ), 1, Xiu-Bo

More information

No. 12 Probabilistic teleportation of an arbitrary Suppose that the sender (Ali) wants to transmit an unknown arbitrary three-particle state t

No. 12 Probabilistic teleportation of an arbitrary Suppose that the sender (Ali) wants to transmit an unknown arbitrary three-particle state t Vol 12 No 12, Demr 2003 cfl 2003 Chin. Phys. Soc. 1009-1963/2003/12(12)/1354-06 Chinese Physics and IOP Publishing Ltd Probabilistic teleportation of an arbitrary three-particle state via a partial entangled

More information

Circular Semi-Quantum Secret Sharing Using Single Particles

Circular Semi-Quantum Secret Sharing Using Single Particles Commun. Theor. Phys. 70 (018) 661 671 Vol. 70 No. 6 December 1 018 Circular Semi-Quantum Secret Sharing Using Single Particles Chong-Qiang Ye ( 叶崇强 ) and Tian-Yu Ye ( 叶天语 ) College of Information & Electronic

More information

Single-Qubit Operation Sharing with Bell and W Product States

Single-Qubit Operation Sharing with Bell and W Product States Commun. Theor. Phys. 60 (013) 165 170 Vol. 60, No., August 15, 013 Single-Qubit Operation Sharing with Bell and W Product States JI Qi-Bin ( É), 1 LIU Yi-Min ( ), LIU Xian-Song ( Ø), 1 YIN Xiao-Feng (

More information

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons Commun. Theor. Phys. (Beijing, China) 54 (2010) pp. 829 834 c Chinese Physical Society and IOP Publishing Ltd Vol. 54, No. 5, November 15, 2010 Quantum Secure Direct Communication with Authentication Expansion

More information

arxiv: v1 [quant-ph] 7 Feb 2016

arxiv: v1 [quant-ph] 7 Feb 2016 Entanglement concentration for concatenated Greenberger-Horne-Zeiglinger state with feasible linear optics Yu-Bo Sheng, 1 Chang-Cheng Qu, 1 Lan Zhou 1, 1 Key Lab of Broadband Wireless Communication and

More information

o. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c

o. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c Vol 14 o 5, May 005 cfl 005 Chin. Phys. Soc. 1009-1963/005/14(05)/0974-06 Chinese Physics and IOP Publishing Ltd Proposal of many-party controlled teleportation for multi-qubit entangled W state * Huang

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis

More information

arxiv:quant-ph/ v1 6 Dec 2005

arxiv:quant-ph/ v1 6 Dec 2005 Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School

More information

Quantum Dense Coding and Quantum Teleportation

Quantum Dense Coding and Quantum Teleportation Lecture Note 3 Quantum Dense Coding and Quantum Teleportation Jian-Wei Pan Bell states maximally entangled states: ˆ Φ Ψ Φ x σ Dense Coding Theory: [C.. Bennett & S. J. Wiesner, Phys. Rev. Lett. 69, 88

More information

Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State

Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State Entropy 5, 7, 67-675; doi:.9/e767 rticle OPEN CCESS entropy ISSN 99- www.mdpi.com/journal/entropy Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle

More information

Instantaneous Nonlocal Measurements

Instantaneous Nonlocal Measurements Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.

More information

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States Commun. Theor. Phys. 63 (015) 431 438 Vol. 63, No. 4, April 1, 015 Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States YE Tian-Yu

More information

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol entropy Article Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol Michel Boyer, Rotem Liss, * and Tal Mor Département d Informatique et de Recherche Opérationnelle

More information

Two-mode excited entangled coherent states and their entanglement properties

Two-mode excited entangled coherent states and their entanglement properties Vol 18 No 4, April 2009 c 2009 Chin. Phys. Soc. 1674-1056/2009/18(04)/1328-05 Chinese Physics B and IOP Publishing Ltd Two-mode excited entangled coherent states and their entanglement properties Zhou

More information

Quantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement

Quantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement Commun. Theor. Phys. 56 (2011) 81 86 Vol. 56, No. 5, November 15, 2011 Quantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement SHI Jin (æ ), 1,2 GONG Yan-Xiao ( ), 1 XU Ping (Å

More information

arxiv: v1 [quant-ph] 18 May 2018

arxiv: v1 [quant-ph] 18 May 2018 Measurement-Device-Independent Quantum Secure Direct Communication, arxiv:1805.078v1 [quant-ph] 18 May 018 Zeng-Rong Zhou, 1,, 3, 4, 5, 6, Yu-Bo Sheng, 7, 8, 9, Peng-Hao Niu, 1,, 3, 4, 5, 6 Liu-Guo Yin,

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Scheme for teleportation of unknown states of trapped ion

Scheme for teleportation of unknown states of trapped ion Vol 17 No, February 008 c 008 Chin. Phys. Soc. 1674-1056/008/17(0/0451-05 Chinese Physics B and IOP Publishing Ltd Scheme for teleportation of unknown states of trapped ion Chen Mei-Feng( and Ma Song-She(

More information

arxiv: v2 [quant-ph] 9 Nov 2011

arxiv: v2 [quant-ph] 9 Nov 2011 Intercept-resend attacks on Semiquantum secret sharing and the Improvements arxiv:1106.4908v2 [quant-ph] 9 Nov 2011 Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, and Tzonelih Hwang Abstract Recently, Li et

More information

arxiv: v7 [quant-ph] 20 Mar 2017

arxiv: v7 [quant-ph] 20 Mar 2017 Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute

More information

Analysing the role of entanglement in the three-qubit Vaidman s game

Analysing the role of entanglement in the three-qubit Vaidman s game Analysing the role of entanglement in the three-qubit Vaidman s game arxiv:807.056v [quant-ph] Jul 08 Hargeet Kaur Department of Chemistry Indian Institute of Technology Jodhpur, Rajasthan Email: kaur.@iitj.ac.in

More information

Multiparty Secure Communication by Using Quantum Key Distribution Protocols

Multiparty Secure Communication by Using Quantum Key Distribution Protocols Multiparty Secure Communication by Using Quantum Key Distribution Protocols K.Gopinath 1, B.J.Job karuna sagar 2 1. Associate Professor,Department of Computer Science and Engineering, K.S.R.M.College of

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v1 13 Jan 2003 Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The

More information

Experimental demonstrations of teleportation of photons. Manuel Chinotti and Nikola Đorđević

Experimental demonstrations of teleportation of photons. Manuel Chinotti and Nikola Đorđević Experimental demonstrations of teleportation of photons Manuel Chinotti and Nikola Đorđević Outline Quantum teleportation (QT) protocol. Laboratory experimental demonstration: Bouwmeester at al. (1997).

More information

Quantum Teleportation Pt. 3

Quantum Teleportation Pt. 3 Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation

More information

Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

Multiparty Quantum Secret Sharing Using Quantum Fourier Transform Commun. Theor. Phys. (Beijing, China) 51 (2009) pp. 221 226 c Chinese Physical Society and IOP Publishing Ltd Vol. 51, No. 2, February 15, 2009 Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Experimental realization of quantum cryptography communication in free space

Experimental realization of quantum cryptography communication in free space Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao

More information

ON THE ROLE OF THE BASIS OF MEASUREMENT IN QUANTUM GATE TELEPORTATION. F. V. Mendes, R. V. Ramos

ON THE ROLE OF THE BASIS OF MEASUREMENT IN QUANTUM GATE TELEPORTATION. F. V. Mendes, R. V. Ramos ON THE ROLE OF THE BASIS OF MEASREMENT IN QANTM GATE TELEPORTATION F V Mendes, R V Ramos fernandovm@detiufcbr rubens@detiufcbr Lab of Quantum Information Technology, Department of Teleinformatic Engineering

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

arxiv:quant-ph/ v2 11 Jan 2006

arxiv:quant-ph/ v2 11 Jan 2006 Quantum Authentication and Quantum Key Distribution Protocol Hwayean Lee 1,,3, Jongin Lim 1,, and HyungJin Yang,4 arxiv:quant-ph/0510144v 11 Jan 006 Center for Information Security Technologies(CIST) 1,

More information

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Probabilistic exact cloning and probabilistic no-signalling. Abstract Probabilistic exact cloning and probabilistic no-signalling Arun Kumar Pati Quantum Optics and Information Group, SEECS, Dean Street, University of Wales, Bangor LL 57 IUT, UK (August 5, 999) Abstract

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Squashed entanglement

Squashed entanglement Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

arxiv:quant-ph/ v1 1 Jun 2000

arxiv:quant-ph/ v1 1 Jun 2000 Probabilistic teleportation of two-particle entangled state Bao-Sen Shi, Yun-Kun Jiang and Guang-Can Guo Lab. of Quantum Communication and Quantum Computation Department of Physics University of Science

More information

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding. CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as

More information

Entanglement concentration for multi-atom GHZ class state via cavity QED

Entanglement concentration for multi-atom GHZ class state via cavity QED Vol 5 No, December 006 c 006 Chin. Phys. Soc. 009-963/006/5()/953-06 Chinese Physics and IOP Publishing Ltd Entanglement concentration for multi-atom GHZ class state via cavity QED Jiang Chun-Lei( ), Fang

More information

Theory of Quantum Entanglement

Theory of Quantum Entanglement Theory of Quantum Entanglement Shao-Ming Fei Capital Normal University, Beijing Universität Bonn, Bonn Richard Feynman 1980 Certain quantum mechanical effects cannot be simulated efficiently on a classical

More information

New Feedback Control Model in the Lattice Hydrodynamic Model Considering the Historic Optimal Velocity Difference Effect

New Feedback Control Model in the Lattice Hydrodynamic Model Considering the Historic Optimal Velocity Difference Effect Commun. Theor. Phys. 70 (2018) 803 807 Vol. 70, No. 6, December 1, 2018 New Feedback Control Model in the Lattice Hydrodynamic Model Considering the Historic Optimal Velocity Difference Effect Guang-Han

More information

Universal Blind Quantum Computing

Universal Blind Quantum Computing Universal Blind Quantum Computing Elham Kashefi Laboratoire d Informatique de Grenoble Joint work with Anne Broadbent Montreal Joe Fitzsimons Oxford Classical Blind Computing Fundamentally asymmetric unlike

More information

arxiv:quant-ph/ May 2002

arxiv:quant-ph/ May 2002 Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of

More information

Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States

Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States Commun. Theor. Phys. 56 (2011) 664 668 Vol. 56, No. 4, October 15, 2011 Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States HE Guang-Qiang (¾Ö), ZHU Jun (ý ), and ZENG Gui-Hua

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

Lecture 4: Postulates of quantum mechanics

Lecture 4: Postulates of quantum mechanics Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying

More information

Radiation energy flux of Dirac field of static spherically symmetric black holes

Radiation energy flux of Dirac field of static spherically symmetric black holes Radiation energy flux of Dirac field of static spherically symmetric black holes Meng Qing-Miao( 孟庆苗 ), Jiang Ji-Jian( 蒋继建 ), Li Zhong-Rang( 李中让 ), and Wang Shuai( 王帅 ) Department of Physics, Heze University,

More information

Thermal quantum discord in Heisenberg models with Dzyaloshinski Moriya interaction

Thermal quantum discord in Heisenberg models with Dzyaloshinski Moriya interaction Thermal quantum discord in Heisenberg models with Dzyaloshinski Moriya interaction Wang Lin-Cheng(), Yan Jun-Yan(), and Yi Xue-Xi() School of Physics and Optoelectronic Technology, Dalian University of

More information

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Zhengjun Cao Abstract What is the behavior of an adversary to launch attacks against a communication? The good choice

More information

An Efficient and Economic Scheme for Remotely Preparing a Multi-Qudit State via a Single Entangled Qudit Pair

An Efficient and Economic Scheme for Remotely Preparing a Multi-Qudit State via a Single Entangled Qudit Pair Commun. Theor. Phys. (Beijing, China) 54 (2010) pp. 46 468 c Chinese Physical Society an IOP Publishing Lt Vol. 54, No., September 15, 2010 An Efficient an Economic Scheme for Remotely Preparing a Multi-Quit

More information

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger Experimental quantum teleportation Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger NATURE VOL 390 11 DECEMBER 1997 Overview Motivation General theory behind

More information

Quantum Teleportation Pt. 1

Quantum Teleportation Pt. 1 Quantum Teleportation Pt. 1 PHYS 500 - Southern Illinois University April 17, 2018 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 1 April 17, 2018 1 / 13 Types of Communication In the

More information

arxiv: v1 [quant-ph] 25 Apr 2017

arxiv: v1 [quant-ph] 25 Apr 2017 Deterministic creation of a four-qubit W state using one- and two-qubit gates Firat Diker 1 and Can Yesilyurt 2 1 Faculty of Engineering and Natural Sciences, arxiv:170.0820v1 [quant-ph] 25 Apr 2017 Sabanci

More information

Quantum Gates, Circuits & Teleportation

Quantum Gates, Circuits & Teleportation Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary

More information

Critical entanglement and geometric phase of a two-qubit model with Dzyaloshinski Moriya anisotropic interaction

Critical entanglement and geometric phase of a two-qubit model with Dzyaloshinski Moriya anisotropic interaction Chin. Phys. B Vol. 19, No. 1 010) 010305 Critical entanglement and geometric phase of a two-qubit model with Dzyaloshinski Moriya anisotropic interaction Li Zhi-Jian 李志坚 ), Cheng Lu 程璐 ), and Wen Jiao-Jin

More information

Introduction to Quantum Information Hermann Kampermann

Introduction to Quantum Information Hermann Kampermann Introduction to Quantum Information Hermann Kampermann Heinrich-Heine-Universität Düsseldorf Theoretische Physik III Summer school Bleubeuren July 014 Contents 1 Quantum Mechanics...........................

More information

Deterministic secure communications using two-mode squeezed states

Deterministic secure communications using two-mode squeezed states Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May

More information

Quantum information and quantum computing

Quantum information and quantum computing Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement

More information

Knotted Pictures of Hadamard Gate and CNOT Gate

Knotted Pictures of Hadamard Gate and CNOT Gate Commun. Theor. Phys. (Beijing, China) 51 (009) pp. 967 97 c Chinese Physical Society and IOP Publishing Ltd Vol. 51, No. 6, June 15, 009 Knotted Pictures of Hadamard Gate and CNOT Gate GU Zhi-Yu 1 and

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

arxiv:quant-ph/ v2 23 Aug 2003

arxiv:quant-ph/ v2 23 Aug 2003 An Architecture of Deterministic Quantum Central Processing Unit arxiv:quant-ph/0207032v2 23 Aug 2003 Fei Xue a, Zeng-Bing Chen a Mingjun Shi a Xianyi Zhou a Jiangfeng Du a Rongdian Han a a Department

More information

arxiv: v5 [quant-ph] 28 Oct 2015

arxiv: v5 [quant-ph] 28 Oct 2015 arxiv:140.643v5 [quant-ph] 8 Oct 015 Quantum Entanglement Establishment between two Strangers Tzonelih Hwang, Tzu-Han Lin, and Shih-Hung Kao February 7, 018 Abstract This paper presents the first quantum

More information

Quantum Optical Implementation of Quantum Communication

Quantum Optical Implementation of Quantum Communication Quantum Optical Implementation of Quantum Communication Li Yongmin, Zhang Kuanshou State Key Lab of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan,

More information

Lecture 11 September 30, 2015

Lecture 11 September 30, 2015 PHYS 7895: Quantum Information Theory Fall 015 Lecture 11 September 30, 015 Prof. Mark M. Wilde Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with uncertain parameters

Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with uncertain parameters Vol 16 No 5, May 2007 c 2007 Chin. Phys. Soc. 1009-1963/2007/16(05)/1246-06 Chinese Physics and IOP Publishing Ltd Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with

More information

Single qubit + CNOT gates

Single qubit + CNOT gates Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose

More information

Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels 1

Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels 1 Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels Charles H. Bennet, Gilles Brassard, Claude Crépeau, Richard Jozsa, Asher Peres, and William K. Wootters Team

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

High rate quantum cryptography with untrusted relay: Theory and experiment

High rate quantum cryptography with untrusted relay: Theory and experiment High rate quantum cryptography with untrusted relay: Theory and experiment CARLO OTTAVIANI Department of Computer Science, The University of York (UK) 1st TWQI Conference Ann Arbor 27-3 July 2015 1 In

More information

arxiv: v3 [quant-ph] 6 Sep 2009

arxiv: v3 [quant-ph] 6 Sep 2009 Semi-quantum secret sharing using entangled states Qin Li, 1 W. H. Chan, and Dong-Yang Long 1 1 Department of Computer Science, Sun Yat-sen University, Guangzhou 51075, China Department of Mathematics,

More information

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key

More information

Universal Associated Legendre Polynomials and Some Useful Definite Integrals

Universal Associated Legendre Polynomials and Some Useful Definite Integrals Commun. Theor. Phys. 66 0) 158 Vol. 66, No., August 1, 0 Universal Associated Legendre Polynomials and Some Useful Definite Integrals Chang-Yuan Chen í ), 1, Yuan You ), 1 Fa-Lin Lu öß ), 1 Dong-Sheng

More information

Remote State Preparation: Arbitrary remote control of photon polarizations for quantum communication

Remote State Preparation: Arbitrary remote control of photon polarizations for quantum communication Remote State Preparation: Arbitrary remote control of photon polarizations for quantum communication N. A. Peters a, J. T. Barreiro a, M. E. Goggin a,b, T.-C. Wei a, and P. G. Kwiat a a Physics Department,

More information

New Homoclinic and Heteroclinic Solutions for Zakharov System

New Homoclinic and Heteroclinic Solutions for Zakharov System Commun. Theor. Phys. 58 (2012) 749 753 Vol. 58, No. 5, November 15, 2012 New Homoclinic and Heteroclinic Solutions for Zakharov System WANG Chuan-Jian ( ), 1 DAI Zheng-De (à ), 2, and MU Gui (½ ) 3 1 Department

More information

Technical Report Communicating Secret Information Without Secret Messages

Technical Report Communicating Secret Information Without Secret Messages Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,

More information