首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A method for quantum key distribution (QKD) using entangled coherent states is discussed which is designed to provide key distribution rates and transmission distances surpassing those of traditional entangled photon pair QKD by exploiting entanglement sudden death. The method uses entangled electromagnetic signal states of ‘macroscopic’ average photon numbers rather than single photon or entangled photon pairs, which have inherently limited rate and distance performance as bearers of quantum key data. Accordingly, rather than relying specifically on Bell inequalities as do entangled photon pair-based methods, the security of this method is based on entanglement witnesses and related functions.  相似文献   

2.
By exploiting the entanglement correlation in quantum mechanics, two three-party remote state preparation (RSP) schemes are proposed. One is three-party remote preparation of a single-particle quantum state, and the other is three-party remote preparation of a two-particle entangled state. In the proposed schemes, the sender Alice knows the quantum states to be prepared, while the receivers Bob and Charlie do not know the quantum states; Alice performs measurement and unitary operations on her own particles with two three-particle GHZ states as the quantum channel. According to Alice’s measurement results, Bob and Charlie measure their own particles on the corresponding quantum measurement bases and perform unitary operations on the corresponding particles to reconstruct the quantum states, respectively. Compared with multiparty joint remote preparation and two-party RSP of a quantum state, the proposed schemes realize quantum multicast communication successfully, which enables Bob and Charlie to obtain the prepared quantum states simultaneously in the case of just knowing Alice’s measurement results, while Bob and Charlie do not know each other’s prepared quantum states. It is shown that only three classical bits are required for the two proposed RSP schemes when Bob and Alice introduce an auxiliary particle, respectively, and the proposed schemes are secure after the quantum channel authentication.  相似文献   

3.
A threshold quantum state sharing scheme is proposed. The dealer uses the quantum-controlled-not operations to expand the d-dimensional quantum state and then uses the entanglement swapping to distribute the state to a random subset of participants. The participants use the single-particle measurements and unitary operations to recover the initial quantum state. In our scheme, the dealer can share different quantum states among different subsets of participants simultaneously. So the scheme will be very flexible in practice.  相似文献   

4.
We propose a mechanism for quantum state transfer (QST) over a binary tree spin network on the basis of incomplete collapsing measurements. To this aim, we perform initially a weak measurement (WM) on the central qubit of the binary tree network where the state of our concern has been prepared on that qubit. After the time evolution of the whole system, a quantum measurement reversal (QMR) is performed on a chosen target qubit. By taking optimal value for the strength of QMR, it is shown that the QST quality from the sending qubit to any typical target qubit on the binary tree is considerably improved in terms of the WM strength. Also, we show that how high-quality entanglement distribution over the binary tree network is achievable by using this approach.  相似文献   

5.
Remote state preparation (RSP) and joint remote state preparation (JRSP) protocols for single-photon states are investigated via linear optical elements with partially entangled states. In our scheme, by choosing two-mode instances from a polarizing beam splitter, only the sender in the communication protocol needs to prepare an ancillary single-photon and operate the entanglement preparation process in order to retrieve an arbitrary single-photon state from a photon pair in partially entangled state. In the case of JRSP, i.e., a canonical model of RSP with multi-party, we consider that the information of the desired state is split into many subsets and in prior maintained by spatially separate parties. Specifically, with the assistance of a single-photon state and a three-photon entangled state, it turns out that an arbitrary single-photon state can be jointly and remotely prepared with certain probability, which is characterized by the coefficients of both the employed entangled state and the target state. Remarkably, our protocol is readily to extend to the case for RSP and JRSP of mixed states with the all optical means. Therefore, our protocol is promising for communicating among optics-based multi-node quantum networks.  相似文献   

6.
We present an efficient protocol for concentrating an arbitrary four-electron less-entangled cluster state into a maximally entangled cluster state. As a two-step entanglement concentration protocol (ECP), it only needs one pair of less-entangled cluster state, which makes this ECP more economical. With the help of electronic polarization beam splitter (PBS) and the charge detection, the whole concentration process is essentially the quantum nondemolition (QND) measurement. Therefore, the concentrated maximally entangled state can be remained for further application. Moreover, the discarded terms in some traditional ECPs can be reused to obtain a high success probability. It is feasible and useful in current one-way quantum computation.  相似文献   

7.
为了提高量子密钥分发的可行性、安全性和效率,在通信双方间通过构建经典信道和量子信道,提出了一种基于Bell态与其纠缠性质的量子密钥分发协议.该协议可行、安全、简单有效,通过严格的数学推导证明了窃听者不可能获取密钥而不被发现.此外,得出了该协议效率与安全的数学模型,并通过MATLAB仿真分析了协议效率与安全的关系.  相似文献   

8.
9.
This work presents two robust entanglement swappings against two types of collective noises, respectively. The entanglement swapping can be achieved by performing two Bell state measurements on two logical qubits that come from two original logical Bell states, respectively. Two fault tolerant quantum secret sharing (QSS) protocols are further proposed to demonstrate the usefulness of the newly proposed entanglement swappings. The proposed QSS schemes are not only free from Trojan horse attacks but also quite efficient. Moreover, by adopting two Bell state measurements instead of four-qubit joint measurements, the proposed protocols are practical in combating collective noises. The proposed fault tolerant entanglement swapping can also be used to replace the traditional Bell-state entanglement swapping used in various quantum cryptographic protocols to provide robustness in combating collective noises.  相似文献   

10.
A novel high-efficient secure quantum report with authentication based on six-particle cluster state and entanglement swapping is proposed.In our protocol,using N groups of six-particle cluster state,the legitimate users Bob and Charlie send their secret reports to their boss(Alice),who operates sixteen kinds of unitary operations after receiving the reports.Here,entanglement swapping of cluster states and maximum entanglement state measurement are employed by the communicators.It has been proved that our protocol has high level guarantees and honesty,and the scheme is secure not only against the intercept-and-resend attack but also against disturbance attack.  相似文献   

11.
We present two entanglement concentration protocols (ECPs) for arbitrary three-electron W state based on their charges and spins. Different from other ECPs, with the help of the electronic polarization beam splitter and charge detection, the less-entangled W state can be concentrated into a maximally entangled state only with some single charge qubits. The second ECP is more optimal than the first one, for by constructing the complete parity check gate, the second ECP can be used repeatedly to further concentrate the less-entangled state and obtain a higher success probability. Therefore, both the ECPs especially the second one may be useful in current quantum information processing.  相似文献   

12.
In this paper, two quantum dialogue (QD) protocols based on the entanglement of GHZ states are proposed to resist the collective noise. Besides, two new coding functions are designed for each of the proposed protocols, which can resist two types of collective noise: collective-dephasing noise and collective-rotation noise, respectively. Furthermore, it is also argued that these QD protocols are also free from the Trojan horse attacks and the information leakage problem.  相似文献   

13.
It is quite common to assume that uncertainty enters through additive white noise sources when using recursive state estimation algorithms. Also unknown and time-varying parameters are often modeled similarly by augmenting the states with a parameter vector. Further, it is common to reflect initial model uncertainty through the choice of the initial covariance matrices for the states and parameters.In this paper we study noise modeling based on a hypothesis that it is important to model noise correctly. In practice this implies a critical view on the dominating ‘additive noise paradigm’ as a means to model uncertainty. Alternative concepts of modeling the noise are investigated, and it is shown that modeling noise by introducing it in the system auxiliary variables and control inputs may have a positive impact on estimation performance.  相似文献   

14.
Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob’s secret inputs correctly without leaking them. Firstly, \(\chi ^+\) state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis \(\{|\phi ^\pm \rangle ,|\psi ^\pm \rangle \}\) or the basis \(\{|\chi ^\pm \rangle ,|\omega ^\pm \rangle \}\) is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.  相似文献   

15.
We discuss identification of discrete-time bilinear state space systems with multiple inputs and multiple outputs. Subspace identification methods for bilinear systems suffer from the curse of dimensionality. Already for relatively low order systems, the matrices involved become so large that the method cannot be used in practice. We have modified the subspace algorithm such that it reduces the dimension of the matrices involved. Only the rows that have the largest influence on the model are selected; the remaining rows are discarded. This obviously leads to an approximation error. The initial model that we get from the subspace method is optimized using the principle of separable least squares. According to this principle, we can first solve for the matrices that enter non-linearly in the output error criterion and then obtain the others by solving a linear least squares problem.  相似文献   

16.
In this paper a procedure is developed for the computation of a state space realization from two dimensional transfer functions with separable denominator. The procedure relies on a canonic form for the state space realization.  相似文献   

17.
Quantum state control including entanglement, and readout of the Josephson persistent-current qubit, flux qubit, are reviewed. First, we mention our single-shot readout of quantum superposition state of a flux qubit by a current biased dc-SQUID. Second, we mention entangled state and vacuum Rabi oscillations of a flux-qubit LC-resonator system where qubit-resonator coupled state are controlled by a combination of microwave and DC-shift pulses, resulting in a controlling and measuring sequence analogous to atomic cavity QED. Third, we report our recent progress in high fidelity readout of a flux qubit state via Josephson bifurcation amplifier (JBA).  相似文献   

18.
Two-photon four-dimensional spatial modes partially entangled Dicke state can be compactly generated from six concurrent spontaneous parametric down-conversion processes by cascading poling domain structures in 5% MgO-doped poled lithium niobate bulk crystal. Entanglement concentration of the two-photon four-dimensional spatial modes partially entangled Dicke state can be realized by using quantum nondestructive detection of nonlinear Kerr medium, optical beam splitter, and quantum gate operation.  相似文献   

19.
We investigate an novel implementation of a Toffoli gate using multiple independent auxiliary photons prepared beforehand in single-qubit states. This gate can be performed nondestructively with entanglement swapping via the Greenberger–Horne–Zeilinger state analysis. We evaluate the performance of the proposed Toffoli gate with the fidelity based on different computation bases. The multi-qubit-entanglement gate is no longer theoretical since it can be implemented in principle with single-qubit photons.  相似文献   

20.
Multimedia Tools and Applications - Applying local binary pattern (LBP) to images with uniform distribution leads to generate discriminative features; however, the distribution of all images is not...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号