共查询到20条相似文献,搜索用时 15 毫秒
1.
Shi-Dong Liang 《Quantum Information Processing》2017,16(8):187
Based on the von Neumann entropy, we give a computational formalism of the quantum entanglement dynamics in quantum channels, which can be applied to a general finite systems coupled with their environments in quantum channels. The quantum entanglement is invariant in the decoupled local unitary quantum channel, but it is variant in the non-local coupled unitary quantum channel. The numerical investigation for two examples, two-qubit and two-qutrit models, indicates that the quantum entanglement evolution in the quantum non-local coupling channel oscillates with the coupling strength and time, and depends on the quantum entanglement of the initial state. It implies that quantum information loses or gains when the state of systems evolves in the quantum non-local coupling channel. 相似文献
2.
HUANG Da-zu CHEN Zhi-gang 《通讯和计算机》2008,5(1):31-36
Based on entanglement, a deterministic secure quantum communication protocol is proposed to distribute secret messages deterministically. In this scheme the messages are encoded in the particles of the Einstein-Podolsky-Rosen (EPR) pairs rotated random polarization angles by applying random and independent operations. Security analysis indicates that this scheme is secure against the present Trojan horse attack strategy and the impersonation attack strategy, and it can also ensure the security of the messages in a low noisy channel. Moreover, it has an advantage that communication can be launched by the sender just like an actual communication system. 相似文献
3.
A scheme is proposed to implement entanglement purification for two remote less entangled photons using robust continuous variable coherent modes, called as quantum communication bus (qubus), rather than consuming expensive ancilla single-photon sources. The qubus beams in the coherent states provide for the natural communication in the purification protocol, instead of the classical communication between the distant photons. Weak cross-Kerr nonlinearities, qubus beams and quantum non-demolition (QND) photon-number-resolving measurement are utilized for implementing deterministic entanglement purification. The core element to realize the QND measurement is Kerr nonlinearity. The necessary QND measurement in the present scheme is not an extra, very difficult, addition to the present protocol, but is taken care of by a phase measurement. The entanglement purification protocol (EPP) can obtain a maximally entangled pair with only one step, instead of improving the fidelity of less entangled pairs by performing continuous indefinite iterative purification procedure. The total success probability and fidelity of the present purification scheme can approach unit in principle. In addition, we investigate photon loss of the qubus beams during the transmission and decoherence effects in the entanglement purification caused by such a photon loss. 相似文献
4.
Steve Campbell 《Quantum Information Processing》2013,12(7):2623-2636
We present a study of the behavior of two different figures of merit for quantum correlations, entanglement of formation and quantum discord, under quantum channels showing how the former can, counterintuitively, be more resilient to such environments spoiling effects. By exploiting strict conservation relations between the two measures and imposing necessary constraints on the initial conditions we are able to explicitly show this predominance is related to build-up of the system-environment correlations. 相似文献
5.
Xun-Ru Yin Wen-Ping Ma Wei-Yan Liu Dong-Su Shen 《Quantum Information Processing》2013,12(9):3093-3102
An efficient bidirectional quantum secure communication protocol is proposed with two-photon entanglement. Compared with the previous protocol proposed by Shi et al., our protocol can achieve higher efficiency. Meanwhile, for the same length secret messages, only half of entangled photon pairs need to be prepared in our protocol. And the number of classical bits in public classical communication is also a half of that in the previous protocol. Moreover, the information leakage does not exist in our scheme. 相似文献
6.
Nicolas Gisin Sandu Popescu Valerio Scarani Stefan Wolf Jürg Wullschleger 《Natural computing》2013,12(1):13-17
We show that from a communication-complexity perspective, the primitive called oblivious transfer—which was introduced in a cryptographic context—can be seen as the classical analogue to a quantum channel in the same sense as non-local boxes are of maximally entangled qubits. More explicitly, one realization of non-cryptographic oblivious transfer allows for the perfect simulation of sending one qubit and measuring it in an orthogonal basis. On the other hand, a qubit channel allows for realizing non-cryptographic oblivious transfer with probability roughly 85 %, whereas 75 % is the classical limit. 相似文献
7.
We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles \(\theta _4\) and \(\theta _3\). Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel. 相似文献
8.
Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology. 相似文献
9.
By analysis of the basic properties of entanglement swapping of high-dimensional Bell states,a universal and general deterministic secure quantum communication(DSQC)protocol is proposed,in which unitary operation is not required.By making use of the results of high-dimensional Bell measurement,the sender and the receiver can encode and decode the message respectively by performing the modular addition and subtraction.Two mutually complementary bases are constructed;and according to the property of mutual complement,a method for checking security of the high-dimensional quantum channel is put forward.Some common attack strategies are analyzed,and the corresponding error rates are calculated.Then the upper bound of the threshold of error rate is deduced. 相似文献
10.
11.
在分析高维Bell态纠缠交换基本性质的基础上,提出不需要任何酉操作、具有通用性和一般性的高维确定性安全量子通信方案.利用高维Bell测量的结果,发送方和接收方分别进行模加、减运算即可编码、解码信息.构造了两组互补的基,并根据其互补性质,提出了检测高维量子信道是否安全的方法.详细分析了几种常用攻击策略,并计算了这些攻击所引起的错误率,进而推导出通信双方需设定的错误率阈值的上界. 相似文献
12.
This work proposes two fault tolerant quantum key distribution (QKD) protocols. Each of which is robust under one kind of collective noises: collective-dephasing noise and collective-rotation noise, respectively. Due to the use of the entanglement swapping of Greenberger–Horne–Zeilinger (GHZ) state as well as the decoy logical qubits, the new protocols provide the best qubit efficiency among the existing fault tolerant QKD protocols over the same collective-noise channel. The receiver simply performs two Bell measurements to obtain the raw key. Moreover, the proposed protocols are free from several well-known attacks and can also be secure over a lossy channel. 相似文献
13.
Mark M. Wilde 《Quantum Information Processing》2017,16(10):264
The classical-input quantum-output (cq) wiretap channel is a communication model involving a classical sender X, a legitimate quantum receiver B, and a quantum eavesdropper E. The goal of a private communication protocol that uses such a channel is for the sender X to transmit a message in such a way that the legitimate receiver B can decode it reliably, while the eavesdropper E learns essentially nothing about which message was transmitted. The \(\varepsilon \)-one-shot private capacity of a cq wiretap channel is equal to the maximum number of bits that can be transmitted over the channel, such that the privacy error is no larger than \(\varepsilon \in (0,1)\). The present paper provides a lower bound on the \(\varepsilon \)-one-shot private classical capacity, by exploiting the recently developed techniques of Anshu, Devabathini, Jain, and Warsi, called position-based coding and convex splitting. The lower bound is equal to a difference of the hypothesis testing mutual information between X and B and the “alternate” smooth max-information between X and E. The one-shot lower bound then leads to a non-trivial lower bound on the second-order coding rate for private classical communication over a memoryless cq wiretap channel. 相似文献
14.
Jie Huang Michel Barbeau Stéphane Blouin Craig Hamm Martin Taillefer 《International Journal of Parallel, Emergent and Distributed Systems》2017,32(5):466-485
Acoustic waves are the preferred medium for long-range underwater communications. Increasing number of innovative methods for underwater communication using acoustic waves appears. Performance of underwater communications for the new methods needs to be evaluated through simulation. Simulation of underwater acoustic communications is challenging due to many impediments, including attenuation, multipath propagation, noise and Doppler spread. In this paper, a baseline time domain simulation model is extended to several frequency-domain models. The proposed frequency models, including two incoherent models and a coherent model, take multipath attenuation and ambient noise into account. An incoherent linear fitting model and a coherent model are simulated and compared with a theoretical reference and the baseline time model. The proposed incoherent models are also compared with one another. Simulation shows that the incoherent linear fitting model produces results similar to the multi-frequency-merge-path model, but requires less computation time. In addition, the proposed coherent model is compared with field experimental data. The coherent model with color noise, in the frequency domain, can match closely the bit error rates of the field experimental data. 相似文献
15.
This paper proposes two new fault-tolerant controlled deterministic secure quantum communication (CDSQC) protocols based only on Einstein–Podolsky–Rosen (EPR) entangled states. The proposed protocols are designed to be robust against the collective-dephasing noise and the collective-rotation noise, respectively. Compared to the existing fault-tolerant controlled quantum communication protocols, the proposed protocols not only can do without a quantum channel between the receiver and the controller as the state-of-the-art protocols do, but also have the advantage that the number of quantum particles required in the CDSQC protocols is reduced owing to the use of the simplest entangled states. 相似文献
16.
Jino Heo Min-Sung Kang Chang-Ho Hong Hyeon Yang Seong-Gon Choi 《Quantum Information Processing》2017,16(1):24
We propose quantum information processing schemes based on cavity quantum electrodynamics (QED) for quantum communication. First, to generate entangled states (Bell and Greenberger–Horne–Zeilinger [GHZ] states) between flying photons and three-level atoms inside optical cavities, we utilize a controlled phase flip (CPF) gate that can be implemented via cavity QED). Subsequently, we present an entanglement swapping scheme that can be realized using single-qubit measurements and CPF gates via optical cavities. These schemes can be directly applied to construct an entanglement channel for a communication system between two users. Consequently, it is possible for the trust center, having quantum nodes, to accomplish the linked channel (entanglement channel) between the two separate long-distance users via the distribution of Bell states and entanglement swapping. Furthermore, in our schemes, the main physical component is the CPF gate between the photons and the three-level atoms in cavity QED, which is feasible in practice. Thus, our schemes can be experimentally realized with current technology. 相似文献
17.
Zhiguo Qu Shengyao Wu Mingming Wang Le Sun Xiaojun Wang 《Quantum Information Processing》2017,16(12):306
As one of important research branches of quantum communication, deterministic remote state preparation (DRSP) plays a significant role in quantum network. Quantum noises are prevalent in quantum communication, and it can seriously affect the safety and reliability of quantum communication system. In this paper, we study the effect of quantum noise on deterministic remote state preparation of an arbitrary two-particle state via different quantum channels including the \(\chi \) state, Brown state and GHZ state. Firstly, the output states and fidelities of three DRSP algorithms via different quantum entangled channels in four noisy environments, including amplitude-damping, phase-damping, bit-flip and depolarizing noise, are presented, respectively. And then, the effects of noises on three kinds of preparation algorithms in the same noisy environment are discussed. In final, the theoretical analysis proves that the effect of noise in the process of quantum state preparation is only related to the noise type and the size of noise factor and independent of the different entangled quantum channels. Furthermore, another important conclusion is given that the effect of noise is also independent of how to distribute intermediate particles for implementing DRSP through quantum measurement during the concrete preparation process. These conclusions will be very helpful for improving the efficiency and safety of quantum communication in a noisy environment. 相似文献
18.
We propose a mechanism for quantum state transfer (QST) over a binary tree spin network on the basis of incomplete collapsing measurements. To this aim, we perform initially a weak measurement (WM) on the central qubit of the binary tree network where the state of our concern has been prepared on that qubit. After the time evolution of the whole system, a quantum measurement reversal (QMR) is performed on a chosen target qubit. By taking optimal value for the strength of QMR, it is shown that the QST quality from the sending qubit to any typical target qubit on the binary tree is considerably improved in terms of the WM strength. Also, we show that how high-quality entanglement distribution over the binary tree network is achievable by using this approach. 相似文献
19.
In this work, the protection of different quantum entanglement and correlation is explored by local filtering operations. The results show that the filtering operations can indeed be useful for combating amplitude-damping decoherence and recovering the quantum entanglement and correlation. In this scheme, although the final states satisfy the quantum entanglement and correlation, the corresponding initial noisy states does not satisfy them, which means that the filtering operations can reveal the hidden genuine quantum entanglement and correlation of these initial noisy states. 相似文献
20.
We incorporate active and passive quantum error-correcting techniques to protect a set of optical information modes of a continuous-variable
quantum information system. Our method uses ancilla modes, entangled modes, and gauge modes (modes in a mixed state) to help
correct errors on a set of information modes. A linear-optical encoding circuit consisting of offline squeezers, passive optical
devices, feedforward control, conditional modulation, and homodyne measurements performs the encoding. The result is that
we extend the entanglement-assisted operator stabilizer formalism for discrete variables to continuous-variable quantum information
processing. 相似文献