首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We present a new scheme for sharing an arbitrary two-qubit quantum state with n agents. In our scheme, the sender Alice first shares n Einsein-Podolsky-Rosen (EPR) pairs in Bell states with n agents. After setting up the secure quantum channel, Alice first applies (n − 2) Controlled-Not (CNOT) gate operations, and then performs two Bell-state measurements and (n − 2) single-particle measurements (n >2). In addition, all controllers only hold one particle in their hands, respectively, and thus they only need to perform a single-particle measurement on the respective particle with the basis {|0?, |1?}{\{{\vert}0\rangle, {\vert}1\rangle\}}. Compared with other schemes with Bell states, our scheme needs less qubits as the quantum resources and exchanges less classical information, and thus obtains higher total efficiency.  相似文献   

2.
利用一个9-量子团簇态为信道,分别提出了三个关于二量子态和三量子态的双向量子信息传输协议。在第一个协议中,Alice能把三量子a1、a2和a3的未知态传送给Bob,Bob能把二量子b1和b2的未知态传送给Alice。Alice采用特殊三粒子态测量基,使得方案简化了一半。在第二个协议中,Alice在远方的Bob处制备三粒子a1、a2和a3的已知态,同时Bob也能在Alice处制备二量子b1和b2的已知态。由于他们充分利用了前馈测量策略,制备任务能够完美完成。在第三个协议中,利用前两个协议的优点,Alice能成功将三量子a1、a2和a3的未知态传送给Bob,Bob也完美地在Alice处制备二量子b1和b2的已知态。  相似文献   

3.
By exploiting the entanglement correlation in quantum mechanics, two three-party remote state preparation (RSP) schemes are proposed. One is three-party remote preparation of a single-particle quantum state, and the other is three-party remote preparation of a two-particle entangled state. In the proposed schemes, the sender Alice knows the quantum states to be prepared, while the receivers Bob and Charlie do not know the quantum states; Alice performs measurement and unitary operations on her own particles with two three-particle GHZ states as the quantum channel. According to Alice’s measurement results, Bob and Charlie measure their own particles on the corresponding quantum measurement bases and perform unitary operations on the corresponding particles to reconstruct the quantum states, respectively. Compared with multiparty joint remote preparation and two-party RSP of a quantum state, the proposed schemes realize quantum multicast communication successfully, which enables Bob and Charlie to obtain the prepared quantum states simultaneously in the case of just knowing Alice’s measurement results, while Bob and Charlie do not know each other’s prepared quantum states. It is shown that only three classical bits are required for the two proposed RSP schemes when Bob and Alice introduce an auxiliary particle, respectively, and the proposed schemes are secure after the quantum channel authentication.  相似文献   

4.
利用一个五粒子团簇态为信道,分别提出了三个关于二粒子态和单粒子态的双向受控量子信息传输协议。在第一个协议中,通过引入辅助粒子,实施受控非门运算和Bell态测量,Alice能把二粒子未知态传送给Bob,同时Bob也能把单粒子未知态传送给Alice。在第二个方案中,通过引入辅助粒子、巧妙构造正交基和执行单粒子投影测量,Alice能帮助Bob远程地制备二粒子已知态,同时Bob也能帮助Alice远程地制备单粒子已知态。由于他们充分利用了前馈策略去构造测量基,制备任务能够完美完成。在第三个方案中,结合前两个方案的特点,Alice能成功将二粒子未知态传送给Bob,Bob也完美地在Alice处制备单粒子已知态。上述三个方案离开监控者的允许是不能实现的。  相似文献   

5.
We present a highly efficient scheme for perfect joint remote preparation of an arbitrary \( 2^{n} \)-qubit W state with minimum quantum resource. Both the senders Alice and Bob intend to jointly prepare one \( 2^{n} \)-qubit W state for the remote receiver Charlie. In the beginning, they help the remote receiver Charlie to construct one n-qubit intermediate state which is closely related to the target \( 2^{n} \)-qubit W state. Afterward, Charlie introduces auxiliary qubits and applies appropriate operations to obtain the target \( 2^{n} \)-qubit W state. Compared with previous schemes, our scheme requires minimum quantum resource and least amount of classical communication. Moreover, our scheme has a significant potential for being adapted to remote state preparation of other special states.  相似文献   

6.
Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller’s cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller’s cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.  相似文献   

7.
Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob’s secret inputs correctly without leaking them. Firstly, \(\chi ^+\) state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis \(\{|\phi ^\pm \rangle ,|\psi ^\pm \rangle \}\) or the basis \(\{|\chi ^\pm \rangle ,|\omega ^\pm \rangle \}\) is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.  相似文献   

8.
Uniformly sized droplets of soybean oil, MCT (medium-chain fatty acid triglyceride) oil and n-tetradecane with a Sauter mean diameter of d 3,2 = 26–35 μm and a distribution span of 0.21–0.25 have been produced at high throughputs using a 24 × 24 mm silicon microchannel plate consisting of 23,348 asymmetric channels fabricated by photolithography and deep reactive ion etching. Each channel consisted of a 10-μm diameter straight-through micro-hole with a length of 70 μm and a 50 × 10 μm micro-slot with a depth of 30 μm at the outlet of each channel. The maximum dispersed phase flux for monodisperse emulsion generation increased with decreasing dispersed phase viscosity and ranged from over 120 L m−2 h−1 for soybean oil to 2,700 L m−2 h−1 for n-tetradecane. The droplet generation frequency showed significant channel to channel variations and increased with decreasing viscosity of the dispersed phase. For n-tetradecane, the maximum mean droplet generation frequency was 250 Hz per single active channel, corresponding to the overall throughput in the device of 3.2 million droplets per second. The proportion of active channels at high throughputs approached 100% for soybean oil and MCT oil, and 50% for n-tetradecane. The agreement between the experimental and CFD (Computational Fluid Dynamics) results was excellent for soybean oil and the poorest for n-tetradecane.  相似文献   

9.
We propose a scheme of cyclic quantum teleportation for three unknown qubits using six-qubit maximally entangled state as the quantum channel. Suppose there are three observers Alice, Bob and Charlie, each of them has been given a quantum system such as a photon or spin-\(\frac{1}{2}\) particle, prepared in state unknown to them. We show how to implement the cyclic quantum teleportation where Alice can transfer her single-qubit state of qubit a to Bob, Bob can transfer his single-qubit state of qubit b to Charlie and Charlie can also transfer his single-qubit state of qubit c to Alice. We can also implement the cyclic quantum teleportation with \(N\geqslant 3\) observers by constructing a 2N-qubit maximally entangled state as the quantum channel. By changing the quantum channel, we can change the direction of teleportation. Therefore, our scheme can realize teleportation in quantum information networks with N observers in different directions, and the security of our scheme is also investigated at the end of the paper.  相似文献   

10.
By using a generalized Greenberger–Horne–Zeilinger (GHZ) state in which is locally unitarily connected with standard GHZ state as a communication channel, semi-quantum key distribution is extended to study semi-quantum information splitting protocols for secret sharing of quantum information. In our scheme, quantum Alice splits arbitrary two, three and N-qubit states with two classical parties, Bob and Charlie, in a way that both parties are sufficient to reconstruct Alice’s original states only under the condition of which she/he obtains the help from another one, but one of them cannot. The presented protocols are helpful for both secure against certain eavesdropping attacks and economical in processing of quantum information.  相似文献   

11.
We present an efficient scheme for five-party quantum state sharing (QSTS) of an arbitrary m-qubit state with multiqubit cluster states. Unlike the three-partite QSTS schemes using the same quantum channel [Phys. Rev. A 78, 062333 (2008)], our scheme for sharing of quantum information among five parties utilizing a cluster state as an entangled resource. It is found that the six-partite cluster state can be used for QSTS of an entangled state, the five-partite cluster state can be used for QSTS of an arbitrary two-qubit state and also can be used for QSTS of an arbitrary m-qubit state. It involves two-qubit Bell-basis or three-qubit GHZ-basis measurements, not multipartite joint measurements, which makes it more convenient than some previous schemes. In addition, the total efficiency really approaches the maximal value.  相似文献   

12.
In this paper, we propose a novel scheme for asymmetric bidirectional controlled remote state preparation (ABCRSP) via a ten-qubit entangled state as the quantum channel. In this scheme, two distant parties, Alice and Bob are not only senders but also receivers, and Alice wants to remotely prepare a single-qubit state at Bob’s site; at the same time, Bob wishes to help Alice remotely prepare an arbitrary four-qubit cluster-type entangled state. It is shown that only if the two senders and the controller collaborate with each other, the ABCRSP can be completed successfully. We demonstrate that the total success probability of the ABCRSP in this scheme can reach 1, that is, the scheme is deterministic.  相似文献   

13.
We present a simple and natural extension of Phillips’ model (Phillips in Phys Fluids A 4(1):30–40, 1992) for shear induced particle migration in concentrated suspensions. It is based on considering an effective deformation rate as it is experienced by a solid particle of finite size. In this way the solid fraction does not converge anymore to the maximum packing in the centre of Poiseuille-like flows where the deformation rate vanishes, and the steady state concentration profile becomes dependent on the particle diameter a. In addition, the migration rate in the extended model scales with a n , where 2 < n < 3 in contrast to the strict a 2-scaling of the original Phillips-model.  相似文献   

14.
针对量子秘密共享的量子态局限于最大纠缠态的问题,提出一种实现任意N位量子态的秘密共享方案。该方案使用纠缠态作为量子信道,首先发送方对粒子进行Bell基测量,然后接收方Bob或Charlie使用单粒子测量,最后参与者根据Alice和单粒子测量得到的结果,选用合适的联合幺正变换对量子态进行相应的变换,这样可以实现任意N粒子量子态的秘密共享。该方案能够抵御外部窃听者和内部不诚实参与者的攻击,安全性分析表明此方案是安全的。  相似文献   

15.
In this paper, a new interconnection network called the incomplete crossed hypercube is proposed for connecting processors of parallel computing systems. The incomplete crossed hypercube architecture denoted by CI nm n is made by combining two complete crossed hypercubes CQ n and CQ nm for 1≤mn. Several topological properties of CI nm n are analyzed. In particular, accurate mean internode distance formulas of both CQ n and CI nm n are given. Compared with the incomplete enhanced hypercube EI nm n , CI nm n has shorter mean internode distance for large n. An optimal routing algorithm for CI nm n is also described which guarantees the generation of a shortest path from a node to another in CI nm n .  相似文献   

16.
Cluster态的量子签名方案   总被引:1,自引:0,他引:1       下载免费PDF全文
提出一种利用Cluster state纠缠态实现的量子签名方案。该方案中用Cluster态作为量子信道,每一组量子比特串分别分发给消息拥有和签名者Alice、公证人TA、验签名者Bob。加载消息的方法是Alice在TA规定量子比特串序列下,分别对拥有的量子比特对的第一个量子比特进行幺正变换操作而进行。对拥有的量子比特对进行的Bell测量结果是消息的签名。Bob对拥有的对应的两个量子比特对进行Bell测量来验证签名,但要得到公证人TA对其约束才能完成。Cluster state纠缠态在纠缠特性、局域操作保真性和安全性有较好的性能。  相似文献   

17.
18.
Two new families of asymmetric quantum codes are constructed in this paper. The first one is derived from the Calderbank-Shor-Steane (CSS) construction applied to classical Reed-Solomon (RS) codes, providing quantum codes with parameters [[Nl(q l −1), Kl(q l −2d + c + 1), d z d/d x ≥ (dc)]] q , where q is a prime power and d > c + 1, c ≥ 1, l ≥ 1 are integers. The second family is derived from the CSS construction applied to classical generalized RS codes, generating quantum codes with parameters [[N = mn, K = m(2kn + c), d z d/d x ≥ (dc)]] q , where q is a prime power, 1 < k < n < 2k + cq m , k = nd + 1, and n, d > c + 1, c ≥ 1, m ≥ 1 are integers. Although the second proposed construction generalizes the first one, the techniques developed in both constructions are slightly different. These new codes have parameters better than or comparable to the ones available in the literature. Additionally, the proposed codes can be utilized in quantum channels having great asymmetry, that is, quantum channels in which the probability of occurrence of phase-shift errors is large when compared to the probability of occurrence of qudit-flip errors.  相似文献   

19.
This paper takes up a remark in the well-known paper of Alon, Matias, and Szegedy (J. Comput. Syst. Sci. 58(1):137–147, 1999) about the computation of the frequency moments of data streams and shows in detail how any F k with k≥1 can be approximately computed using space O(km 1−1/k (k+log m+log log  n)) based on approximate counting. An important building block for this, which may be interesting in its own right, is a new approximate variant of reservoir sampling using space O(log log  n) for constant error parameters.  相似文献   

20.
We present an exact algorithm that decides, for every fixed r≥2 in time O(m)+2O(k2)O(m)+2^{O(k^{2})} whether a given multiset of m clauses of size r admits a truth assignment that satisfies at least ((2 r −1)m+k)/2 r clauses. Thus Max-r-Sat is fixed-parameter tractable when parameterized by the number of satisfied clauses above the tight lower bound (1−2r )m. This solves an open problem of Mahajan et al. (J. Comput. Syst. Sci. 75(2):137–153, 2009).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号