Classical Communication Cost and Remote Preparation of the Two-Atom Maximally Entangled State

2008 ◽  
Vol 47 (12) ◽  
pp. 3226-3233 ◽  
Author(s):  
Yan Xia ◽  
Jie Song ◽  
He-Shan Song
2011 ◽  
Vol 09 (01) ◽  
pp. 539-546 ◽  
Author(s):  
LIAN-FANG HAN ◽  
HAO YUAN

We propose two protocols for remotely preparing a two-qubit entangled state, where the quantum channels take the form of one-dimensional four-qubit cluster and cluster-class states, respectively. The total success probability and classical communication cost are also calculated.


2006 ◽  
Vol 355 (4-5) ◽  
pp. 285-288 ◽  
Author(s):  
Hong-Yi Dai ◽  
Ping-Xing Chen ◽  
Lin-Mei Liang ◽  
Cheng-Zu Li

2009 ◽  
Vol 07 (08) ◽  
pp. 1491-1505
Author(s):  
HACHIRO FUJITA

In this paper, we revisit the entanglement concentration protocol of Bennett et al. and the entanglement dilution protocol of Lo and Popescu via the method of types and provide a simple upper bound on the coefficient of the [Formula: see text] bound on the classical communication cost of the Lo-Popescu protocol.


2014 ◽  
Vol 12 (03) ◽  
pp. 1450011 ◽  
Author(s):  
Pengfei Xing ◽  
Yimin Liu ◽  
Chuanmei Xie ◽  
Xiansong Liu ◽  
Zhanjun Zhang

Two three-party schemes are put forward for sharing quantum operations on a remote qutrit with local operation and classical communication as well as shared entanglements. The first scheme uses a two-qutrit and three-qutrit non-maximally entangled states as quantum channels, while the second replaces the three-qutrit non-maximally entangled state with a two-qutrit. Both schemes are treated and compared from the four aspects of quantum and classical resource consumption, necessary-operation complexity, success probability and efficiency. It is found that the latter is overall more optimal than the former as far as a restricted set of operations is concerned. In addition, comparisons of both schemes with other four relevant ones are also made to show their two features, including degree generalization and channel-state generalization. Furthermore, some concrete discussions on both schemes are made to expose their important features of security, symmetry and experimental feasibility. Particularly, it is revealed that the success probabilities and intrinsic efficiencies in both schemes are completely determined by the shared entanglement.


Sign in / Sign up

Export Citation Format

Share Document