Comparison and Analysis of the Control Power Between Two Different Perfect Controlled Teleportation Schemes Using Four-particle Cluster State

2017 ◽  
Vol 56 (10) ◽  
pp. 3084-3091 ◽  
Author(s):  
Yu-ting Jiang ◽  
Zhi-wen Mo
2008 ◽  
Vol 50 (3) ◽  
pp. 633-636 ◽  
Author(s):  
Li Song-Song ◽  
Nie Yi-You ◽  
Hong Zhi-Hui ◽  
Yi Xiao-Jie ◽  
Huang Yi-Bin

2012 ◽  
Vol 10 (02) ◽  
pp. 1250022 ◽  
Author(s):  
GUO-QIANG HUANG ◽  
CUI-LAN LUO

Two schemes for controlled dense coding with a one-dimensional four-particle cluster state are investigated. In this protocol, the supervisor (Cliff) can control the channel and the average amount of information transmitted from the sender (Alice) to the receiver (Bob) by adjusting the local measurement angle θ. It is shown that the results for the average amounts of information are unique from the different two schemes.


2008 ◽  
Vol 17 (1) ◽  
pp. 64-69 ◽  
Author(s):  
Lin Gong-Wei ◽  
Lin Xiu-Min ◽  
Chen Li-Bo ◽  
Du Qian-Hua ◽  
Chen Zhi-Hua

2010 ◽  
Vol 24 (10) ◽  
pp. 995-1001 ◽  
Author(s):  
GUO-FANG SHI

In this paper, the schemes of quantum key distribution and remote state preparation of an arbitrary two-qubit state via four-particle cluster state are proposed. The efficiency of the former is 1 and the probability of the latter is 1(1/4) if the coefficients are real (complex).


2017 ◽  
Vol 15 (01) ◽  
pp. 1750002 ◽  
Author(s):  
Milad Nanvakenari ◽  
Monireh Houshmand

In this paper, a three-party controlled quantum secure direct communication and authentication (QSDCA) protocol is proposed by using four particle cluster states via a quantum one-time pad and local unitary operations. In the present scheme, only under the permission of the controller, the sender and the receiver can implement secure direct communication successfully. But under any circumstances, Charlie cannot obtain the secret message. Eavesdropping detection and identity authentication are achieved with the help of the previously shared reusable base identity strings of users. This protocol is unconditionally secure in both ideal and practical noisy cases. In one transmission, a qubit of each four particle cluster state is used as controller’s permission and the same qubit with another qubit are used to recover two classical bits of information. In the proposed scheme, the efficiency is improved compared with the previous works.


2011 ◽  
Vol 56 (5) ◽  
pp. 819-823 ◽  
Author(s):  
Zhan-Ying Guo ◽  
Xiao-Xing Shang ◽  
Jian-Xing Fang ◽  
Rui-Hua Xiao

Sign in / Sign up

Export Citation Format

Share Document