Quantum Teleportation and Superdense Coding via W-Class States

2008 ◽  
Vol 49 (4) ◽  
pp. 901-904 ◽  
Author(s):  
Wu Huai-Zhi ◽  
Yang Zhen-Biao ◽  
Zheng Shi-Biao
Author(s):  
Phillip Kaye ◽  
Raymond Laflamme ◽  
Michele Mosca

We are now ready to look at our first protocols for quantum information. In this section, we examine two communication protocols which can be implemented using the tools we have developed in the preceding sections. These protocols are known as superdense coding and quantum teleportation. Both are inherently quantum: there are no classical protocols which behave in the same way. Both involve two parties who wish to perform some communication task between them. In descriptions of such communication protocols (especially in cryptography), it is very common to name the two parties ‘Alice’ and ‘Bob’, for convenience. We will follow this tradition. We will repeatedly refer to communication channels. A quantum communication channel refers to a communication line (e.g. a fiberoptic cable), which can carry qubits between two remote locations. A classical communication channel is one which can carry classical bits (but not qubits).1 The protocols (like many in quantum communication) require that Alice and Bob initially share an entangled pair of qubits in the Bell state The above Bell state is sometimes referred to as an EPR pair. Such a state would have to be created ahead of time, when the qubits are in a lab together and can be made to interact in a way which will give rise to the entanglement between them. After the state is created, Alice and Bob each take one of the two qubits away with them. Alternatively, a third party could create the EPR pair and give one particle to Alice and the other to Bob. If they are careful not to let them interact with the environment, or any other quantum system, Alice and Bob’s joint state will remain entangled. This entanglement becomes a resource which Alice and Bob can use to achieve protocols such as the following. Suppose Alice wishes to send Bob two classical bits of information. Superdense coding is a way of achieving this task over a quantum channel, requiring only that Alice send one qubit to Bob. Alice and Bob must initially share the Bell state Suppose Alice is in possession of the first qubit and Bob the second qubit.


2012 ◽  
Vol 12 (5) ◽  
pp. 1957-1967 ◽  
Author(s):  
Zhi-hua Zhang ◽  
Lan Shu ◽  
Zhi-wen Mo

2016 ◽  
Vol 15 (8) ◽  
pp. 3137-3150 ◽  
Author(s):  
Ke Li ◽  
Fan-Zhen Kong ◽  
Ming Yang ◽  
Fatih Ozaydin ◽  
Qing Yang ◽  
...  

2001 ◽  
Vol 171 (11) ◽  
pp. 1264 ◽  
Author(s):  
Ivan V. Sokolov ◽  
A. Gatti ◽  
M.I. Kolobov ◽  
L.A. Lugiato

Author(s):  
D. Sowmya ◽  
S. Sivasankaran

In the cloud environment, it is difficult to provide security to the monolithic collection of data as it is easily accessed by breaking the algorithms which are based on mathematical computations and on the other hand, it takes much time for uploading and downloading the data. This paper proposes the concept of implementing quantum teleportation i.e., telecommunication + transportation in the cloud environment for the enhancement of cloud security and also to improve speed of data transfer through the quantum repeaters. This technological idea is extracted from the law of quantum physics where the particles say photons can be entangled and encoded to be teleported over large distances. As the transfer of photons called qubits allowed to travel through the optical fiber, it must be polarized and encoded with QKD (Quantum Key Distribution) for the security purpose. Then, for the enhancement of the data transfer speed, qubits are used in which the state of quantum bits can be encoded as 0 and 1 concurrently using the Shors algorithm. Then, the Quantum parallelism will help qubits to travel as fast as possible to reach the destination at a single communication channel which cannot be eavesdropped at any point because, it prevents from creating copies of transmitted quantum key due to the implementation of no-cloning theorem so that the communication parties can only receive the intended data other than the intruders.


Sign in / Sign up

Export Citation Format

Share Document