QUANTUM STATE SPLITTING WITH YEO–CHUA GENUINE ENTANGLED STATE

2010 ◽  
Vol 08 (06) ◽  
pp. 991-1000 ◽  
Author(s):  
YI-MIN LIU ◽  
WEN ZHANG ◽  
XUE-QIN ZUO ◽  
ZHAN-JUN ZHANG

Utilizing the four-qubit genuine entangled state presented by Yeo and Chua [Phys. Rev. Lett.96 (2006) 060502], we propose a tripartite quantum state splitting scheme for a sender to achieve the bipartition of his/her arbitrary two-qubit pure state between two sharers. During the scheme design, two novel and important ideas originated, respectively, from Phys. Rev. A74 (2006) 054303 and J. Phys. B41 (2008) 145506 are adopted to enhance the security and optimize resource consumption, operation complexity, and intrinsic efficiency. In the scheme, first the sender performs two Bell-state measurements and publishes the results. Afterwards, if and only if the two sharers cooperate together, they can perfectly restore the sender's quantum pure state by executing first a two-qubit collective unitary operation and then two single-qubit unitary operations.

Author(s):  
Jinwei Wang ◽  
Liping Huang

In this paper, an asymmetric bidirectional controlled quantum teleportation via a six-qubit partially entangled state is given, in which Alice wants to transmit a two-qubit entangled state to Bob and Bob wants to transmit a single-qubit state to Alice on the same time. Although the six-qubit state as quantum channel is partially entangled, the teleportation is implemented deterministically. Furthermore, only Bell-state measurements, single-qubit measurements and some unitary operations are needed in the scheme.


2010 ◽  
Vol 27 (1) ◽  
pp. 010307 ◽  
Author(s):  
Zhan You-Bang ◽  
Zhang Qun-Yong ◽  
Wang Yu-Wu ◽  
Ma Peng-Cheng

2011 ◽  
Vol 09 (02) ◽  
pp. 763-772 ◽  
Author(s):  
YI-YOU NIE ◽  
YUAN-HUA LI ◽  
JUN-CHANG LIU ◽  
MING-HUANG SANG

We demonstrate that a genuine six-qubit entangled state introduced by Tapiador et al. [J. Phys. A42 (2009) 415301] can be used to realize the deterministic controlled teleportation of an arbitrary three-qubit state by performing only the Bell-state measurements.


2007 ◽  
Vol 18 (11) ◽  
pp. 1699-1706 ◽  
Author(s):  
LI DONG ◽  
XIAOMING XIU ◽  
YAJUN GAO

A scheme for quantum state sharing (QSTS) of a one-particle state is proposed for a three-particle GHZ state utilized as a quantum channel. After the sender (Alice) makes Bell-state measurements (BM) on her particles, and the controller (Charlie) performs a computational basis measurement (CM), the recipient (Bob) only needs to carry out a unitary transformation of the classical information from the sender and the controller. Finally, the scheme is generalized to multiparty QSTS of a one-qubit state with n agents and an m-qubit state with n agents.


2021 ◽  
Author(s):  
Xiao-Fang Liu ◽  
Dong-Fen Li ◽  
Yun-Dan Zheng ◽  
Xiao-Long Yang ◽  
Jie Zhou ◽  
...  

Abstract Quantum controlled teleportation is the transmission of the quantum state under the supervision of a third party. This paper presents a theoretical and experimental combination of an arbitrary two-qubit quantum controlled teleportation scheme. In the scheme, the sender Alice only needs to perform two Bell state measurements, and the receiver Bob can perform the appropriate unitary operation to reconstruct arbitrary two-qubit states under the control of the supervisor Charlie. We verified the operation process of the scheme on the IBM Quantum Experience platform and further checked the accuracy of the transmitted quantum state by performing quantum state tomography. Meanwhile, good fidelity is obtained by calculating the theoretical density matrix and the experimental density matrix. We also introduced a sequence of photonic states to analyze the possible intercept-replace-resend, intercept-measure-resend, and entanglement-measure-resend attacks on this scheme. The results proved that our scheme is highly secure.


2020 ◽  
Vol 35 (32) ◽  
pp. 2050264
Author(s):  
Zhanjun Zhang ◽  
Hao Yuan ◽  
Chuanmei Xie ◽  
Biaoliang Ye

In this paper the possibility of using mixing entangled states as quantum channel to accomplish quantum state sharing (QSTS) is considered. As a preliminary study, an efficient tripartite QSTS scheme is put forward by utilizing a mixing entangled state, which is a derivative of a six-qubit entangled pure state under a two-qubit confusion. Some specific discussions about the QSTS scheme are made, including the issues of the scheme determinacy, the sharer symmetry, the scheme security and the essential role of quantum channel as well as the current experimental feasibility.


2009 ◽  
Vol 52 (12) ◽  
pp. 1906-1912 ◽  
Author(s):  
XueQin Zuo ◽  
YiMin Liu ◽  
Wen Zhang ◽  
ZhanJun Zhang

2002 ◽  
Vol 2 (1) ◽  
pp. 66-96
Author(s):  
R.W. Spekkens ◽  
T. Rudolph

It is well known that no quantum bit commitment protocol is unconditionally secure. Nonetheless, there can be non-trivial upper bounds on both Bob's probability of correctly estimating Alice's commitment and Alice's probability of successfully unveiling whatever bit she desires. In this paper, we seek to determine these bounds for generalizations of the BB84 bit commitment protocol. In such protocols, an honest Alice commits to a bit by randomly choosing a state from a specified set and submitting this to Bob, and later unveils the bit to Bob by announcing the chosen state, at which point Bob measures the projector onto the state. Bob's optimal cheating strategy can be easily deduced from well known results in the theory of quantum state estimation. We show how to understand Alice's most general cheating strategy, (which involves her submitting to Bob one half of an entangled state) in terms of a theorem of Hughston, Jozsa and Wootters. We also show how the problem of optimizing Alice's cheating strategy for a fixed submitted state can be mapped onto a problem of state estimation. Finally, using the Bloch ball representation of qubit states, we identify the optimal coherent attack for a class of protocols that can be implemented with just a single qubit. These results provide a tight upper bound on Alice's probability of successfully unveiling whatever bit she desires in the protocol proposed by Aharonov et al., and lead us to identify a qubit protocol with even greater security.


2012 ◽  
Vol 26 (24) ◽  
pp. 1250158
Author(s):  
PENG XU ◽  
LIU YE

We propose a scheme for concentrating an arbitrary two-particle non-maximally entangled state into a maximally entangled state assisted with three cavities. The scheme involves two interaction–detection cycles and resonant interaction between atom and cavity mode. With the help of the atom trapped in the cavity, the concentration of a two-particle non-maximally entangled state trapped in separate cavities can be realized with a certain probability according to the results of photon detectors. The important feature of our scheme is that we can realize the concentration of an arbitrary two-atom non-maximally entangled state and we do not perform Bell-state measurements.


Sign in / Sign up

Export Citation Format

Share Document