Deterministic Key Distribution Protocol Based on the Non-locality of Quantum Entangled States

2014 ◽  
Vol 13 (11) ◽  
pp. 1912-1915
Author(s):  
Li Xiaoyu ◽  
Liju Chen
Author(s):  
Richard Healey

Quantum entanglement is popularly believed to give rise to spooky action at a distance of a kind that Einstein decisively rejected. Indeed, important recent experiments on systems assigned entangled states have been claimed to refute Einstein by exhibiting such spooky action. After reviewing two considerations in favor of this view I argue that quantum theory can be used to explain puzzling correlations correctly predicted by assignment of entangled quantum states with no such instantaneous action at a distance. We owe both considerations in favor of the view to arguments of John Bell. I present simplified forms of these arguments as well as a game that provides insight into the situation. The argument I give in response turns on a prescriptive view of quantum states that differs both from Dirac’s (as stated in Chapter 2) and Einstein’s.


2013 ◽  
Vol 380-384 ◽  
pp. 4849-4855
Author(s):  
Xing Kui Huang

Quantum entangled state theory is combined with quantum thermodynamics theory to build quantum entangled state heat engine. The basic nature of three-qubit Hxx chain, and all parameters of the orbit are analyzed. Energy model of quantum entangled state refrigerator in working process is taken as as a theoretical basis to construct three qubits Hxx chain refrigerator based on quantum entangled states. The working nature of the new quantum entangled state refrigerator under different field strength is studied. Compaired with two-qubit Hxxx chain refrigerator based on quantum entangled states and mapping analysis, the working efficiency of three qubits Hxx chain refrigerator based on quantum entangled states is much higher when the field strength is not zero and its working state is more stable.


Entropy ◽  
2020 ◽  
Vol 22 (4) ◽  
pp. 434
Author(s):  
F. Hadi Madjid ◽  
John M. Myers

Entangled states of light exhibit measurable correlations between light detections at separated locations. These correlations are exploited in entangled-state quantum key distribution. To do so involves setting up and maintaining a rhythm of communication among clocks at separated locations. Here, we try to disentangle our thinking about clocks as used in actual experiments from theories of time, such as special relativity or general relativity, which already differ between each other. Special relativity intertwines the concept of time with a particular definition of the synchronization of clocks, which precludes synchronizing every clock to every other clock. General relativity imposes additional barriers to synchronization, barriers that invite seeking an alternative depending on any global concept of time. To this end, we focus on how clocks are actually used in some experimental situations. We show how working with clocks without worrying about time makes it possible to generalize some designs for quantum key distribution and also clarifies the need for alternatives to the special-relativistic definition of synchronization.


2017 ◽  
Vol 381 (35) ◽  
pp. 2922-2926 ◽  
Author(s):  
Hong Lai ◽  
Ming-Xing Luo ◽  
Cheng Zhan ◽  
Josef Pieprzyk ◽  
Mehmet A. Orgun

2011 ◽  
Vol 28 (10) ◽  
pp. 100301 ◽  
Author(s):  
Jian Wang ◽  
Sheng Zhang ◽  
Quan Zhang ◽  
Chao-Jing Tang

2012 ◽  
Vol 26 (16) ◽  
pp. 1250109 ◽  
Author(s):  
A. BECIR ◽  
M. R. B. WAHIDDIN

In this paper, we derive tight bounds for the eavesdropping attacks on continuous variable quantum key distribution (CV-QKD) protocol that involves nonmaximally entangled states. We show that deriving bounds on the eavesdropper's accessible information based on the Heisenberg uncertainty yields upper bounds, but those bounds are not tight. For this reason, we follow different techniques to derive the desired tight bounds. The new bounds are tight for all CV-QKD protocols that involve two-mode entangled state. Our derivations are applied to direct and reverse reconciliation schemes of protocol implementation, respectively.


2010 ◽  
Vol 08 (06) ◽  
pp. 1013-1022 ◽  
Author(s):  
FEN-ZHUO GUO ◽  
FEI GAO ◽  
QIAO-YAN WEN ◽  
FU-CHEN ZHU

A two-step channel-encrypting quantum key distribution protocol is proposed. Using the previously shared EPR pairs as the quantum key, two bits of classical key can be established via one information carrier EPR state on average. In theory, the efficiency of this protocol reaches 100%, and there is no need to consume any entangled states including both the quantum key and the information carriers in ideal condition. The protocol can resist the particular attack that is fatal to other some channel-encrypting schemes. Principally, we prove the security against the most general individual attack of this protocol. Entanglement collapse in practical situation, as well as the realistic implementation of this protocol is also discussed.


Sign in / Sign up

Export Citation Format

Share Document