entanglement states
Recently Published Documents


TOTAL DOCUMENTS

34
(FIVE YEARS 6)

H-INDEX

5
(FIVE YEARS 1)

2020 ◽  
Vol 54 (1) ◽  
pp. 015305
Author(s):  
Shanqi Pang ◽  
Xiao Zhang ◽  
Jiao Du ◽  
Tianyin Wang

Axiomathes ◽  
2020 ◽  
Author(s):  
Lorenzo Lorenzetti

Abstract It has been argued that Humean Supervenience (HS) is threatened by the existence of quantum entanglement relations. The most conservative strategy for defending HS is to add the problematic entanglement relations to the supervenience basis, alongside spatiotemporal relations. In this paper, I’m going to argue against this strategy by showing how certain particular cases of tripartite entanglement states – i.e. GHZ states – posit some crucial problems for this amended version of HS. Moreover, I will show that the principle of free recombination – which is strictly linked to HS – is severely undermined if we add entanglement relations to the supervenience basis. I conclude that the conservative move is very unappealing, and therefore the defender of HS should pursue other, more controversial, strategies (e.g. committing to the nomological interpretation of the wave function).


2019 ◽  
Vol 34 (27) ◽  
pp. 1950213 ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang ◽  
Narn-Yih Lee

Quantum secret sharing protocol, which lets a master share a secret with his/her agents and the agents can recover the master’s secret when they collaborate, is an important research issue in the quantum information field. In order to make the quantum protocol more practical, the concept of semi-quantum protocol is advanced by Boyer et al. Based on this concept, many semi-quantum secret sharing protocols have been proposed. The various entanglement states (including Bell state, GHZ state and so on) were used to be the quantum resources in these SQSS protocols, except for W-state which is the other multi-qubit entanglement state and different from GHZ states. Therefore, this study wants to use the entanglement property of W-state to propose the first three-party SQSS protocol and analyze the proposed protocol is free from the well-known attacks.


Entropy ◽  
2019 ◽  
Vol 21 (4) ◽  
pp. 336 ◽  
Author(s):  
Feng-Lin Chen ◽  
Zhi-Hua Wang ◽  
Yong-Mo Hu

The blind signature is widely used in cryptography applications because it can prevent the signer from gaining the original message. Owing to the unconditional security, the quantum blind signature is more advantageous than the classical one. In this paper, we propose a new provable secure quantum blind signature scheme with the nonorthogonal single-photon BB84-state and provide a new method to encode classical messages into quantum signature states. The message owner injects a randomizing factor into the original message and then strips the blind factor from the quantum blind signature signed by the blind signer. The verifier can validate the quantum signature and announce it publicly. At last, the analytical results show that the proposed scheme satisfies all of the security requirements of the blind signature: blindness, unforgeability, non-repudiation, unlinkability, and traceability. Due to there being no use of quantum entanglement states, the total feasibility and practicability of the scheme are obviously better than the previous ones.


2018 ◽  
Vol 6 (2) ◽  
pp. 141-150 ◽  
Author(s):  
O. M. Del Cima ◽  
D. H. T. Franco ◽  
M. M. Silva

Sign in / Sign up

Export Citation Format

Share Document