noisy quantum channel
Recently Published Documents


TOTAL DOCUMENTS

25
(FIVE YEARS 3)

H-INDEX

10
(FIVE YEARS 0)

2022 ◽  
Author(s):  
Jino Heo ◽  
Seong Gon Choi

Abstract We propose photonic schemes for the distribution and reconstruction of a two-qubit entangled state using a hybrid entangled state under a noisy quantum channel. First, to generate a hybrid entangled state correlated with polarizations and time-bins, we employ a quantum dot (QD)-cavity system (nonlinear optical gate) and linear optical devices to implement controlled operation. These schemes can achieve the distribution and reconstruction of a two-qubit entangled state from hybrid entanglement by utilizing only linear optical devices without a QD-cavity system (i.e., a nonlinear optical device) for users who want to share an entangled state under a noisy quantum channel. For a feasible realization of the proposed schemes, we analyze the interaction between the photons and QD-cavity system and demonstrate the experimental conditions under which the reliable performance of the QD-cavity system is achieved.


2019 ◽  
Vol 28 (1) ◽  
pp. 010304
Author(s):  
Linxi Zhang ◽  
Changhua Zhu ◽  
Changxing Pei

2015 ◽  
Vol 92 (4) ◽  
Author(s):  
Ismail Akhalwaya ◽  
Mervlyn Moodley ◽  
Francesco Petruccione

2014 ◽  
Vol 28 (15) ◽  
pp. 1450121 ◽  
Author(s):  
Dongsu Shen ◽  
Wenping Ma ◽  
Meiling Wang ◽  
Xunru Yin

A security loophole exists in Gao et al.'s controlled quantum secure direct communication protocol. By employing the security loophole, the receiver can obtain the secret message sent by the sender without the permission of the controller in their protocol. In order to avoid this loophole, we present an improved protocol in this paper. In the improved protocol, entangled particles are prepared at random in two GHZ-like states, which ensure that the receiver is not able to recover the secret message without knowing the initially entangled state. Compared with the other improved version whose security depends on the perfect quantum channel, our improved protocol is secure in a noisy quantum channel. Therefore, our protocol is more practical.


2014 ◽  
Vol 14 (7&8) ◽  
pp. 589-607
Author(s):  
Xiu-Bo Chen ◽  
Gang Xu ◽  
Yuan Su ◽  
Yi-Xian Yang

In this paper, the perfect secret sharing in quantum cryptography is investigated. On one hand, the security of a recent protocol [Adhikari et al. Quantum Inform. \& Comput. 12 (2012) 0253-0261] is re-examined. We find that it violates the requirement of information theoretic security in the secret sharing and suffers from the information leakage. The cryptanalysis including several specific attack strategies are given, which shows that a dishonest participant can steal half or all of the secrets without being detected. On the other hand, we design a new quantum secret sharing protocol. The security of protocol is rigorously proved. It meets the fundamental requirement of information theoretic security. Furthermore, the security analysis including both the outside attacks and participant attacks is given in details. It is shown that our proposed protocol can achieve perfect secret sharing.


Sign in / Sign up

Export Citation Format

Share Document