bell states
Recently Published Documents


TOTAL DOCUMENTS

355
(FIVE YEARS 111)

H-INDEX

32
(FIVE YEARS 7)

2021 ◽  
Author(s):  
Kwang-Il Kim ◽  
Myong Chol Pak ◽  
Tae-Hyok Kim ◽  
Jong Chol Kim ◽  
Yong-Hae Ko ◽  
...  

Abstract We investigate robustness of bipartite and tripartite entangled states for fermionic systems in non-inertial frames, which are under noisy channels. We consider two Bell states and two Greenberger-Horne-Zeilinger (GHZ) states, which possess initially the same amount of entanglement, respectively. By using genuine multipartite (GM) concurrence, we analytically derive the equations that determine the difference between the robustness of these locally unitarily equivalent states under the amplitude-damping channel. We find that tendency of the robustness for two GHZ states evaluated by using three-tangle τ and GM concurrence as measures of genuine tripartite entanglement is equal to each other. We also find that the robustness of two Bell states is equal to each other under the depolarizing, phase damping and bit flip channels, and that the same is true for two GHZ states.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang

AbstractThe mediated semi-quantum key distribution (MSQKD) protocol is an important research issue that lets two classical participants share secret keys securely between each other with the help of a third party (TP). However, in the existing MSQKD protocols, there are two improvable issues, namely (1) the classical participants must be equipped with expensive detectors to avoid Trojan horse attacks and (2) the trustworthiness level of TP must be honest. To the best of our knowledge, none of the existing MSQKD protocols can resolve both these issues. Therefore, this study takes Bell states as the quantum resource to propose a MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest. Furthermore, the proposed protocol is shown to be secure against well-known attacks and the classical participants only need two quantum capabilities. Therefore, in comparison to the existing MSQKD protocols, the proposed protocol is better practical.


Optik ◽  
2021 ◽  
Vol 247 ◽  
pp. 167970
Author(s):  
Vineet Kumar Shukla ◽  
Joyee Ghosh

2021 ◽  
Vol 20 (12) ◽  
Author(s):  
Ying-Qi Wang ◽  
Yu Wang ◽  
Xinyu Zhao ◽  
Jie Song ◽  
Yan Xia

2021 ◽  
Vol 11 (22) ◽  
pp. 10869
Author(s):  
Jin Xu ◽  
Xiaoguang Chen ◽  
Hanwei Xiao ◽  
Pingxun Wang ◽  
Mingzi Ma

Teleportation is an important protocol in quantum communication. Realizing teleportation between arbitrary nodes in multi-hop quantum networks is of great value. Most of the existing multi-hop quantum networks are based on Bell states or Greeberger–Horne–Zeilinger (GHZ) states. Bell state is more susceptible to noise than GHZ states after purification, but generating a GHZ state consumes more basic states. In this paper, a new quantum multi-hop network scheme is proposed to improve the interference immunity of the network and avoid large consumption at the same time. Teleportation is realized in a network based on entanglement swapping, fusion, and purification. To ensure the robustness of the system, we also design the purification algorithm. The simulation results show the successful establishment of entanglement with high fidelity. Cirq is used to verify the network on the Noisy Intermediate-Scale Quantum (NISQ) platform. The robustness of the fusion scheme is better than the Bell states scheme, especially with the increasing number of nodes. This paper provides a solution to balance the performance and consumption in a multi-hop quantum network.


Author(s):  
Ying-Hui Yang ◽  
Rang-Yang Yan ◽  
Xiao-Li Wang ◽  
Jiang Tao Yuan ◽  
Huijuan Zuo

Abstract In this paper the local distinguishability of generalized Bell states in arbitrary dimension is investigated. We firstly study the decomposition of a basis which consists of $d^{2}$ number of generalized Pauli matrices. We discover that this basis is equal to the union of $D$ number of different sets, where $D=\frac{2}{\phi(d)}\sum_{t\in \mathbb{Z}_{d} \atop gcd(t,d)=1}\sum_{i=2}^{\lfloor\frac{d}{t}\rfloor}\phi(i)+1$ and $\phi$ is Euler $\phi$-function. Then we define the generator of the matrices in this decomposition, and exhibit an algorithm to calculate generators of a given set of matrices. This algorithm shows that generators of a given set can be calculated simply and efficiently. Secondly, we show that a set $\mathcal {L}$ of GBSs can be distinguished by one-way LOCC if the cardinality of $\mathcal {G}_{\mathcal {L}}$ is less than $D\phi(d)$, where $\mathcal {G}_{\mathcal {L}}$ is a set of generators of all the elements in difference set of a set $\mathcal {L}$ of GBSs. The previous results in [2004 Phys. Rev. Lett. \textbf{92} 177905; 2019 Phys. Rev. A \textbf{99} 022307; 2021 Quant. Info. Proc. \textbf{20} 52] can be covered by our result. Finally, for the uncovered cases in [2021 Quant. Info. Proc. \textbf{20} 52], we give a new result to partly solve that problem.


Author(s):  
Jun Li ◽  
Lin Chen

Abstract We propose entanglement criteria for multipartite systems via symmetric informationally complete (SIC) measurement and general symmetric informationally complete (GSIC) measurement. We apply these criteria to detect entanglement of multipartite states, such as the convex of Bell states, entangled states mixed with white noise. It is shown that these criteria are stronger than some existing ones.


PLoS ONE ◽  
2021 ◽  
Vol 16 (10) ◽  
pp. e0258091
Author(s):  
Basma Elias ◽  
Ahmed Younes

Quantum signature is the use of the principles of quantum computing to establish a trusted communication between two parties. In this paper, a quantum signature scheme using amplitude amplification techniques will be proposed. To secure the signature, the proposed scheme uses a partial diffusion operator and a diffusion operator to hide/unhide certain quantum states during communication. The proposed scheme consists of three phases, preparation phase, signature phase and verification phase. To confuse the eavesdropper, the quantum states representing the signature might be hidden, not hidden or encoded in Bell states. It will be shown that the proposed scheme is more secure against eavesdropping when compared with relevant quantum signature schemes.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Dylan Durieux ◽  
Willi-Hans Steeb

Abstract We investigate spin Hamilton operators and compare spin coherent states and Bell states concerning entanglement, Husimi distributions, uncertainty relation and Bell inequality. The distances between spin coherent states and Bell states are derived. The Rayleigh quotients of spin Hamilton operators for spin coherent states and Bell states are evaluated and compared.


Sign in / Sign up

Export Citation Format

Share Document