cnot operation
Recently Published Documents


TOTAL DOCUMENTS

11
(FIVE YEARS 4)

H-INDEX

3
(FIVE YEARS 1)

2020 ◽  
Vol 10 (17) ◽  
pp. 5770
Author(s):  
Yanyan Feng ◽  
Qian Zhang ◽  
Jinjing Shi ◽  
Shuhui Chen ◽  
Ronghua Shi

The quantum proxy signature is one of the most significant formalisms in quantum signatures. We put forward a quantum proxy signature scheme using quantum walk-based teleportation and quantum one-time pad CNOT (QOTP-CNOT) operation, which includes four phases, i.e., initializing phase, authorizing phase, signing phase and verifying phase. The QOTP-CNOT is achieved by attaching the CNOT operation upon the QOTP and it is applied to produce the proxy signature state. The quantum walk-based teleportation is employed to transfer the encrypted message copy derived from the binary random sequence from the proxy signer to the verifier, in which the required entangled states do not need to be prepared ahead and they can be automatically generated during quantum walks. Security analysis demonstrates that the presented proxy signature scheme has impossibility of denial from the proxy and original signers, impossibility of forgery from the original signatory and the verifier, and impossibility of repudiation from the verifier. Notably, the discussion shows the complexity of the presented algorithm and that the scheme can be applied in many real scenarios, such as electronic payment and electronic commerce.


2020 ◽  
Vol 10 (4) ◽  
pp. 1353 ◽  
Author(s):  
Jinjing Shi ◽  
Shuhui Chen ◽  
Jiali Liu ◽  
Fangfang Li ◽  
Yanyan Feng ◽  
...  

A novel encryption algorithm called the chained phase-controlled operation (CPCO) is presented in this paper, inspired by CNOT operation, which indicates a stronger correlation among message states and each message state depending on not only its corresponding key but also other message states and their associated keys. Thus, it can prevent forgery effectively. According to the encryption algorithm CPCO and the classical dual signature protocols, a quantum dual signature scheme based on coherent states is proposed in this paper. It involves three participants, the customer Alice, the merchant Bob and the bank Trent. Alice expects to send her order message and payment message to Bob and Trent, respectively. It is required that the two messages must be linked to guarantee the payment is paid for the corresponding order. Thus, Alice can generate a quantum dual signature to achieve the goal. In detail, Alice firstly signs her two messages with the shared secret key. Then She connects the two signatures into a quantum dual signature. Finally, Bob and Trent severally verify the signatures of the order message and the payment message. Security analysis shows that our scheme can ensure its security against forgery, repudiation and denial. In addition, simulation experiments based on the Strawberry Fields platform are performed to valid the feasibility of CPCO. Experimental results demonstrate that CPCO is viable and the expected coherent states can be acquired with high fidelity, which indicates that the encryption algorithm of the scheme can be implemented on quantum devices effectively.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Ping Zhou ◽  
Li Lv

Abstract Implementing CNOT operation nonlocally is one of central tasks in distributed quantum computation. Most of previously protocols for implementation quantum CNOT operation only consider implement CNOT operation in one degree of freedom(DOF). In this paper, we present a scheme for nonlocal implementation of hyper-parallel CNOT operation in polarization and spatial-mode DOFs via hyperentanglement. The CNOT operations in polarization DOF and spatial-mode DOF can be remote implemented simultaneously with hyperentanglement assisited by cross-Kerr nonlinearity. Hyper-parallel nonlocal CNOT gate can enhance the quantum channel capacity for distributed quantum computation and long-distance quantum communication. We discuss the experiment feasibility for hyper-parallel nonlocal gate. It shows that the protocol for hyper-parallel nonlocal CNOT operation can be realized with current technology.


2016 ◽  
Vol 14 (01) ◽  
pp. 1650007 ◽  
Author(s):  
Ye-Feng He ◽  
Wen-Ping Ma

Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.


2011 ◽  
Vol 51 (1) ◽  
pp. 292-302
Author(s):  
Jian Li ◽  
Dan-Jie Song ◽  
Xiao-Jing Guo ◽  
Bo Jing
Keyword(s):  

2010 ◽  
Vol 08 (05) ◽  
pp. 787-794 ◽  
Author(s):  
JUAN-JUAN CHEN ◽  
JUN-HONG AN

We propose a scheme for deterministically teleporting a pure quantum state, making use of the Faraday rotation of photonic polarization in cavity QED system. Based on the single-photon input-output process regarding cavities, the scheme works well even in low-Q cavities. Since only virtual excitation of the atoms is involved, it is also insensitive to atomic spontaneous emission. Besides, the CNOT operation replaced by the Faraday rotation is not needed in the scheme, which could greatly relax the experimental difficulty.


2008 ◽  
Vol 53 (2) ◽  
pp. 477-480 ◽  
Author(s):  
Yan-Hui Zhou ◽  
Xiao-Qiang Shao ◽  
Chun-Jiao Yang ◽  
Shou Zhang ◽  
Kyu-Hwang Yeon
Keyword(s):  

2005 ◽  
Vol 43 (6) ◽  
pp. 1003-1008
Author(s):  
Chen Li-Bing ◽  
Lu Hong ◽  
Chen Wei-Cheng
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document