qubit efficiency
Recently Published Documents


TOTAL DOCUMENTS

10
(FIVE YEARS 4)

H-INDEX

5
(FIVE YEARS 1)

2021 ◽  
Vol 36 (37) ◽  
Author(s):  
Xi Huang ◽  
Shibin Zhang ◽  
Yan Chang ◽  
Fan Yang ◽  
Min Hou ◽  
...  

As one of the most important branches of quantum cryptography, quantum secure direct communication (QSDC) is used to transmit the secret message directly rather than distribute a random key. Quantum homomorphic encryption (QHE) enables arbitrary quantum transformation on encrypted data without decrypting the data. To date, the previously proposed QSDC schemes are mainly based on different quantum states. The research of the QSDC scheme based on QHE is still blank. In this paper, a QSDC scheme by taking advantage of the properties of QHE is proposed. The proposed protocol has applied QHE and decoy photons to prevent various types of attacks. The proposed scheme only utilizes the rotation operation to encode the secret message which is easy to implement with the current technologies. Moreover, the communication efficiency and the qubit-utilization ratio are analyzed in this paper, which shows that this protocol has good performance in the qubit-utilization ratio, and the qubit efficiency of the QSDC scheme has improved.


2021 ◽  
pp. 2150137
Author(s):  
Jie Tang ◽  
Lei Shi ◽  
Jiahua Wei ◽  
Yang Xue ◽  
Huicun Yu

Based on the logic Bell states, we present two novel multi-party quantum key agreement (QKA) protocols under collective noise. The proposed protocols make full use of four-qubit logic Bell states as quantum resources and perform the novel encoding operation to generate the shared key. The security analysis shows that these two protocols can resist against both participant and outsider attacks. Furthermore, compared with the other existing multi-party QKA protocols over collective noise, our protocols have higher qubit efficiency. Finally, we perform the simulation of the relationship between efficiency and security, which is completely consistent with the conclusion of the security analysis of the protocols.


2019 ◽  
Vol 74 (9) ◽  
pp. 799-811
Author(s):  
Hargeet Kaur ◽  
Atul Kumar

AbstractWe analyse the ping-pong (PP) protocol [K. Bostrom and T. Felbinger, Phys. Rev. Lett. 89, 187902 (2002)] using different sets of partially entangled three-qubit states. Interestingly, our results show that the partially entangled nonorthogonal three-qubit states are more useful as resources in comparison to three-qubit maximally entangled Greenberger–Horne–Zeilinger (GHZ) states. The properties of orthogonal set of partially entangled states as resources for PP protocol, however, are similar to that of maximally entangled GHZ states – both the states are not preferable due to the vulnerability towards eavesdropping. On the other hand, partially entangled nonorthogonal basis set holds importance for transferring two-bit information, one each from a sender, to a single receiver. The protocol is further analysed for various eavesdropping attacks, and the results are compared with the use of two shared Bell pairs for two-bit information transfer. Surprisingly, the use of partially entangled nonorthogonal set of states is found to offer better qubit efficiency and increased security, as against the use of two separate maximally entangled Bell states with orthogonal basis. In addition, we also propose a mixed-state sharing protocol to further enhance the security of the PP protocol.


2019 ◽  
Vol 34 (01) ◽  
pp. 1950004 ◽  
Author(s):  
Yuhua Sun ◽  
Lili Yan ◽  
Yan Chang ◽  
Shibin Zhang ◽  
Tingting Shao ◽  
...  

Quantum secure direct communication allows one participant to transmit secret messages to another directly without generating a shared secret key first. In most of the existing schemes, quantum secure direct communication can be achieved only when the two participants have full quantum ability. In this paper, we propose two semi-quantum secure direct communication protocols to allow restricted semi-quantum or “classical” users to participate in quantum communication. A semi-quantum user is restricted to measure, prepare, reorder and reflect quantum qubits only in the classical basis [Formula: see text]. Both protocols rely on quantum Alice to randomly prepare Bell states, perform Bell basis measurements and publish the initial Bell states, but the semi-quantum Bob only needs to measure the qubits in classical basis to obtain secret information without quantum memory. Security and qubit efficiency analysis have been given in this paper. The analysis results show that the two protocols can avoid some eavesdropping attacks and their qubit efficiency is higher than some current related quantum or semi-quantum protocols.


Quantum ◽  
2017 ◽  
Vol 1 ◽  
pp. 2 ◽  
Author(s):  
Theodore J. Yoder ◽  
Isaac H. Kim

The surface code is one of the most successful approaches to topological quantum error-correction. It boasts the smallest known syndrome extraction circuits and correspondingly largest thresholds. Defect-based logical encodings of a new variety called twists have made it possible to implement the full Clifford group without state distillation. Here we investigate a patch-based encoding involving a modified twist. In our modified formulation, the resulting codes, called triangle codes for the shape of their planar layout, have only weight-four checks and relatively simple syndrome extraction circuits that maintain a high, near surface-code-level threshold. They also use 25% fewer physical qubits per logical qubit than the surface code. Moreover, benefiting from the twist, we can implement all Clifford gates by lattice surgery without the need for state distillation. By a surgical transformation to the surface code, we also develop a scheme of doing all Clifford gates on surface code patches in an atypical planar layout, though with less qubit efficiency than the triangle code. Finally, we remark that logical qubits encoded in triangle codes are naturally amenable to logical tomography, and the smallest triangle code can demonstrate high-pseudothreshold fault-tolerance to depolarizing noise using just 13 physical qubits.


2017 ◽  
Vol 15 (03) ◽  
pp. 1750018 ◽  
Author(s):  
Ye-Feng He ◽  
Wen-Ping Ma

A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.


2017 ◽  
Vol 31 (03) ◽  
pp. 1750015 ◽  
Author(s):  
Yefeng He ◽  
Wenping Ma

Based on logical GHZ states and logical Bell states, two robust quantum key agreement protocols are proposed, which can be immune to the collective-dephasing noise and the collective-rotation noise, respectively. The delayed measurement technique ensures that two participants can fairly negotiate a shared key and any one of them cannot successfully perform the participant attacks. The two protocols are congenitally free from the Trojan horse attacks and they can resist against other outsider attacks with the help of the decoy state technology. Moreover, they have no information leakage problem and achieve high qubit efficiency.


2009 ◽  
Vol 20 (10) ◽  
pp. 1531-1535 ◽  
Author(s):  
JIA-HAO CHEN ◽  
KUO-CHANG LEE ◽  
TZONELIH HWANG

Recently, Zhou et al. proposed a quantum secret sharing (QSS) protocol, which provides only 25% qubit efficiency after the processes of the random sampling discussion and the secret derivation. This work proposes an enhancement of Zhou et al.'s protocol. With the technique of the Bell measurement, the improved QSS protocol has 50% qubit efficiency.


Sign in / Sign up

Export Citation Format

Share Document