A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m ...A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efticiency for qudits in this scheme approaches 100% in principle.展开更多
A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice ...A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large.展开更多
We propose a method to realize the teleportation of an unknown entangled state that consists of many qudits through a partially entangled-qudit quantum channel with the help of 2 log2 d-bit classical communication. Th...We propose a method to realize the teleportation of an unknown entangled state that consists of many qudits through a partially entangled-qudit quantum channel with the help of 2 log2 d-bit classical communication. The operations used in the teleportation process include a generalized Bell-state measurement and a series of singlequdit π-measurements performed by Alice, a series of generalized qudit-Pauli gates and two-level unitary gates, as well as a qubit measurement performed by Bob. For a maximally entangled quantum channel, the successful probability of the teleportation becomes unit.展开更多
A scheme is proposed to simulate the Ising model and preserve the maximum entangled states (Bell states) in cavity quantum electrodynamics (QED) driven by a classical field with large detuning. In the strong driving a...A scheme is proposed to simulate the Ising model and preserve the maximum entangled states (Bell states) in cavity quantum electrodynamics (QED) driven by a classical field with large detuning. In the strong driving and large-detuning regime, the effective Hamiltonian of the system is the same as the standard Ising model, and the scheme can also make the initial four Bell states of two atoms at the maximum entanglement all the time. So it is a simple memory for the maximal entangled states. The system is insensitive to the cavity decay and the thermal field and more immune to decoherence. These advantages can warrant the experimental feasibility of the current scheme. Furthermore, the genuine four-atom entanglement may be acquired via two Bell states through one-step implementation on four two-level atoms in the strong-driven model, and when two Greenberger-Horne-Zeilinger (GHZ) states are prepared in our scheme, the entangled cluster state may be acquired easily. The success probability for the scheme is 1.展开更多
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants...Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps.展开更多
基金* Supported by the National Natural Science Foundation of China under Grant Nos 10604008 and 10435020, and Beijing Education Committee under Grant No XK100270454.
文摘A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efticiency for qudits in this scheme approaches 100% in principle.
基金Supported by the National Natural Science Foundation of China under Grant Nos 10604008 and 10435020 and Beijing Education Committee under Grant No XK100270454.
文摘A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large.
基金Supported by the Key Project of the Ministry of Education of China (206103), the China Postdoctoral Science Foundation (2005037695), the National Natural Science Foundation of China under Grant Nos 10325523 and 90203018, the Scientific Research Fund of Hunan Provincial Education Bureau (05B041), and the Natural Science Foundation of Hunan Province under Grant Nos 04JJ3017 and 05JJ30012.
文摘We propose a method to realize the teleportation of an unknown entangled state that consists of many qudits through a partially entangled-qudit quantum channel with the help of 2 log2 d-bit classical communication. The operations used in the teleportation process include a generalized Bell-state measurement and a series of singlequdit π-measurements performed by Alice, a series of generalized qudit-Pauli gates and two-level unitary gates, as well as a qubit measurement performed by Bob. For a maximally entangled quantum channel, the successful probability of the teleportation becomes unit.
基金Supported by the National Natural Science Foundation of China (Grant No. 10774088)the Key Program of the National Natural Science Foundation of China (Grant No. 10534030)
文摘A scheme is proposed to simulate the Ising model and preserve the maximum entangled states (Bell states) in cavity quantum electrodynamics (QED) driven by a classical field with large detuning. In the strong driving and large-detuning regime, the effective Hamiltonian of the system is the same as the standard Ising model, and the scheme can also make the initial four Bell states of two atoms at the maximum entanglement all the time. So it is a simple memory for the maximal entangled states. The system is insensitive to the cavity decay and the thermal field and more immune to decoherence. These advantages can warrant the experimental feasibility of the current scheme. Furthermore, the genuine four-atom entanglement may be acquired via two Bell states through one-step implementation on four two-level atoms in the strong-driven model, and when two Greenberger-Horne-Zeilinger (GHZ) states are prepared in our scheme, the entangled cluster state may be acquired easily. The success probability for the scheme is 1.
基金Supported by the National Nature Science Foundation of China under Grant Nos.61103235,61170321,61373016 and 61373131the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)the Practice Inovation Trainng Program Projects for the Jiangsu College Students(201310300018Z)
文摘Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps.