An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice,...An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.展开更多
We propose a scheme for probabilistic teleportation of an unknown two-particle state with a four-particle pure entangled state and positive operator valued measure (POVM). In this scheme the teleportation of an unkn...We propose a scheme for probabilistic teleportation of an unknown two-particle state with a four-particle pure entangled state and positive operator valued measure (POVM). In this scheme the teleportation of an unknown two-particle state can be realized with certain probability by performing two Bell state measurements, a proper POVM and a unitary transformation.展开更多
A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to...A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to encode classical information in the quantum secret sharing process.In this scheme,each of all m members in group 1 chooses randomly his/her own secret key individually and independently,and directly encodes his/her respective secret information on the states of single photons via unitary operations,then the last one sends 1/n of the resulting qubits to each member of group 2.By measuring their respective qubits,all members in group 2 share the secret information shared by all members in group 1.It renders impossible a Trojan horse attack with a multi-photon signal,a fake-signal attack with EPR pairs,an attack with single photons,and an attack with invisible photons.We give the upper bounds on the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.展开更多
We propose a novel deterministic protocol that two senders are capable of remotely preparing arbitrary two-and three-qubit states for a remote receiver using EPR pairs and GHZ state as the quantum channel.Compared wit...We propose a novel deterministic protocol that two senders are capable of remotely preparing arbitrary two-and three-qubit states for a remote receiver using EPR pairs and GHZ state as the quantum channel.Compared with the existing deterministic protocols [An et al.2011 Phys.Lett.A 375 3570 and Chen et al.2012 J.Phys.A:Math.Theor.45 055303],the quantum resources and classical information in our scheme are decreased,and the whole operation process is simplified.展开更多
An efficient quantum secure direct communication protocol with one-sender versus N-receiver is proposed. The secret bits can be encoded in the N + 1-particle GHZ states and can be decoded by the N receivers with a cl...An efficient quantum secure direct communication protocol with one-sender versus N-receiver is proposed. The secret bits can be encoded in the N + 1-particle GHZ states and can be decoded by the N receivers with a classical information of the sender plus their own measurement outcomes. Any attacks can be detected by comparing measurement results on the detecting states.展开更多
A simplified version of the quantum teleportation protocol is presented in here. Its experimental confirmation will have deep implications for a better understanding of Quantum Entanglement with a particular projectio...A simplified version of the quantum teleportation protocol is presented in here. Its experimental confirmation will have deep implications for a better understanding of Quantum Entanglement with a particular projection on Quantum Communications.展开更多
We present an implementation of the positive operator valued measure (POVM). By using this POVM, one can realize the probabilistic teleportation of an unknown two-particle state.
We analyze the development of quantum cryptography communication,including analyze the problems lie in the existent literatures and give the resolve methods according to these problems.Then discuss the quantum cryptog...We analyze the development of quantum cryptography communication,including analyze the problems lie in the existent literatures and give the resolve methods according to these problems.Then discuss the quantum cryptography communication for wireless networks and also point out the shortcoming of current research and the future of quantum wireless networks.展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos 10447106, 10435020, 10254002, A0325401 and 10374010, and Beijing Education Committee under Grant No XK100270454.
文摘An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.
基金Supported by the Hebei Natural Science Foundation of China under Grant Nos A2004000141 and A2005000140, and the Natural Science Foundation of Hebei Normal University.
文摘We propose a scheme for probabilistic teleportation of an unknown two-particle state with a four-particle pure entangled state and positive operator valued measure (POVM). In this scheme the teleportation of an unknown two-particle state can be realized with certain probability by performing two Bell state measurements, a proper POVM and a unitary transformation.
基金Supported by the National Natural Science Foundation of China (Grant No. 10671054)the Key Project of Science and Technology Research of Education Ministry of China (Grant No. 207011)the Natural Science Foundation of Hebei Province, China (Grant Nos. 07M006 and F2009000311)
文摘A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to encode classical information in the quantum secret sharing process.In this scheme,each of all m members in group 1 chooses randomly his/her own secret key individually and independently,and directly encodes his/her respective secret information on the states of single photons via unitary operations,then the last one sends 1/n of the resulting qubits to each member of group 2.By measuring their respective qubits,all members in group 2 share the secret information shared by all members in group 1.It renders impossible a Trojan horse attack with a multi-photon signal,a fake-signal attack with EPR pairs,an attack with single photons,and an attack with invisible photons.We give the upper bounds on the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 11064016 and 61068001)
文摘We propose a novel deterministic protocol that two senders are capable of remotely preparing arbitrary two-and three-qubit states for a remote receiver using EPR pairs and GHZ state as the quantum channel.Compared with the existing deterministic protocols [An et al.2011 Phys.Lett.A 375 3570 and Chen et al.2012 J.Phys.A:Math.Theor.45 055303],the quantum resources and classical information in our scheme are decreased,and the whole operation process is simplified.
基金Supported by the Key Programme of the National Natural Science Foundation of China under Grant No 10534030.
文摘An efficient quantum secure direct communication protocol with one-sender versus N-receiver is proposed. The secret bits can be encoded in the N + 1-particle GHZ states and can be decoded by the N receivers with a classical information of the sender plus their own measurement outcomes. Any attacks can be detected by comparing measurement results on the detecting states.
文摘A simplified version of the quantum teleportation protocol is presented in here. Its experimental confirmation will have deep implications for a better understanding of Quantum Entanglement with a particular projection on Quantum Communications.
基金Supported by theNational Natural Science Foundation of China under Grant No 10671054, and the Hebei Natural Science Foundation of China under Grant No A2005000140.
文摘We present an implementation of the positive operator valued measure (POVM). By using this POVM, one can realize the probabilistic teleportation of an unknown two-particle state.
基金supported by the National High Technology Research and Development Program of China(863 Program)(No. 2006AA01Z208)Nataral Sci-ence Foundation of Jiangsu Province(No. BK2007236)Six Projects Sponsoring Talent Summits of Jiangsu Province(No. SJ207001)
文摘We analyze the development of quantum cryptography communication,including analyze the problems lie in the existent literatures and give the resolve methods according to these problems.Then discuss the quantum cryptography communication for wireless networks and also point out the shortcoming of current research and the future of quantum wireless networks.