Quantum teleportation is of significant meaning in quantum information. In this paper, we study the probabilistic teleportation of a two-qubit entangled state via a partially entangled Greenberger- Horne-Zeilinger (...Quantum teleportation is of significant meaning in quantum information. In this paper, we study the probabilistic teleportation of a two-qubit entangled state via a partially entangled Greenberger- Horne-Zeilinger (GHZ) state when the quantum channel information is only available to the sender. We formulate it as an unambiguous state discrimination problem and derive exact optimal positive-operator valued measure (POVM) operators for maximizing the probability of unambiguous discrimination. Only one three-qubit POVM for the sender, one two-qubit unitary operation for the receiver, and two chits for outcome notification are required in this scheme. The unitary operation is given in the form of a concise formula, and the fidelity is calculated. The scheme is further extended to more general case for transmitting a two-qubit entangled state prepared in arbitrary form. We show this scheme is flexible and applicable in the hop-by-hop teleportation situation.展开更多
The Bell nonlocality is closely related to the foundations of quantum physics and has significant applications to security questions in quantum key distributions.In recent years,the sharing ability of the Bell nonloca...The Bell nonlocality is closely related to the foundations of quantum physics and has significant applications to security questions in quantum key distributions.In recent years,the sharing ability of the Bell nonlocality has been extensively studied.The nonlocality of quantum network states is more complex.We first discuss the sharing ability of the simplest bilocality under unilateral or bilateral POVM measurements,and show that the nonlocality sharing ability of network quantum states under unilateral measurements is similar to the Bell nonlocality sharing ability,but different under bilateral measurements.For the star network scenarios,we present for the first time comprehensive results on the nonlocality sharing properties of quantum network states,for which the quantum nonlocality of the network quantum states has a stronger sharing ability than the Bell nonlocality.展开更多
We give a strategy for nonlocal unambiguous discrimination (UD) among N linearly independent nonorthogonal qudit states lying in a higher-dimensional Hilbert space. The procedure we use is a nonlocal positive operator...We give a strategy for nonlocal unambiguous discrimination (UD) among N linearly independent nonorthogonal qudit states lying in a higher-dimensional Hilbert space. The procedure we use is a nonlocal positive operator valued measurement (POVM) in a direct sum space. This scheme is designed for obtaining the conclusive nonlocal measurement results with a finite probability of success. We construct a quantum network for realizing the nonlocal UD with a set of two-level remote rotations, and thus provide a feasible physical means to realize the nonlocal UD.展开更多
A conclusive teleportation protocol of a d-dimensional two-particle unknown quantum state using three d- dimensional particles in an arbitrary pure state is proposed. A sender teleports the unknown state conclusively ...A conclusive teleportation protocol of a d-dimensional two-particle unknown quantum state using three d- dimensional particles in an arbitrary pure state is proposed. A sender teleports the unknown state conclusively to a receiver by using the positive operator valued measure(POVM) and introducing an ancillary qudit to perform the generalized Bell basis measurement, We calculate the optimal teleportation fidelity. We also discuss and analyse the reason why the information on the teleported state is lost in the course of the protocol,展开更多
A scheme for teleporting an unknown two-particle entangled state is proposed. In comparison with the recent protocol (Cola et al., Phys. Lett. A 337 (2005)), the entangled state as quantum channel required by this...A scheme for teleporting an unknown two-particle entangled state is proposed. In comparison with the recent protocol (Cola et al., Phys. Lett. A 337 (2005)), the entangled state as quantum channel required by this scheme is a single, partially entangled pair, which is much easier to prepare and maintain. Furthermore, a positive operator valued measure (POVM) is adopted and all kinds of transformations performed by sender and receiver are given in detail. It is shown that the probability of successful teleportation is twice the modulus square of the smaller Schmidt coefficient of the two-particle entangled state, and the fidelity can reach one.展开更多
Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit stat...Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit state. In this scheme, the sender transmits the two-qubit secret state to three agents who are divided into two grades with two Bell-state measurements,and broadcasts the measurement results via a classical channel. One agent is in the upper grade and two agents are in the lower grade. The agent in the upper grade only needs to cooperate with one of the other two agents to recover the secret state but both of the agents in the lower grade need help from all of the agents. Every agent who wants to recover the secret state needs to introduce two ancillary qubits and performs a positive operator-valued measurement(POVM) instead of the usual projective measurement. Moreover, due to the symmetry of the cluster state, we extend this protocol to multiparty agents.展开更多
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important rol...Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.展开更多
基金This work was supported by the National Natural Science Foundation of China (Grant No. 61601120) China Postdoctoral Science Foundation (Grant No. 2016M591742) and Jiangsu Planned Projects for Postdoctoral Research Funds (Grant No. 1601166C).
文摘Quantum teleportation is of significant meaning in quantum information. In this paper, we study the probabilistic teleportation of a two-qubit entangled state via a partially entangled Greenberger- Horne-Zeilinger (GHZ) state when the quantum channel information is only available to the sender. We formulate it as an unambiguous state discrimination problem and derive exact optimal positive-operator valued measure (POVM) operators for maximizing the probability of unambiguous discrimination. Only one three-qubit POVM for the sender, one two-qubit unitary operation for the receiver, and two chits for outcome notification are required in this scheme. The unitary operation is given in the form of a concise formula, and the fidelity is calculated. The scheme is further extended to more general case for transmitting a two-qubit entangled state prepared in arbitrary form. We show this scheme is flexible and applicable in the hop-by-hop teleportation situation.
基金supported by the National Natural Science Foundation of China(NSFC)under Grant Nos.12126314,12126351,11861031,12075159,and 12171044the Hainan Provincial Natural Science Foundation of China under Grant No.121RC539+3 种基金the Specific Research Fund of the Innovation Platform for Academicians of Hainan Province under Grant No.YSPTZX202215Beijing Natural Science Foundation(Grant No.Z190005)Academy for Multidisciplinary Studies,Capital Normal UniversityShenzhen Institute for Quantum Science and Engineering,Southern University of Science and Technology(No.SIQSE202001).
文摘The Bell nonlocality is closely related to the foundations of quantum physics and has significant applications to security questions in quantum key distributions.In recent years,the sharing ability of the Bell nonlocality has been extensively studied.The nonlocality of quantum network states is more complex.We first discuss the sharing ability of the simplest bilocality under unilateral or bilateral POVM measurements,and show that the nonlocality sharing ability of network quantum states under unilateral measurements is similar to the Bell nonlocality sharing ability,but different under bilateral measurements.For the star network scenarios,we present for the first time comprehensive results on the nonlocality sharing properties of quantum network states,for which the quantum nonlocality of the network quantum states has a stronger sharing ability than the Bell nonlocality.
基金supported by the Natural Science Foundation of Guangdong Province, China (Grant No. 06029431)
文摘We give a strategy for nonlocal unambiguous discrimination (UD) among N linearly independent nonorthogonal qudit states lying in a higher-dimensional Hilbert space. The procedure we use is a nonlocal positive operator valued measurement (POVM) in a direct sum space. This scheme is designed for obtaining the conclusive nonlocal measurement results with a finite probability of success. We construct a quantum network for realizing the nonlocal UD with a set of two-level remote rotations, and thus provide a feasible physical means to realize the nonlocal UD.
基金Project supported by the National Natural Science Foundation of China (Grant No 60373059), the Major Research Plan of the National Natural Science Foundation of China (Grant No 90604023) and the Doctoral Foundation of the State Education Ministry of China(Grant No 20040013007).
文摘A conclusive teleportation protocol of a d-dimensional two-particle unknown quantum state using three d- dimensional particles in an arbitrary pure state is proposed. A sender teleports the unknown state conclusively to a receiver by using the positive operator valued measure(POVM) and introducing an ancillary qudit to perform the generalized Bell basis measurement, We calculate the optimal teleportation fidelity. We also discuss and analyse the reason why the information on the teleported state is lost in the course of the protocol,
基金National Natural Science Foundation of China (60373059) Major Research plan of the National Natural Science Foundation of China (90604023)+1 种基金 National Laboratory for Modem Communications Science Foundation of China (51436020103DZA001) National Research Foundation for the Doctoral Program of Higher Education of China (20040013007), ISN 0pen Foundation.
文摘A scheme for teleporting an unknown two-particle entangled state is proposed. In comparison with the recent protocol (Cola et al., Phys. Lett. A 337 (2005)), the entangled state as quantum channel required by this scheme is a single, partially entangled pair, which is much easier to prepare and maintain. Furthermore, a positive operator valued measure (POVM) is adopted and all kinds of transformations performed by sender and receiver are given in detail. It is shown that the probability of successful teleportation is twice the modulus square of the smaller Schmidt coefficient of the two-particle entangled state, and the fidelity can reach one.
基金Project supported by the National Natural Science Foundation of China(Grant No.61671087)
文摘Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit state. In this scheme, the sender transmits the two-qubit secret state to three agents who are divided into two grades with two Bell-state measurements,and broadcasts the measurement results via a classical channel. One agent is in the upper grade and two agents are in the lower grade. The agent in the upper grade only needs to cooperate with one of the other two agents to recover the secret state but both of the agents in the lower grade need help from all of the agents. Every agent who wants to recover the secret state needs to introduce two ancillary qubits and performs a positive operator-valued measurement(POVM) instead of the usual projective measurement. Moreover, due to the symmetry of the cluster state, we extend this protocol to multiparty agents.
基金Supported by National Natural Science Foundation of China under Grant Nos.61472446,U1204602National High Technology Research and Development Program of China under Grant No.2011AA010803the Open Project Program of the State Key Laboratory of Mathematical Engineering and Advanced Computing under Grant No.2013A14
文摘Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.