Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Auth...Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.展开更多
A scheme for teleporting an arbitrary and unknown three-particle state from a sender to either one of two receivers is proposed. The quantum channel is composed of a two-particle non-maximally entangled state and two ...A scheme for teleporting an arbitrary and unknown three-particle state from a sender to either one of two receivers is proposed. The quantum channel is composed of a two-particle non-maximally entangled state and two three-particle non-maximally entangled W states. An arbitrary three-particle state can be perfectly teleported probabilistically if the sender performs three generalized Bell-state measurements and sends to the two receivers the classical result of these measurements, and either one of the two receivers adopts an appropriate unitary transformation conditioned on the suitable measurement outcomes of the other receiver. All kinds of unitary transformations are given in detail.展开更多
基金supported by Science and Technology Support Project of Sichuan Province of China (2013GZX0137)Fund for Young Persons Project of Sichuan Province of China (12ZB017)+2 种基金the National Natural Science Foundation of China (61100205)Project of the Fundamental Research Funds for the Central Universities of China (2013RC0307)the Cryptography Basic Development of the National ‘12th Five-Year-Plan’ of China on Cryptographic Theory (MMJJ201301004)
文摘Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.
文摘A scheme for teleporting an arbitrary and unknown three-particle state from a sender to either one of two receivers is proposed. The quantum channel is composed of a two-particle non-maximally entangled state and two three-particle non-maximally entangled W states. An arbitrary three-particle state can be perfectly teleported probabilistically if the sender performs three generalized Bell-state measurements and sends to the two receivers the classical result of these measurements, and either one of the two receivers adopts an appropriate unitary transformation conditioned on the suitable measurement outcomes of the other receiver. All kinds of unitary transformations are given in detail.