期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Coding and Automatic Error-Correction Circuit Based on the Five-Particle Entangled State 被引量:4
1
作者 Xi Chen Pei Zhang Xiaoqing Zhou 《ZTE Communications》 2013年第3期41-45,共5页
In this paper, we discuss the concepts of quantum coding and error correction for a five-particle entangled state. Error correction can correct bit-reverse or phase-flip errors of one and two quantum states and is no ... In this paper, we discuss the concepts of quantum coding and error correction for a five-particle entangled state. Error correction can correct bit-reverse or phase-flip errors of one and two quantum states and is no longer limited to only one quantum state. We encode a single quantum state into a five-particle entangled state before being transferred to the sender. We designed an automatic error-correction circuit to correct errors caused by noise. We also simplify the design process for a multiple quantum error-correction circuit. We compare error-correction schemes for five and three entangled particles in terms of efficiency and capabilities. The results show that error-correction efficiency and fidelity are im- proved. 展开更多
关键词 quantum communication channel coding five-particle entangled state FIDELITY
下载PDF
A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation 被引量:5
2
作者 李剑 宋丹劼 +1 位作者 郭晓静 景博 《Chinese Physics C》 SCIE CAS CSCD 2012年第1期31-36,共6页
In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eav... In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eavesdroppers,and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol.In the security analysis,the entropy theory method is introduced,and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced.If the eavesdroppers intend to obtain all the information,the detection rate of the original ping-pong protocol is 50%;the second protocol,using two particles of the Einstein-Podolsky-Rosen pair as detection particles,is also 50%;while the presented protocol is 89%.Finally,the security of the proposed protocol is discussed,and the analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 QSDC XOR operation five-particle cluster state eavesdropping detection protocol security
原文传递
Quantum Private Comparison of Equality Based on Five-Particle Cluster State
3
作者 Yan Chang Wen-Do Zhang +7 位作者 Shi-Bin Zhang Hai-Chun Wang Li-Li Yan Gui-Hua Han Zhi-Wei Sheng Yuan-Yuan Huang Wang Suo Jin-Xin Xiong 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第12期621-628,共8页
A protocol for quantum private comparison of equality(QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party(TP). In our protocol, TP is allowed to misbehave on its own but c... A protocol for quantum private comparison of equality(QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party(TP). In our protocol, TP is allowed to misbehave on its own but can not conspire with either of two parties. Compared with most two-user QPCE protocols, our protocol not only can compare two groups of private information(each group has two users) in one execution, but also compare just two private information. Compared with the multi-user QPCE protocol proposed, our protocol is safer with more reasonable assumptions of TP. The qubit efficiency is computed and analyzed. Our protocol can also be generalized to the case of 2N participants with one TP. The 2N-participant protocol can compare two groups(each group has N private information)in one execution or just N private information. 展开更多
关键词 quantum private comparison of equality five-particle cluster state semi-honest third party
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部