We aim to explore all possible scenarios of(1→2)(where one wing is untrusted and the others two wings are trusted)and(2→1)(where two wings are untrusted,and one wing is trusted)genuine tripartite Einstein-Podolsky-R...We aim to explore all possible scenarios of(1→2)(where one wing is untrusted and the others two wings are trusted)and(2→1)(where two wings are untrusted,and one wing is trusted)genuine tripartite Einstein-Podolsky-Rosen(EPR)steering.The generalized Greenberger-Horne-Zeilinger(GHZ)state is shared between three spatially separated parties,Alice,Bob and Charlie.In both(1→2)and(2→1),we discuss the untrusted party and trusted party performing a sequence of unsharp measurements,respectively.For each scenario,we deduce an upper bound on the number of sequential observers who can demonstrate genuine EPR steering through the quantum violation of tripartite steering inequality.The results show that the maximum number of observers for the generalized GHZ states can be the same with that of the maximally GHZ state in a certain range of state parameters.Moreover,both the sharpness parameters range and the state parameters range in the scenario of(1→2)steering are larger than those in the scenario of(2→1)steering.展开更多
Using the generalized Bell states and quantum gates, we introduce a quantum encryption scheme of d-level states (qudits). The scheme can detect and correct arbitrary transmission errors using only local operations a...Using the generalized Bell states and quantum gates, we introduce a quantum encryption scheme of d-level states (qudits). The scheme can detect and correct arbitrary transmission errors using only local operations and classical communications between the communicators. In addition, the entanglement key used to encrypt can be recycled. The protocol is informationally secure, because the output state is a totally mixed one for every input state p.展开更多
The security of the quantum secure direct communication(QSDC)and authentication protocol based on Bell states is analyzed.It is shown that an eavesdropper can invalidate the authentication function,and implement a suc...The security of the quantum secure direct communication(QSDC)and authentication protocol based on Bell states is analyzed.It is shown that an eavesdropper can invalidate the authentication function,and implement a successful man-in-the-middle attack,where he/she can obtain or even modify the transmitted secret without introducing any error.The particular attack strategy is demonstrated and an improved protocol is presented.展开更多
Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(...Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(2018)].They realized the self-testing of preparations and measurements in an N → 1(N ≥ 2) random access code(RAC), and provided robustness bounds in a 2 → 1 RAC.Since all N → 1 RACs with shared randomness are combinations of 2 → 1 and 3 → 1 RACs, the3 → 1 RAC is just as important as the 2 → 1 RAC.In this paper, we find a set of preparations and measurements in the3 → 1 RAC, and use them to complete the robustness self-testing analysis in the prepare-and-measure scenario.The method is robust to small but inevitable experimental errors.展开更多
The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this pape...The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this paper, we provide a general description of discriminating quantum operations. Concretely speaking, we describe the distinguisha- bility between quantum operations using a measure called operator fidelity. It is shown that, employing the theory of operator fidelity, we can not only verify some previous results to discriminate unitary operations, but also exhibit a more general discrimination condition. We further apply our results to analysing the security of some quantum cryptographic protocols and discuss the realization of our method using well-developed quantum algorithms.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62171056 and 61973021)Henan Key Laboratory of Network Cryptography Technology(Grant No.LNCT2022-A03)。
文摘We aim to explore all possible scenarios of(1→2)(where one wing is untrusted and the others two wings are trusted)and(2→1)(where two wings are untrusted,and one wing is trusted)genuine tripartite Einstein-Podolsky-Rosen(EPR)steering.The generalized Greenberger-Horne-Zeilinger(GHZ)state is shared between three spatially separated parties,Alice,Bob and Charlie.In both(1→2)and(2→1),we discuss the untrusted party and trusted party performing a sequence of unsharp measurements,respectively.For each scenario,we deduce an upper bound on the number of sequential observers who can demonstrate genuine EPR steering through the quantum violation of tripartite steering inequality.The results show that the maximum number of observers for the generalized GHZ states can be the same with that of the maximally GHZ state in a certain range of state parameters.Moreover,both the sharpness parameters range and the state parameters range in the scenario of(1→2)steering are larger than those in the scenario of(2→1)steering.
基金Supported by the National Natural Science Foundation of China under Grant Nos 60873191, 60903152 and 60821001, the Specialized Research Fund for the Doctoral Program of Higher Education (SRFDP) under Grant No 200800131016, Beijing Nova Program (No 2008B51), Key Project of the Ministry of Education of China (No 109014), Beijing Natural Science Foundation under Grant No 4072020, National Laboratory for Modern Communications Science Foundation of China under Grant No 9140C1101010601
基金Project supported by the National Natural Science Foundation of China (Grant No 60373059), the Special Research Fund for the Doctoral Program of Higher Education of China (Grant No 20040013007), the Major Research plan of the National Natural Science Foundation of China(Grant No 90604023), the National Laboratory for Modern Communications Science Foundation of China, the National Key Laboratory on Theory and Chief Technology of Integrated Services Networks (ISN) 0pen Foundation, and the Graduate Students Innovation Foundation of Beijing University of Posts and Telecommunications.
文摘Using the generalized Bell states and quantum gates, we introduce a quantum encryption scheme of d-level states (qudits). The scheme can detect and correct arbitrary transmission errors using only local operations and classical communications between the communicators. In addition, the entanglement key used to encrypt can be recycled. The protocol is informationally secure, because the output state is a totally mixed one for every input state p.
基金Supported by the National High Technology Research and Development Programme of China under Grant No 2006AA01Z4191 the Major Research Plan of the National Natural Science Foundation of China under Grant No 90604023, the National Laboratory for Modern Communications Science Foundation of China under Grant No 9140C1101010601, the Natural Science Foundation of Beijing under Grant No 4072020, and the Open Foundation of State Key Laboratory of Integrated Services Network, Xidian University.
基金Supported by the National Natural Science Foundation of China under Grant Nos 60873191,60903152 and 60821001the Specialized Research Fund for the Doctoral Program of Higher Education(SRFDP)under Grant No under Grant Nos 200800131016 and 20090005110010+1 种基金Beijing Nova Program under Grant No 2008B51,Key Project of the Ministry of Education of China under Grant No 109014Beijing Natural Science Foundation under Grant No 4072020.
文摘The security of the quantum secure direct communication(QSDC)and authentication protocol based on Bell states is analyzed.It is shown that an eavesdropper can invalidate the authentication function,and implement a successful man-in-the-middle attack,where he/she can obtain or even modify the transmitted secret without introducing any error.The particular attack strategy is demonstrated and an improved protocol is presented.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61572081,61672110,and 61671082)
文摘Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(2018)].They realized the self-testing of preparations and measurements in an N → 1(N ≥ 2) random access code(RAC), and provided robustness bounds in a 2 → 1 RAC.Since all N → 1 RACs with shared randomness are combinations of 2 → 1 and 3 → 1 RACs, the3 → 1 RAC is just as important as the 2 → 1 RAC.In this paper, we find a set of preparations and measurements in the3 → 1 RAC, and use them to complete the robustness self-testing analysis in the prepare-and-measure scenario.The method is robust to small but inevitable experimental errors.
基金supported by the National Natural Science Foundation of China (Grant Nos. 60873191, 60903152, 61003286, 60821001, and61070251)the Program for New Century Excellent Talents in University (Grant No. NCET-10-0260)+4 种基金the Specialized Research Fund for the Doctoral Program of Higher Education (Grant Nos. 200800131016 and 20090005110010)the Beijing Nova Program (Grant No. 2008B51)the Key Project of the Chinese Ministry of Education (Grant No. 109014)the Beijing Natural Science Foundation (Grant No. 4112040)the Fundamental Research Funds for the Central Universities (GrantNos. BUPT2011YB01 and BUPT2011RC0505)
文摘The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this paper, we provide a general description of discriminating quantum operations. Concretely speaking, we describe the distinguisha- bility between quantum operations using a measure called operator fidelity. It is shown that, employing the theory of operator fidelity, we can not only verify some previous results to discriminate unitary operations, but also exhibit a more general discrimination condition. We further apply our results to analysing the security of some quantum cryptographic protocols and discuss the realization of our method using well-developed quantum algorithms.