Novel schemes are put forward to execute the joint remote preparation of an arbitrary two-qubit state with a pas- sive receiver via EPR pairs as the entangled channel. Compared with the previous protocols, the require...Novel schemes are put forward to execute the joint remote preparation of an arbitrary two-qubit state with a pas- sive receiver via EPR pairs as the entangled channel. Compared with the previous protocols, the required multi-particle measurement is simplified and the classical communication cost is reduced. When the number of senders increases, the advantage is more evident. It means that the proposed schemes are more efficient in practice.展开更多
Quantum key distribution (QKD) is used in quantum cryptographic systems to exchange secret key between parties who need to communicate secretly. According to the structure of European Secoqc QKD network, a QKD proto...Quantum key distribution (QKD) is used in quantum cryptographic systems to exchange secret key between parties who need to communicate secretly. According to the structure of European Secoqc QKD network, a QKD protocol is proposed. Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to exchange message bits in two remote places. Based on this idea, n + 1 EPR pairs are used as logical quan- tum channel (for n nodes per routing), while measurements of Bell operator are transmitted by classical channel. Random space quantum channel selection is exploited in our protocol to improve the probability of revealing Eve. Compared with traditional EPR protocol, the proposed protocol exhibits many features, which are minutely described.展开更多
We propose a novel deterministic protocol that two senders are capable of remotely preparing arbitrary two-and three-qubit states for a remote receiver using EPR pairs and GHZ state as the quantum channel.Compared wit...We propose a novel deterministic protocol that two senders are capable of remotely preparing arbitrary two-and three-qubit states for a remote receiver using EPR pairs and GHZ state as the quantum channel.Compared with the existing deterministic protocols [An et al.2011 Phys.Lett.A 375 3570 and Chen et al.2012 J.Phys.A:Math.Theor.45 055303],the quantum resources and classical information in our scheme are decreased,and the whole operation process is simplified.展开更多
We present an implementation of the positive operator valued measure (POVM). By using this POVM, one can realize the probabilistic teleportation of an unknown two-particle state.
In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky-Rosen (EPR) pairs is investigated. A new approach for calculating the secret information ra...In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky-Rosen (EPR) pairs is investigated. A new approach for calculating the secret information rate △I is proposed by using the Shannon information theory. Employing an available parameter F which is associated with the entanglement of the EPR pairs, one can detect easily the eavesdropping. Results show that the proposed scheme is secure against individual bearn splitter attack strategy with a proper squeeze parameter.展开更多
基金supported by the National Natural Science Foundation of China(Grant Nos.61201253,61303039,61572246,and 61502147)the Fundamental Research Fund for the Central Universities of China(Grant No.2682014CX095)
文摘Novel schemes are put forward to execute the joint remote preparation of an arbitrary two-qubit state with a pas- sive receiver via EPR pairs as the entangled channel. Compared with the previous protocols, the required multi-particle measurement is simplified and the classical communication cost is reduced. When the number of senders increases, the advantage is more evident. It means that the proposed schemes are more efficient in practice.
文摘Quantum key distribution (QKD) is used in quantum cryptographic systems to exchange secret key between parties who need to communicate secretly. According to the structure of European Secoqc QKD network, a QKD protocol is proposed. Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to exchange message bits in two remote places. Based on this idea, n + 1 EPR pairs are used as logical quan- tum channel (for n nodes per routing), while measurements of Bell operator are transmitted by classical channel. Random space quantum channel selection is exploited in our protocol to improve the probability of revealing Eve. Compared with traditional EPR protocol, the proposed protocol exhibits many features, which are minutely described.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 11064016 and 61068001)
文摘We propose a novel deterministic protocol that two senders are capable of remotely preparing arbitrary two-and three-qubit states for a remote receiver using EPR pairs and GHZ state as the quantum channel.Compared with the existing deterministic protocols [An et al.2011 Phys.Lett.A 375 3570 and Chen et al.2012 J.Phys.A:Math.Theor.45 055303],the quantum resources and classical information in our scheme are decreased,and the whole operation process is simplified.
基金Supported by theNational Natural Science Foundation of China under Grant No 10671054, and the Hebei Natural Science Foundation of China under Grant No A2005000140.
文摘We present an implementation of the positive operator valued measure (POVM). By using this POVM, one can realize the probabilistic teleportation of an unknown two-particle state.
基金Project supported by the National Natural Science Foundation of China (Grant No 60472018).
文摘In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky-Rosen (EPR) pairs is investigated. A new approach for calculating the secret information rate △I is proposed by using the Shannon information theory. Employing an available parameter F which is associated with the entanglement of the EPR pairs, one can detect easily the eavesdropping. Results show that the proposed scheme is secure against individual bearn splitter attack strategy with a proper squeeze parameter.