I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state m...I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th^ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack.展开更多
Novel schemes are put forward to execute the joint remote preparation of an arbitrary two-qubit state with a pas- sive receiver via EPR pairs as the entangled channel. Compared with the previous protocols, the require...Novel schemes are put forward to execute the joint remote preparation of an arbitrary two-qubit state with a pas- sive receiver via EPR pairs as the entangled channel. Compared with the previous protocols, the required multi-particle measurement is simplified and the classical communication cost is reduced. When the number of senders increases, the advantage is more evident. It means that the proposed schemes are more efficient in practice.展开更多
Quantum key distribution (QKD) is used in quantum cryptographic systems to exchange secret key between parties who need to communicate secretly. According to the structure of European Secoqc QKD network, a QKD proto...Quantum key distribution (QKD) is used in quantum cryptographic systems to exchange secret key between parties who need to communicate secretly. According to the structure of European Secoqc QKD network, a QKD protocol is proposed. Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to exchange message bits in two remote places. Based on this idea, n + 1 EPR pairs are used as logical quan- tum channel (for n nodes per routing), while measurements of Bell operator are transmitted by classical channel. Random space quantum channel selection is exploited in our protocol to improve the probability of revealing Eve. Compared with traditional EPR protocol, the proposed protocol exhibits many features, which are minutely described.展开更多
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol c...Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.展开更多
An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice,...An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.展开更多
We propose a scheme for probabilistic teleportation of an unknown two-particle state with a four-particle pure entangled state and positive operator valued measure (POVM). In this scheme the teleportation of an unkn...We propose a scheme for probabilistic teleportation of an unknown two-particle state with a four-particle pure entangled state and positive operator valued measure (POVM). In this scheme the teleportation of an unknown two-particle state can be realized with certain probability by performing two Bell state measurements, a proper POVM and a unitary transformation.展开更多
An efficient quantum secure direct communication protocol with one-sender versus N-receiver is proposed. The secret bits can be encoded in the N + 1-particle GHZ states and can be decoded by the N receivers with a cl...An efficient quantum secure direct communication protocol with one-sender versus N-receiver is proposed. The secret bits can be encoded in the N + 1-particle GHZ states and can be decoded by the N receivers with a classical information of the sender plus their own measurement outcomes. Any attacks can be detected by comparing measurement results on the detecting states.展开更多
Two avowable quantum communication schemes are proposed.One is an avowable teleportation protocolbased on the quantum cryptography.In this protocol one teleports a set of one-particle states based on the availabilityo...Two avowable quantum communication schemes are proposed.One is an avowable teleportation protocolbased on the quantum cryptography.In this protocol one teleports a set of one-particle states based on the availabilityof an honest arbitrator,the keys and the Einstein-Podolsky-Rosen pairs shared by the communication parties and thearbitrator.The key point is that the fact of the teleportation can neither be disavowed by the sender nor be denied bythe receiver.Another is an avowable quantum secure direct communication scheme.A one-way Hash function chosenby the communication parties helps the receiver to validate the truth of the information and to avoid disavowing for thesender.展开更多
We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the...We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient.展开更多
We propose a novel deterministic protocol that two senders are capable of remotely preparing arbitrary two-and three-qubit states for a remote receiver using EPR pairs and GHZ state as the quantum channel.Compared wit...We propose a novel deterministic protocol that two senders are capable of remotely preparing arbitrary two-and three-qubit states for a remote receiver using EPR pairs and GHZ state as the quantum channel.Compared with the existing deterministic protocols [An et al.2011 Phys.Lett.A 375 3570 and Chen et al.2012 J.Phys.A:Math.Theor.45 055303],the quantum resources and classical information in our scheme are decreased,and the whole operation process is simplified.展开更多
We present an implementation of the positive operator valued measure (POVM). By using this POVM, one can realize the probabilistic teleportation of an unknown two-particle state.
We present a theoretical scheme for perfect teleportation of an unknown multipartite two-level state by a single EPR (Einstein-Podolsky-Rosen) pair, and then generalize it to multilevel, i.e., an N-quNit state can b...We present a theoretical scheme for perfect teleportation of an unknown multipartite two-level state by a single EPR (Einstein-Podolsky-Rosen) pair, and then generalize it to multilevel, i.e., an N-quNit state can be teleported by a single quNit entangled pair, with additional local unitary operations. The feature of the scheme is that teleporting a multipartite state with a reduced amount of entanglement costs less classical bits.展开更多
In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping ...In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping of maximally d-dimensional EPR pair. In our scheme, Yang's qutrit controlled teleportation protocol [Commun. Theor. Phys. 49 (2008) 338] based on Bell-state entanglement swapping is generalized to the qudit case. The scheme of multi-qudit owns the advantage of having higher code capacity and better security than that of multi-qutrit.展开更多
Abstract A simple scheme for teleporting an unknown M-qubit cat-like state is proposed. The steps of this scheme can be summarized simply: disentangle-teleport-reconstruct entanglement. If proper unitary operations a...Abstract A simple scheme for teleporting an unknown M-qubit cat-like state is proposed. The steps of this scheme can be summarized simply: disentangle-teleport-reconstruct entanglement. If proper unitary operations and measurements from senders are given, the teleportation of an unknown M-qubit cat-like state can be converted into single qubit teleportation. In the meantime, the receiver should also carry out right unitary operations with the introduction of appropriate ancillary qubits to confirm the successful teleportation of the demanded entangled state. The present scheme can be generalized to teleport an unknown M-quNit state, i.e., an M-quNit state can be teleported by a single quNit entangled pair.展开更多
Using two Einstein-Podolsky Rosen pair eigenstates |η) as quantum channels, we study the teleportationof two-mode quantum state of continuous variables.
We propose a scheme for controlled entanglement swapping of continuous variable, where an EPR pair shared by two parties (Alice and Debbie) and a GHZ entangled state shared by three parties (Alice, Bob and Claire)...We propose a scheme for controlled entanglement swapping of continuous variable, where an EPR pair shared by two parties (Alice and Debbie) and a GHZ entangled state shared by three parties (Alice, Bob and Claire) are required. One optical beams of the EPR state will be entangled with the output mode displaced by Bob with the help of Claire. It is shown that the entanglement swapping can occur controlled by the third party (Claire)展开更多
A state-dependent proof of Bell's theorem without inequalities using the product state of any two maximally entangled states (Bell states) of two qubits for two observers in an ideal condition, each of which posse...A state-dependent proof of Bell's theorem without inequalities using the product state of any two maximally entangled states (Bell states) of two qubits for two observers in an ideal condition, each of which possesses two qubits,is proposed. It is different from the other proofs in which there exists a fundamental requirement that certain specific suitable Bell states have been chosen. Moreover, in any non-ideal situation, a common Bell inequality independent of the choices of the 16-product states is derived, which is used to test the contradiction between quantum mechanics and local reality theory in the reach of current experimental technology.展开更多
In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky-Rosen (EPR) pairs is investigated. A new approach for calculating the secret information ra...In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky-Rosen (EPR) pairs is investigated. A new approach for calculating the secret information rate △I is proposed by using the Shannon information theory. Employing an available parameter F which is associated with the entanglement of the EPR pairs, one can detect easily the eavesdropping. Results show that the proposed scheme is secure against individual bearn splitter attack strategy with a proper squeeze parameter.展开更多
A two-step quantum secure direct dialogue protocol using Einstein-Podolsky-Rosen(EPR)pair block is proposed.In the protocol,the dialogue messages are encoded on series of qubits and sent through a quantum channel dire...A two-step quantum secure direct dialogue protocol using Einstein-Podolsky-Rosen(EPR)pair block is proposed.In the protocol,the dialogue messages are encoded on series of qubits and sent through a quantum channel directly.The security of the protocol is assured by its connection to the two-step quantum secure direct communication protocol,which has been proved secure.This protocol has several advantages.It is a direct communication protocol that does not require a separate classical communication for the ciphertext.It has high capacity as two bits of secret messages can be transmitted by an EPR pair.As a dialogue protocol,the two parties can speak to each other either simultaneously or sequentially.展开更多
基金Supported by the 211 Project of Anhui University under Grant No.2009QN028B
文摘I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th^ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack.
基金supported by the National Natural Science Foundation of China(Grant Nos.61201253,61303039,61572246,and 61502147)the Fundamental Research Fund for the Central Universities of China(Grant No.2682014CX095)
文摘Novel schemes are put forward to execute the joint remote preparation of an arbitrary two-qubit state with a pas- sive receiver via EPR pairs as the entangled channel. Compared with the previous protocols, the required multi-particle measurement is simplified and the classical communication cost is reduced. When the number of senders increases, the advantage is more evident. It means that the proposed schemes are more efficient in practice.
文摘Quantum key distribution (QKD) is used in quantum cryptographic systems to exchange secret key between parties who need to communicate secretly. According to the structure of European Secoqc QKD network, a QKD protocol is proposed. Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to exchange message bits in two remote places. Based on this idea, n + 1 EPR pairs are used as logical quan- tum channel (for n nodes per routing), while measurements of Bell operator are transmitted by classical channel. Random space quantum channel selection is exploited in our protocol to improve the probability of revealing Eve. Compared with traditional EPR protocol, the proposed protocol exhibits many features, which are minutely described.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61103235,61170321,and 61373131the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)+1 种基金the Natural Science Foundation of Jiangsu Province,China(BK2010570)State Key Laboratory of Software Engineering,Wuhan University(SKLSE2012-09-41)
文摘Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.
基金Supported by the National Natural Science Foundation of China under Grant Nos 10447106, 10435020, 10254002, A0325401 and 10374010, and Beijing Education Committee under Grant No XK100270454.
文摘An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.
基金Supported by the Hebei Natural Science Foundation of China under Grant Nos A2004000141 and A2005000140, and the Natural Science Foundation of Hebei Normal University.
文摘We propose a scheme for probabilistic teleportation of an unknown two-particle state with a four-particle pure entangled state and positive operator valued measure (POVM). In this scheme the teleportation of an unknown two-particle state can be realized with certain probability by performing two Bell state measurements, a proper POVM and a unitary transformation.
基金Supported by the Key Programme of the National Natural Science Foundation of China under Grant No 10534030.
文摘An efficient quantum secure direct communication protocol with one-sender versus N-receiver is proposed. The secret bits can be encoded in the N + 1-particle GHZ states and can be decoded by the N receivers with a classical information of the sender plus their own measurement outcomes. Any attacks can be detected by comparing measurement results on the detecting states.
基金supported by National Natural Science Foundation of China under Grant No.10671054Natural Science Foundation of Hebei Province of China under Grant No.07M006the Key Project of Science and Technology Research of the Ministry of Education under Grant No.207011
文摘Two avowable quantum communication schemes are proposed.One is an avowable teleportation protocolbased on the quantum cryptography.In this protocol one teleports a set of one-particle states based on the availabilityof an honest arbitrator,the keys and the Einstein-Podolsky-Rosen pairs shared by the communication parties and thearbitrator.The key point is that the fact of the teleportation can neither be disavowed by the sender nor be denied bythe receiver.Another is an avowable quantum secure direct communication scheme.A one-way Hash function chosenby the communication parties helps the receiver to validate the truth of the information and to avoid disavowing for thesender.
基金supported by National Natural Science Foundation of China under Crant No.10575017
文摘We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 11064016 and 61068001)
文摘We propose a novel deterministic protocol that two senders are capable of remotely preparing arbitrary two-and three-qubit states for a remote receiver using EPR pairs and GHZ state as the quantum channel.Compared with the existing deterministic protocols [An et al.2011 Phys.Lett.A 375 3570 and Chen et al.2012 J.Phys.A:Math.Theor.45 055303],the quantum resources and classical information in our scheme are decreased,and the whole operation process is simplified.
基金Supported by theNational Natural Science Foundation of China under Grant No 10671054, and the Hebei Natural Science Foundation of China under Grant No A2005000140.
文摘We present an implementation of the positive operator valued measure (POVM). By using this POVM, one can realize the probabilistic teleportation of an unknown two-particle state.
基金The project supported by the Fund from Hunan University of Science and Engineering
文摘We present a theoretical scheme for perfect teleportation of an unknown multipartite two-level state by a single EPR (Einstein-Podolsky-Rosen) pair, and then generalize it to multilevel, i.e., an N-quNit state can be teleported by a single quNit entangled pair, with additional local unitary operations. The feature of the scheme is that teleporting a multipartite state with a reduced amount of entanglement costs less classical bits.
基金supported by Tianjin Natural Science Fund under Grant No.06YFJMJC00800
文摘In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping of maximally d-dimensional EPR pair. In our scheme, Yang's qutrit controlled teleportation protocol [Commun. Theor. Phys. 49 (2008) 338] based on Bell-state entanglement swapping is generalized to the qudit case. The scheme of multi-qudit owns the advantage of having higher code capacity and better security than that of multi-qutrit.
基金supported by National Natural Science Foundation of China under Grant No.10574060
文摘Abstract A simple scheme for teleporting an unknown M-qubit cat-like state is proposed. The steps of this scheme can be summarized simply: disentangle-teleport-reconstruct entanglement. If proper unitary operations and measurements from senders are given, the teleportation of an unknown M-qubit cat-like state can be converted into single qubit teleportation. In the meantime, the receiver should also carry out right unitary operations with the introduction of appropriate ancillary qubits to confirm the successful teleportation of the demanded entangled state. The present scheme can be generalized to teleport an unknown M-quNit state, i.e., an M-quNit state can be teleported by a single quNit entangled pair.
基金The project supported by Natural Science Foundation of Zhejiang Province of ChinaOpen Foundation of Lahoratory of HighIntensity Optics,Shanghai Institute of Optics and Fine Mechanics
文摘Using two Einstein-Podolsky Rosen pair eigenstates |η) as quantum channels, we study the teleportationof two-mode quantum state of continuous variables.
基金The project supported by National Natural Science Foundation of China(NSFC)under Grant Nos.60678022 and 10704001the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20060357008+2 种基金Natural Science Foundation of Anhui Province under Grant No.070412060the Key Program of the Education Department of Anhui Province under Grant No.2006KJ070Athe Talent Foundation of Anhui University,and Anhui Key Laboratory of Information Materials and Devices(Anhui University)
文摘We propose a scheme for controlled entanglement swapping of continuous variable, where an EPR pair shared by two parties (Alice and Debbie) and a GHZ entangled state shared by three parties (Alice, Bob and Claire) are required. One optical beams of the EPR state will be entangled with the output mode displaced by Bob with the help of Claire. It is shown that the entanglement swapping can occur controlled by the third party (Claire)
文摘A state-dependent proof of Bell's theorem without inequalities using the product state of any two maximally entangled states (Bell states) of two qubits for two observers in an ideal condition, each of which possesses two qubits,is proposed. It is different from the other proofs in which there exists a fundamental requirement that certain specific suitable Bell states have been chosen. Moreover, in any non-ideal situation, a common Bell inequality independent of the choices of the 16-product states is derived, which is used to test the contradiction between quantum mechanics and local reality theory in the reach of current experimental technology.
基金Project supported by the National Natural Science Foundation of China (Grant No 60472018).
文摘In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky-Rosen (EPR) pairs is investigated. A new approach for calculating the secret information rate △I is proposed by using the Shannon information theory. Employing an available parameter F which is associated with the entanglement of the EPR pairs, one can detect easily the eavesdropping. Results show that the proposed scheme is secure against individual bearn splitter attack strategy with a proper squeeze parameter.
基金supported by the National Natural Science Foundation of China(Grant Nos.10874098 and 11175094)the National Basic Research Program of China(Grant Nos.2009CB929402 and 2011CB9216-002)
文摘A two-step quantum secure direct dialogue protocol using Einstein-Podolsky-Rosen(EPR)pair block is proposed.In the protocol,the dialogue messages are encoded on series of qubits and sent through a quantum channel directly.The security of the protocol is assured by its connection to the two-step quantum secure direct communication protocol,which has been proved secure.This protocol has several advantages.It is a direct communication protocol that does not require a separate classical communication for the ciphertext.It has high capacity as two bits of secret messages can be transmitted by an EPR pair.As a dialogue protocol,the two parties can speak to each other either simultaneously or sequentially.