We recently proposed a flexible quantum secure direct communication protocol [Chin. Phys. Lett. 23 (2006) 3152]. By analyzing its security in the perfect channel from the aspect of quantum information theory, we fin...We recently proposed a flexible quantum secure direct communication protocol [Chin. Phys. Lett. 23 (2006) 3152]. By analyzing its security in the perfect channel from the aspect of quantum information theory, we find that an eavesdropper is capable of stealing all the information without being detected. Two typical attacks are presented to illustrate this point. A solution to this loophole is also suggested and we show its powerfulness against the most general individual attack in the ideal case. We also discuss the security in the imperfect case when there is noise and loss.展开更多
Using the method presented recently [Phys.Rev.A 77(2008)014306; Phys.Lett.A 369(2007)377], the transformation operator (TO) is explicitly given for teleporting an arbitrary three-qubit state with a six-qubit cha...Using the method presented recently [Phys.Rev.A 77(2008)014306; Phys.Lett.A 369(2007)377], the transformation operator (TO) is explicitly given for teleporting an arbitrary three-qubit state with a six-qubit channel and Bell-state measurements. A criterion on whether such quantum teleportation can be perfectly realized is educed in terms of TO. Moreover, six instantiations on TO and criterion are concisely shown.展开更多
We propose a scheme for the probabilistic teleportation of an unknown two-particle state of general formation in ion trap. It is shown that one can realize experimentally this teleportation protocol of two-particle st...We propose a scheme for the probabilistic teleportation of an unknown two-particle state of general formation in ion trap. It is shown that one can realize experimentally this teleportation protocol of two-particle state with presently available techniques.展开更多
Based on superconducting charge qubits (SCCQs) coupled to a single-mode microwave cavity, we propose a scheme for generating charge cluster states. For all SCCQs, the controlled gate voltages are all in their degene...Based on superconducting charge qubits (SCCQs) coupled to a single-mode microwave cavity, we propose a scheme for generating charge cluster states. For all SCCQs, the controlled gate voltages are all in their degeneracy points, the quantum information is encoded in two logic states of charge basis. The generation of the multi-qubit cluster state can be achieved step by step on a pair of nearest-neighbor qubits. Considering effective long-rang coupling, we provide an efficient way to one-step generating of a highly entangled cluster state, in which the qubit-qubit coupling is mediated by the cavity mode. Our quantum operations are insensitive to the initial state of the cavity mode by removing the influence of the cavity mode via the periodical evolution of the system. Thus, our operation may be against the decoherence from the cavity.展开更多
Analytic results of the relationship between local noncommutativity and non-violations of Svetlichny inequalities for three-qubit separable states are obtained. It is shown that the converse trade-off relations presen...Analytic results of the relationship between local noncommutativity and non-violations of Svetlichny inequalities for three-qubit separable states are obtained. It is shown that the converse trade-off relations presented by Seevinck and Uffinck [Phys. Rev. A 2007 76 042105] do not always hold for three-qubit states, and that there exists some correlation even though the state is the simple product state.展开更多
A cloud of laser-cooled ^40Ca^+ is successfully trapped and manipulated under well control in our home-built linear ion trap, which is designed and constructed solely for studying quantum information processing. By e...A cloud of laser-cooled ^40Ca^+ is successfully trapped and manipulated under well control in our home-built linear ion trap, which is designed and constructed solely for studying quantum information processing. By exploring the variation of the ion cloud with respect to the trap parameters, we have optimized the trapping condition and obtained very good fluorescence spectra. We observe the dynamics of the ion cloud, and estimate the temperature of the ion cloud to be of the order of milli-Kelvin.展开更多
Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple c...Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential flaws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks" and to keep all the merits of the original cryptosystem.展开更多
文摘We recently proposed a flexible quantum secure direct communication protocol [Chin. Phys. Lett. 23 (2006) 3152]. By analyzing its security in the perfect channel from the aspect of quantum information theory, we find that an eavesdropper is capable of stealing all the information without being detected. Two typical attacks are presented to illustrate this point. A solution to this loophole is also suggested and we show its powerfulness against the most general individual attack in the ideal case. We also discuss the security in the imperfect case when there is noise and loss.
基金Supported by the New Century Excellent Talent Project (NCET) of the Ministry of Education of China under Grant No NCET-06-0554, the National Natural Science Foundation of China under Grant Nos 10975001, 60677001, 10747146 and 10874122, the Science-Technology Fund of Anhui Province for Outstanding Youth under Grant No 06042087, the Key Fund of the Ministry of Education of China under Grant No 206063, the General Fund of the Educational Committee of Anhui Province under Grant No 2006KJ260B, the Natural Science Foundation of Guangdong Province under Grant Nos 06300345 and 7007806, and the Talent Foundation of High Education of Anhui Province for Outstanding Youth under Grant No 2009SQRZ018.
文摘Using the method presented recently [Phys.Rev.A 77(2008)014306; Phys.Lett.A 369(2007)377], the transformation operator (TO) is explicitly given for teleporting an arbitrary three-qubit state with a six-qubit channel and Bell-state measurements. A criterion on whether such quantum teleportation can be perfectly realized is educed in terms of TO. Moreover, six instantiations on TO and criterion are concisely shown.
基金Supported by the National Natural Science Foundation of China under Grant No 10971247, and the Hebei Natural Science Foundation of China under Grant No F2009000311.
文摘We propose a scheme for the probabilistic teleportation of an unknown two-particle state of general formation in ion trap. It is shown that one can realize experimentally this teleportation protocol of two-particle state with presently available techniques.
基金Supported by the National Natural Science Foundation of China under Grant No 10574126, the Hunan Provincial Natural Science Foundation under Grant No 06jj50014 and Key Foundation of the Education Commission of Hunan Province under Grant No 06A055.
文摘Based on superconducting charge qubits (SCCQs) coupled to a single-mode microwave cavity, we propose a scheme for generating charge cluster states. For all SCCQs, the controlled gate voltages are all in their degeneracy points, the quantum information is encoded in two logic states of charge basis. The generation of the multi-qubit cluster state can be achieved step by step on a pair of nearest-neighbor qubits. Considering effective long-rang coupling, we provide an efficient way to one-step generating of a highly entangled cluster state, in which the qubit-qubit coupling is mediated by the cavity mode. Our quantum operations are insensitive to the initial state of the cavity mode by removing the influence of the cavity mode via the periodical evolution of the system. Thus, our operation may be against the decoherence from the cavity.
文摘Analytic results of the relationship between local noncommutativity and non-violations of Svetlichny inequalities for three-qubit separable states are obtained. It is shown that the converse trade-off relations presented by Seevinck and Uffinck [Phys. Rev. A 2007 76 042105] do not always hold for three-qubit states, and that there exists some correlation even though the state is the simple product state.
基金Supported by the National Natural Science Foundation of China under the Grant Nos 10774163, 10774161 and 10974225, and the National Fundamental Research Program of China under Grant No 2006CB921203. We acknowledge thankfully Professor C. Wunderlich, and Professor D. Suter for help and/or discussion, and we are grateful to Professor Zhan Mingsheng and Professor Gao Kelin for support and encouragement.
文摘A cloud of laser-cooled ^40Ca^+ is successfully trapped and manipulated under well control in our home-built linear ion trap, which is designed and constructed solely for studying quantum information processing. By exploring the variation of the ion cloud with respect to the trap parameters, we have optimized the trapping condition and obtained very good fluorescence spectra. We observe the dynamics of the ion cloud, and estimate the temperature of the ion cloud to be of the order of milli-Kelvin.
基金Supported by the National Natural Science Foundation of China under Grant No 61003256, the Natural Science Foundation of CQ CSTC (Nos 2009BB2282 and 2008BB2193), the Doctor Foundation of Chongqing University of Posts and Telecommunications (A2009-01), and the Foundation of Chongqing Key Laboratory of Electronic Commerce and Logistics (Nos ECML1003 and ECML1010).
文摘Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential flaws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks" and to keep all the merits of the original cryptosystem.