In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eave sdr...In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eave sdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all information, the detection rate of the original "Ping-pong" protocol is 50%; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle...Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.展开更多
<正> A scheme for controlled teleportation of an unknown N-qubit entangled GHZ state from the sender Aliceto the distant receiver Bob is proposed.And m-qubit GHZ state is sufficient for the task of control by m ...<正> A scheme for controlled teleportation of an unknown N-qubit entangled GHZ state from the sender Aliceto the distant receiver Bob is proposed.And m-qubit GHZ state is sufficient for the task of control by m spatially-separated supervisors.Conditioned on the local operations executed by all participants,Bob can faithfully restore theoriginal state by performing relevant unitary transformations with the aid of some classical message about measurementresults.Anyone's absence will absolutely lead to the failure of teleportation.展开更多
We propose a quantum error-rejection scheme for direct communication with three-qubit quantum codes based on the direct communication of secret messages without any secret key shared in advance. Given the symmetric an...We propose a quantum error-rejection scheme for direct communication with three-qubit quantum codes based on the direct communication of secret messages without any secret key shared in advance. Given the symmetric and independent errors of the transmitted qubits, our scheme can tolerate a bit of error rate up to 33.1%, thus the protocol is deterministically secure against any eavesdropping attack even in a noisy channel.展开更多
We propose a scheme to generate polarization-entangled multiphoton Greenberger-Horne-Zeilinger (GHZ) states based on weak cross-Kerr nonlinearity and subsequent homodyne measurement. It can also be generalized to prod...We propose a scheme to generate polarization-entangled multiphoton Greenberger-Horne-Zeilinger (GHZ) states based on weak cross-Kerr nonlinearity and subsequent homodyne measurement. It can also be generalized to produce maximally N-qubit entangled states. The success probabilities of our schemes are almost equal to 1.展开更多
We propose an efficient scheme for realizing quantum dense coding with three-particle GHZ state in separated low-Q cavities. In this paper, the GHZ state is first prepared with three atoms trapped, respectively, in th...We propose an efficient scheme for realizing quantum dense coding with three-particle GHZ state in separated low-Q cavities. In this paper, the GHZ state is first prepared with three atoms trapped, respectively, in three spatial separated cavities. Meanwhile, with the assistance of a coherent optical pulse and X-quadrature homodyne measurement, we can implement quantum dense coding with three-particle GHZ state with a higher probability. Our scheme can also be generalized to realize N-particle quantum dense coding.展开更多
An N-qubit Greenberger–Horne–Zeilinger(GHZ) state has many applications in various quantum information tasks and can be realized in different experimental schemes. A GHZ diagonal state evolves to another GHZ diagona...An N-qubit Greenberger–Horne–Zeilinger(GHZ) state has many applications in various quantum information tasks and can be realized in different experimental schemes. A GHZ diagonal state evolves to another GHZ diagonal state in independent parallel Pauli channels. We give the explicit expression of the resultant GHZ diagonal state in terms of the initial state and channel parameters. If the initial state is a pure N qubit GHZ state or a three-qubit GHZ diagonal state admits a condition, the full separability criterion of the Pauli noisy state is equivalent to positive partial transpose(PPT)criterion. Thus the fully separable condition follows.展开更多
This article generalizes our previous results for a quantum system of two nodes to a quantum system ofm(m ≥ 2) nodes. It shows that there is a one to one correspondence between 2m GHZ states for a quantum system ofm...This article generalizes our previous results for a quantum system of two nodes to a quantum system ofm(m ≥ 2) nodes. It shows that there is a one to one correspondence between 2m GHZ states for a quantum system ofm(m ≥ 2) nodes and 2m oriented links of the linkage N1 in knot theory, where N = 4 C2m = 2m(m - 1) is the numberof crossings of the link with m components, the subscript 1 denotes the order of the unoriented m components link withN crossings, i.e. the first type, actually the simplest type.展开更多
Using a single-mode approximation, we carry out the entanglement measures, e.g., the negativity and von Neumann entropy when a tetrapartite generalized GHZ state is treated in a noninertial frame, but only uniform acc...Using a single-mode approximation, we carry out the entanglement measures, e.g., the negativity and von Neumann entropy when a tetrapartite generalized GHZ state is treated in a noninertial frame, but only uniform acceleration is considered for simplicity. In terms of explicit negativity calculated, we notice that the difference between the algebraic average π_(4) and geometric average Π_(4) is very small with the increasing accelerated observers and they are totally equal when all four qubits are accelerated simultaneously. The entanglement properties are discussed from one accelerated observer to all four accelerated observers. It is shown that the entanglement still exists even if the acceleration parameter r goes to infinity. It is interesting to discover that all 1-1 tangles are equal to zero, but 1-3 and 2-2 tangles always decrease when the acceleration parameter γ increases. We also study the von Neumann entropy and find that it increases with the number of the accelerated observers. In addition, we find that the von Neumann entropy S_(ABCDI), S_(ABCIDI), S_(ABICIDI) and S_(AIBICIDI) always decrease with the controllable angle θ, while the entropies S_(3-3 non), S_(3-2 non), S_(3-1 non) and S_(3-0 non) first increase with the angle θ and then decrease with it.展开更多
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information.Recently,El Allati et al.proposed a new quantum steganography us...Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information.Recently,El Allati et al.proposed a new quantum steganography using the GHZ4 state.Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered,we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations.To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state,we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states.Due to the symmetry of the GHZ4 state,all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states,so the improved protocol achieves a high efficiency.展开更多
A novel efficient semi-quantum private comparison protocol based on the d-dimensional GHZ states is proposed.With the assistance of semi-honest third party,two classical participants can compare the size relation of t...A novel efficient semi-quantum private comparison protocol based on the d-dimensional GHZ states is proposed.With the assistance of semi-honest third party,two classical participants can compare the size relation of their secrets without any information leakage.To reduce the consumption of quantum devices,the qubit efficiency of our protocol is improved by introducing the semi-quantum conception via the existing semi-quantum private comparisons.Furthermore,it is unnecessary to prepare the secure classical authentication channel among participants in advance.It is shown that our protocol is not only correct and efficient,but also free from external and internal attacks.展开更多
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema...Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.展开更多
With the acceleration of the construction of quantum communication networks,scholars have proposed different quantum communication protocols for different application scenarios.However,few scholars pay attention to th...With the acceleration of the construction of quantum communication networks,scholars have proposed different quantum communication protocols for different application scenarios.However,few scholars pay attention to the risk assessment process before communication.In this paper,we propose a novel quantum risk assessment model based on quantum teleportation technology with two three-qubit GHZ states.Only by using Bell states measurements(BSMs)and two-qubit projective measurements(PJMs),the communicators can recovery any arbitrary two-qubit state.This protocol can transmit two-dimension risk assessment factors with better security performance.On the one hand,more sufficient evaluation factors allow the two communicating parties to more objectively evaluate the risk level of communication with the other party,and on the other hand,it also improves the qubit efficiency of the protocol.Moreover,we introduce the third party in this scheme can be semi-trusted,which must be full-trusted in our previous work.This change can reduce the dependence of the communication parties on the third-party organization and improve the privacy of communication.The security analysis shows that this scheme can resist internal and external attacks,and the quantum circuit diagrams also prove that our protocol is physically easier to implement.展开更多
基金Acknowledgements The project was supported by the Specialized Research Found for the Doctoral Program of Higher Education of China under Grant No. 20060013007 the National Natural Science Foundation of Beijing under Caant No. 4092029 and the National Natural Science Foundation of China under Grant No. 61100205, No. 60873001.
文摘In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eave sdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all information, the detection rate of the original "Ping-pong" protocol is 50%; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
基金supported by the Tang Scholar Project of Soochow Universitythe National Natural Science Foundation of China(Grant No.61873162)+1 种基金the Fund from Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication NetworkSuzhou Key Laboratory of Advanced Optical Communication Network Technology。
文摘Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.
基金The project supported by Natural Science Foundation of Jiangsu Province under Grant No. 04KJB140119 and the Specialized Research Fund from the Doctoral Programm of Higher Education under Grant No. 20050285002
文摘<正> A scheme for controlled teleportation of an unknown N-qubit entangled GHZ state from the sender Aliceto the distant receiver Bob is proposed.And m-qubit GHZ state is sufficient for the task of control by m spatially-separated supervisors.Conditioned on the local operations executed by all participants,Bob can faithfully restore theoriginal state by performing relevant unitary transformations with the aid of some classical message about measurementresults.Anyone's absence will absolutely lead to the failure of teleportation.
基金supported partly by the National Natural Science Foundation of China (Grant Nos 10774163, 10804132 and 10747167)the Natural Science Foundation Project of Chongqing, Chongqing Science and Technology Committee (CQ CSTC) (Grant No2008BB0152)partly by the National Major Fundamental Research Program of China (Grant No 2006CB921203)
文摘We propose a quantum error-rejection scheme for direct communication with three-qubit quantum codes based on the direct communication of secret messages without any secret key shared in advance. Given the symmetric and independent errors of the transmitted qubits, our scheme can tolerate a bit of error rate up to 33.1%, thus the protocol is deterministically secure against any eavesdropping attack even in a noisy channel.
基金Project supported by the National Natural Science Foundation of China (Grant Nos 10604008 and 10435020) and Beijing Education Committee (Grant No XK100270454).
基金supported by the National Natural Science Foundation of China (Grant No. 11074002)the Doctoral Foundation of the Ministry of Education of China (Grant No. 20103401110003)the Personal Development Foundation of Anhui Province ofChina (Grant No. 2008Z018)
文摘We propose a scheme to generate polarization-entangled multiphoton Greenberger-Horne-Zeilinger (GHZ) states based on weak cross-Kerr nonlinearity and subsequent homodyne measurement. It can also be generalized to produce maximally N-qubit entangled states. The success probabilities of our schemes are almost equal to 1.
基金Project supported by the National Natural Science Foundation of China (Grant No 10574001) and the Program of the Education Department of Anhui Province (Grant No 2004kj029).
基金The project supported by the Natural Science Foundation of the Education Department of Anhui Province under Grant Nos. 2006kj070A and 2006kj057B, and the Talent Foundation of Anhui University
基金supported by the National Natural Science Foundation of China(Grant Nos.11074002 and 61275119)the Doctoral Foundation of the Ministry of Education of China(Grant No.20103401110003)the Natural Science Research Project of Education Department of Anhui Province,China(Grant Nos.KJ2013A205,KJ2011ZD07,and KJ2012Z309)
文摘We propose an efficient scheme for realizing quantum dense coding with three-particle GHZ state in separated low-Q cavities. In this paper, the GHZ state is first prepared with three atoms trapped, respectively, in three spatial separated cavities. Meanwhile, with the assistance of a coherent optical pulse and X-quadrature homodyne measurement, we can implement quantum dense coding with three-particle GHZ state with a higher probability. Our scheme can also be generalized to realize N-particle quantum dense coding.
基金supported by the National Natural Science Foundation of China(Grant No.11375152)
文摘An N-qubit Greenberger–Horne–Zeilinger(GHZ) state has many applications in various quantum information tasks and can be realized in different experimental schemes. A GHZ diagonal state evolves to another GHZ diagonal state in independent parallel Pauli channels. We give the explicit expression of the resultant GHZ diagonal state in terms of the initial state and channel parameters. If the initial state is a pure N qubit GHZ state or a three-qubit GHZ diagonal state admits a condition, the full separability criterion of the Pauli noisy state is equivalent to positive partial transpose(PPT)criterion. Thus the fully separable condition follows.
文摘This article generalizes our previous results for a quantum system of two nodes to a quantum system ofm(m ≥ 2) nodes. It shows that there is a one to one correspondence between 2m GHZ states for a quantum system ofm(m ≥ 2) nodes and 2m oriented links of the linkage N1 in knot theory, where N = 4 C2m = 2m(m - 1) is the numberof crossings of the link with m components, the subscript 1 denotes the order of the unoriented m components link withN crossings, i.e. the first type, actually the simplest type.
基金partially supported by the 20210414-SIPIPN, Mexico。
文摘Using a single-mode approximation, we carry out the entanglement measures, e.g., the negativity and von Neumann entropy when a tetrapartite generalized GHZ state is treated in a noninertial frame, but only uniform acceleration is considered for simplicity. In terms of explicit negativity calculated, we notice that the difference between the algebraic average π_(4) and geometric average Π_(4) is very small with the increasing accelerated observers and they are totally equal when all four qubits are accelerated simultaneously. The entanglement properties are discussed from one accelerated observer to all four accelerated observers. It is shown that the entanglement still exists even if the acceleration parameter r goes to infinity. It is interesting to discover that all 1-1 tangles are equal to zero, but 1-3 and 2-2 tangles always decrease when the acceleration parameter γ increases. We also study the von Neumann entropy and find that it increases with the number of the accelerated observers. In addition, we find that the von Neumann entropy S_(ABCDI), S_(ABCIDI), S_(ABICIDI) and S_(AIBICIDI) always decrease with the controllable angle θ, while the entropies S_(3-3 non), S_(3-2 non), S_(3-1 non) and S_(3-0 non) first increase with the angle θ and then decrease with it.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61170272,61272514,61003287,and 61070163)the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20100005120002)+3 种基金the Fok Ying Tong Education Foundation (Grant No. 131067)the Natural Science Foundation of Shandong Province,China (Grant No. ZR2011FM023)the Outstanding Research Award Fund for Young Scientists of Shandong Province,China (Grant No. BS2011DX034)the Fundamental Research Funds for Central Universities of China (Grant No. BUPT2012RC0221)
文摘Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information.Recently,El Allati et al.proposed a new quantum steganography using the GHZ4 state.Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered,we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations.To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state,we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states.Due to the symmetry of the GHZ4 state,all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states,so the improved protocol achieves a high efficiency.
基金the National Natural Science Foundation of China(Grant Nos.62161025 and 61871205)the Project of Scientific and Technological Innovation Base of Jiangxi Province,China(Grant No.20203CCD46008)the Jiangxi Provincial Key Laboratory of Fusion and Information Control,China(Grant No.20171BCD40005).
文摘A novel efficient semi-quantum private comparison protocol based on the d-dimensional GHZ states is proposed.With the assistance of semi-honest third party,two classical participants can compare the size relation of their secrets without any information leakage.To reduce the consumption of quantum devices,the qubit efficiency of our protocol is improved by introducing the semi-quantum conception via the existing semi-quantum private comparisons.Furthermore,it is unnecessary to prepare the secure classical authentication channel among participants in advance.It is shown that our protocol is not only correct and efficient,but also free from external and internal attacks.
基金supported by the National Natural Science Foundation of China(Grant No.61572086)Major Project of Education Department in Sichuan(Grant No.18ZA0109)Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department(Grant No.WLWH18-22).
文摘Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.
基金This work is supported by the National Natural Science Foundation of China(No.61572086,No.61402058)the Key Research and Development Project of Sichuan Province(No.20ZDYF2324,No.2019ZYD027,No.2018TJPT0012)+3 种基金the Innovation Team of Quantum Security Communication of Sichuan Province(No.17TD0009)the Academic and Technical Leaders Training Funding Support Projects of Sichuan Province(No.2016120080102643)the Application Foundation Project of Sichuan Province(No.2017JY0168)the Science and Technology Support Project of Sichuan Province(No.2018GZ0204,No.2016FZ0112).
文摘With the acceleration of the construction of quantum communication networks,scholars have proposed different quantum communication protocols for different application scenarios.However,few scholars pay attention to the risk assessment process before communication.In this paper,we propose a novel quantum risk assessment model based on quantum teleportation technology with two three-qubit GHZ states.Only by using Bell states measurements(BSMs)and two-qubit projective measurements(PJMs),the communicators can recovery any arbitrary two-qubit state.This protocol can transmit two-dimension risk assessment factors with better security performance.On the one hand,more sufficient evaluation factors allow the two communicating parties to more objectively evaluate the risk level of communication with the other party,and on the other hand,it also improves the qubit efficiency of the protocol.Moreover,we introduce the third party in this scheme can be semi-trusted,which must be full-trusted in our previous work.This change can reduce the dependence of the communication parties on the third-party organization and improve the privacy of communication.The security analysis shows that this scheme can resist internal and external attacks,and the quantum circuit diagrams also prove that our protocol is physically easier to implement.