By means of the method of torus knot theory, this paper gives the complete processes of obtaining the knotted pictures of four Bell b^es from the knotted pictures of four basic two qubit states.
From the comparison of correlation tensor in the theory of quantum network, the Alexander relation matrix in the theory of knot crystals and the identical inversion relations under the action of Pauli matrices, we sho...From the comparison of correlation tensor in the theory of quantum network, the Alexander relation matrix in the theory of knot crystals and the identical inversion relations under the action of Pauli matrices, we show that there is a one to one correspondence between four Bell bases and four oriented links of the linkage in knot theory.展开更多
We propose a biased random number generation protocol whose randomness is based on the violation of the Clauser Home inequality. Non-maximally entangled state is used to maximize the Bell violation. Due to the rotatio...We propose a biased random number generation protocol whose randomness is based on the violation of the Clauser Home inequality. Non-maximally entangled state is used to maximize the Bell violation. Due to the rotational asymmetry of the quantum state, the ratio of Os to ls varies with the measurement bases. The experimental partners can then use their measurement outcomes to generate the biased random bit string. The bias of their bit string can be adjusted by altering their choices of measurement bases. When this protocol is implemented in a device-independent way, we show that the bias of the bit string can still be ensured under the collective attack.展开更多
This paper introduces the concept and motivates the use of finite-interval based measures for physically realizable and measurable quantities, which we call -measures. We demonstrate the utility and power of -measures...This paper introduces the concept and motivates the use of finite-interval based measures for physically realizable and measurable quantities, which we call -measures. We demonstrate the utility and power of -measures by illustrating their use in an interval-based analysis of a prototypical Bell’s inequality in the measurement of the polarization states of an entangled pair of photons. We show that the use of finite intervals in place of real-numbered values in the Bell inequality leads to reduced violations. We demonstrate that, under some conditions, an interval-based but otherwise classically calculated probability measure can be made to arbitrarily closely approximate its quantal counterpart. More generally, we claim by heuristic arguments and by formal analogy with finite-state machines that -measures can provide a more accurate model of both classical and quantal physical property values than point-like, real numbers—as originally proposed by Tuero Sunaga in 1958.展开更多
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is...In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.展开更多
We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformatio...We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformation channels.In the first scheme,the photons from Bob to Alice are transmitted only once.After insuring thesecurity of the quantum channels,Bob encodes the secret message on his photons.Then Alice performs single-photontwo-DOF Bell bases measurements on her photons.This scheme has better security than former QSDC protocols.In thesecond scheme,Bob transmits photons to Alice twice.After insuring the security of the quantum channels,Bob encodesthe secret message on his photons.Then Alice performs two-photon Bell bases measurements on each DOF.The schemehas more information capacity than former QSDC protocols.展开更多
Based on the previous work about the knotted pictures of quantum states, quantum logic gates and unitary transformations, this paper further gives the whole complete quantum measurement process of quantum teleportatio...Based on the previous work about the knotted pictures of quantum states, quantum logic gates and unitary transformations, this paper further gives the whole complete quantum measurement process of quantum teleportation from the viewpoint of knot theory.展开更多
文摘By means of the method of torus knot theory, this paper gives the complete processes of obtaining the knotted pictures of four Bell b^es from the knotted pictures of four basic two qubit states.
文摘From the comparison of correlation tensor in the theory of quantum network, the Alexander relation matrix in the theory of knot crystals and the identical inversion relations under the action of Pauli matrices, we show that there is a one to one correspondence between four Bell bases and four oriented links of the linkage in knot theory.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61378011,U1204616 and 11447143the Program for Science and Technology Innovation Talents in Universities of Henan Province under Grant No 2012HASTIT028the Program for Science and Technology Innovation Research Team in University of Henan Province under Grant No 13IRTSTHN020
文摘We propose a biased random number generation protocol whose randomness is based on the violation of the Clauser Home inequality. Non-maximally entangled state is used to maximize the Bell violation. Due to the rotational asymmetry of the quantum state, the ratio of Os to ls varies with the measurement bases. The experimental partners can then use their measurement outcomes to generate the biased random bit string. The bias of their bit string can be adjusted by altering their choices of measurement bases. When this protocol is implemented in a device-independent way, we show that the bias of the bit string can still be ensured under the collective attack.
文摘This paper introduces the concept and motivates the use of finite-interval based measures for physically realizable and measurable quantities, which we call -measures. We demonstrate the utility and power of -measures by illustrating their use in an interval-based analysis of a prototypical Bell’s inequality in the measurement of the polarization states of an entangled pair of photons. We show that the use of finite intervals in place of real-numbered values in the Bell inequality leads to reduced violations. We demonstrate that, under some conditions, an interval-based but otherwise classically calculated probability measure can be made to arbitrarily closely approximate its quantal counterpart. More generally, we claim by heuristic arguments and by formal analogy with finite-state machines that -measures can provide a more accurate model of both classical and quantal physical property values than point-like, real numbers—as originally proposed by Tuero Sunaga in 1958.
基金Project supported by the National Natural Science Foundation of China(Grant No.60970140)
文摘In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.
基金Supported by the National Natural Science Foundations of China under Grant Nos. 10904066 and 11004096the State Key Program for Basic Research of China under Grant No. 2011CBA00205
文摘We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformation channels.In the first scheme,the photons from Bob to Alice are transmitted only once.After insuring thesecurity of the quantum channels,Bob encodes the secret message on his photons.Then Alice performs single-photontwo-DOF Bell bases measurements on her photons.This scheme has better security than former QSDC protocols.In thesecond scheme,Bob transmits photons to Alice twice.After insuring the security of the quantum channels,Bob encodesthe secret message on his photons.Then Alice performs two-photon Bell bases measurements on each DOF.The schemehas more information capacity than former QSDC protocols.
文摘Based on the previous work about the knotted pictures of quantum states, quantum logic gates and unitary transformations, this paper further gives the whole complete quantum measurement process of quantum teleportation from the viewpoint of knot theory.