In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is...In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.展开更多
By means of the method of torus knot theory, this paper gives the complete processes of obtaining the knotted pictures of four Bell b^es from the knotted pictures of four basic two qubit states.
From the comparison of correlation tensor in the theory of quantum network, the Alexander relation matrix in the theory of knot crystals and the identical inversion relations under the action of Pauli matrices, we sho...From the comparison of correlation tensor in the theory of quantum network, the Alexander relation matrix in the theory of knot crystals and the identical inversion relations under the action of Pauli matrices, we show that there is a one to one correspondence between four Bell bases and four oriented links of the linkage in knot theory.展开更多
We propose a biased random number generation protocol whose randomness is based on the violation of the Clauser Home inequality. Non-maximally entangled state is used to maximize the Bell violation. Due to the rotatio...We propose a biased random number generation protocol whose randomness is based on the violation of the Clauser Home inequality. Non-maximally entangled state is used to maximize the Bell violation. Due to the rotational asymmetry of the quantum state, the ratio of Os to ls varies with the measurement bases. The experimental partners can then use their measurement outcomes to generate the biased random bit string. The bias of their bit string can be adjusted by altering their choices of measurement bases. When this protocol is implemented in a device-independent way, we show that the bias of the bit string can still be ensured under the collective attack.展开更多
We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformatio...We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformation channels.In the first scheme,the photons from Bob to Alice are transmitted only once.After insuring thesecurity of the quantum channels,Bob encodes the secret message on his photons.Then Alice performs single-photontwo-DOF Bell bases measurements on her photons.This scheme has better security than former QSDC protocols.In thesecond scheme,Bob transmits photons to Alice twice.After insuring the security of the quantum channels,Bob encodesthe secret message on his photons.Then Alice performs two-photon Bell bases measurements on each DOF.The schemehas more information capacity than former QSDC protocols.展开更多
Based on the previous work about the knotted pictures of quantum states, quantum logic gates and unitary transformations, this paper further gives the whole complete quantum measurement process of quantum teleportatio...Based on the previous work about the knotted pictures of quantum states, quantum logic gates and unitary transformations, this paper further gives the whole complete quantum measurement process of quantum teleportation from the viewpoint of knot theory.展开更多
This paper gives the knotted picture of the unknown quantum state in the process of quantum teleportation and the surgical knotted operations of the unitary operators operated on the teleported quantum state.
This paper introduces the unified expression of four Bell bases and uses the composition operation in knot theory to obtain the knotted picture of unitary operators based on Pauli operators, and gives the knotted expr...This paper introduces the unified expression of four Bell bases and uses the composition operation in knot theory to obtain the knotted picture of unitary operators based on Pauli operators, and gives the knotted expressions of 12 inversion relations between the four Bell bases.展开更多
This article discusses the covariance correlation tensor (CCT) in quantum network theory for four Bell bases in detail. Furthermore, it gives the expression of the density operator in terms of CCT for a quantum networ...This article discusses the covariance correlation tensor (CCT) in quantum network theory for four Bell bases in detail. Furthermore, it gives the expression of the density operator in terms of CCT for a quantum network of three nodes, thus gives the criterion of entanglement for this case, i.e. the conditions of complete separability and partial separability for a given quantum state of three bodies. Finally it discusses the general case for the quantum network of nodes.展开更多
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ...This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant No.60970140)
文摘In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.
文摘By means of the method of torus knot theory, this paper gives the complete processes of obtaining the knotted pictures of four Bell b^es from the knotted pictures of four basic two qubit states.
文摘From the comparison of correlation tensor in the theory of quantum network, the Alexander relation matrix in the theory of knot crystals and the identical inversion relations under the action of Pauli matrices, we show that there is a one to one correspondence between four Bell bases and four oriented links of the linkage in knot theory.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61378011,U1204616 and 11447143the Program for Science and Technology Innovation Talents in Universities of Henan Province under Grant No 2012HASTIT028the Program for Science and Technology Innovation Research Team in University of Henan Province under Grant No 13IRTSTHN020
文摘We propose a biased random number generation protocol whose randomness is based on the violation of the Clauser Home inequality. Non-maximally entangled state is used to maximize the Bell violation. Due to the rotational asymmetry of the quantum state, the ratio of Os to ls varies with the measurement bases. The experimental partners can then use their measurement outcomes to generate the biased random bit string. The bias of their bit string can be adjusted by altering their choices of measurement bases. When this protocol is implemented in a device-independent way, we show that the bias of the bit string can still be ensured under the collective attack.
基金Supported by the National Natural Science Foundations of China under Grant Nos. 10904066 and 11004096the State Key Program for Basic Research of China under Grant No. 2011CBA00205
文摘We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformation channels.In the first scheme,the photons from Bob to Alice are transmitted only once.After insuring thesecurity of the quantum channels,Bob encodes the secret message on his photons.Then Alice performs single-photontwo-DOF Bell bases measurements on her photons.This scheme has better security than former QSDC protocols.In thesecond scheme,Bob transmits photons to Alice twice.After insuring the security of the quantum channels,Bob encodesthe secret message on his photons.Then Alice performs two-photon Bell bases measurements on each DOF.The schemehas more information capacity than former QSDC protocols.
文摘Based on the previous work about the knotted pictures of quantum states, quantum logic gates and unitary transformations, this paper further gives the whole complete quantum measurement process of quantum teleportation from the viewpoint of knot theory.
文摘This paper gives the knotted picture of the unknown quantum state in the process of quantum teleportation and the surgical knotted operations of the unitary operators operated on the teleported quantum state.
文摘This paper introduces the unified expression of four Bell bases and uses the composition operation in knot theory to obtain the knotted picture of unitary operators based on Pauli operators, and gives the knotted expressions of 12 inversion relations between the four Bell bases.
文摘This article discusses the covariance correlation tensor (CCT) in quantum network theory for four Bell bases in detail. Furthermore, it gives the expression of the density operator in terms of CCT for a quantum network of three nodes, thus gives the criterion of entanglement for this case, i.e. the conditions of complete separability and partial separability for a given quantum state of three bodies. Finally it discusses the general case for the quantum network of nodes.
基金supported by the Key Program of the National Natural Science Foundation of China (Grant No. 90718007)the National Natural Science Foundation of China (Grant Nos. 60773135 and 60970140)
文摘This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.