A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m ...A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efticiency for qudits in this scheme approaches 100% in principle.展开更多
In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contra...In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time.展开更多
We present a new approximation scheme for the centrifugal term, and apply this new approach to the SchrSdinger equation with the modified P5schl Teller potential in the -dimension for arbitrary angular momentum state...We present a new approximation scheme for the centrifugal term, and apply this new approach to the SchrSdinger equation with the modified P5schl Teller potential in the -dimension for arbitrary angular momentum states. The approximate analytical solutions of the scattering states are derived. The normalized wave functions expressed in terms of the hypergeometric functions of the scattering states on the 2 scale and the calculation formula of the phase shifts are given. The numerical results show that our results are in good agreement with those obtained by using the amplitude-phase method (APM).展开更多
We present a new approximation scheme for the centrifugal term,and apply this new approach to the Schrdinger equation with the modified Pschl-Teller potential in the D-dimension for arbitrary angular momentum states.T...We present a new approximation scheme for the centrifugal term,and apply this new approach to the Schrdinger equation with the modified Pschl-Teller potential in the D-dimension for arbitrary angular momentum states.The approximate analytical solutions of the scattering states are derived.The normalized wave functions expressed in terms of the hypergeometric functions of the scattering states on the k/2π scale and the calculation formula of the phase shifts are given.The numerical results show that our results are in good agreement with those obtained by using the amplitude-phase method(APM).展开更多
We propose a new scheme for controlled quantum teleportation with Bell states in which classical keys for controllers' portion are used. We also discuss the security of the proposed scheme and show that it can satisf...We propose a new scheme for controlled quantum teleportation with Bell states in which classical keys for controllers' portion are used. We also discuss the security of the proposed scheme and show that it can satisfy the requirements for controlled quantum teleportation. The comparison between this scheme and the previous ones shows that it is more economical and efficient.展开更多
To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a nove...To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a novel dynamic quantum secret sharing protocol. The new protocol can not only resist some typical attacks, but also be more efficient than the existing protocols. Furthermore, we take advantage of the protocol to establish the dynamic secret sharing of a quantum state protocol for two-particle maximum entangled states.展开更多
We present a two-photon three-dimensional multiparty quantum secret sharing scheme.The secret messagesare encoded by performing local operations.This is different from those quantum secret sharing protocols that all s...We present a two-photon three-dimensional multiparty quantum secret sharing scheme.The secret messagesare encoded by performing local operations.This is different from those quantum secret sharing protocols that all sharersmust make a state measurement.The merit of our protocol is the high capacity.展开更多
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an...Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.展开更多
This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding...This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding function, which is designed by exploiting the property of the corresponding logical Bell states immune to collective-dephasing noise and collective-rotation noise, respectively. The secret message can be encoded by two simple unitary operations and decoded by merely performing Bell measurements, which can make the proposed scheme more convenient in practical applications. Moreover, the strategy of one-step quanta transmission, together with the technique of decoy logical qubits checking not only reduces the influence of other noise existing in a quantum channel, but also guarantees the security of the communication between two legitimate users. The final analysis shows that the proposed schemes are feasible and robust against various well-known attacks over the collective noise channel.展开更多
We propose a scheme capable of performing complete Bell-state analysis for a single-photon hybrid entangled state.Our single-photon state is encoded in both polarization and frequency degrees of freedom.The setup of t...We propose a scheme capable of performing complete Bell-state analysis for a single-photon hybrid entangled state.Our single-photon state is encoded in both polarization and frequency degrees of freedom.The setup of the scheme is composed of polarizing beam splitters,half wave plates,frequency shifters,and independent wavelength division multiplexers,which are feasible using current technology.We also show that with this setup we can perform complete two-photon Bell-state analysis schemes for polarization degrees of freedom.Moreover,it can also be used to perform the teleportation scheme between different degrees of freedom.This setup may allow extensive applications in current quantum communications.展开更多
How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy prepara...How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy preparation of Bell states, a novelanti-noise quantum network coding protocol is proposed in this paper. The new protocolencodes and transmits classical information by virtue of Bell states. It can guarantee thetransparency of the intermediate nodes during information, so that the eavesdropper Evedisables to get any information even if he intercepts the transmitted quantum states. Inview of the inevitability of quantum noise in quantum channel used, this paper analyzesthe influence of four kinds of noises on the new protocol in detail further, and verifies theefficiency of the protocol under different noise by mathematical calculation and analysis.In addition, based on the detailed mathematical analysis, the protocol has functioned wellnot only on improving the efficiency of information transmission, throughput and linkutilization in the quantum network, but also on enhancing reliability and antieavesdroppingattacks.展开更多
In this paper a scheme for controlled teleportation of arbitrary high-dimensional unknown quantum states is proposed by using the generalized Bell-basis measurement and the generalized Hadamard transformation. As two ...In this paper a scheme for controlled teleportation of arbitrary high-dimensional unknown quantum states is proposed by using the generalized Bell-basis measurement and the generalized Hadamard transformation. As two special cases, two schemes of controlled teleportation of an unknown single-qutrit state and an unknown two-qutrit state are investigated in detail. In the first scheme, a maximally entangled three-qutrit state is used as the quantum channel, while in the second scheme, an entangled two-qutrit state and an entangled three-qutrit state are employed as the quantum channels. In these schemes, an unknown qutrit state can be teleported to either one of two receivers, but only one of them can reconstruct the qutrit state with the help of the other. Based on the case of qutrits, a scheme of controlled teleportation of an unknown qudit state is presented.展开更多
We outline a scheme for entanglement swapping based on cavity QED as well as quasi-Bell state measurement(quasiBSM) methods. The atom–field interaction in the cavity QED method is performed in small and large detunin...We outline a scheme for entanglement swapping based on cavity QED as well as quasi-Bell state measurement(quasiBSM) methods. The atom–field interaction in the cavity QED method is performed in small and large detuning regimes.We assume two atoms are initially entangled together and, distinctly two cavities are prepared in an entangled coherent–coherent state. In this scheme, we want to transform entanglement to the atom-field system. It is observed that, the fidelities of the swapped entangled state in the quasi-BSM method can be compatible with those obtained in the small and large detuning regimes in the cavity QED method(the condition of this compatibility will be discussed). In addition, in the large detuning regime, the swapped entangled state is obtained by detecting and quasi-BSM approaches. In the continuation,by making use of the atom–field entangled state obtained in both approaches in a large detuning regime, we show that the atomic as well as field states teleportation with complete fidelity can be achieved.展开更多
This paper proves that it is impossible to identify orthogonally time-separated Bell states. If two qubits of a Bell state interact with the measurement apparatus at different time, any attempt to identify this state ...This paper proves that it is impossible to identify orthogonally time-separated Bell states. If two qubits of a Bell state interact with the measurement apparatus at different time, any attempt to identify this state will disturb it.展开更多
We propose a scheme for generating Bell states involving two SQUID-based charge qubits by coupling themto a nanomechanical resonator.We also show that it is possible to implement a two-qubit logic gate between the two...We propose a scheme for generating Bell states involving two SQUID-based charge qubits by coupling themto a nanomechanical resonator.We also show that it is possible to implement a two-qubit logic gate between the twocharge qubits by choosing carefully the interaction time.展开更多
Bell inequality is violated by the quantum mechanical predictions made from an entangled state of the composite system. In this paper we examine this inequality and entanglement measures in the construction of the coh...Bell inequality is violated by the quantum mechanical predictions made from an entangled state of the composite system. In this paper we examine this inequality and entanglement measures in the construction of the coherent states for two-qubit pure and mixed states, we find a link to some entanglement measures through some new parameters (amplitudes of coherent states). Conditions for maximal entanglement and separability are then established for both pure and mixed states. Finally, we analyze and compare the violation of Bell inequality for a class of mixed states with the degree of entanglement by applying the formalism of Horodecki et al.展开更多
Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation(QT).QT...Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation(QT).QT was proposed to transmit the unknown states,in which EPR pairs,the entangled states,can be used as quantum channels.In this paper,we present two simple schemes for teleporting a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state respectively.Alice and Bob have shared an entangle state.Two Bell states are used as quantum channels.Then after Alice measuring her qubits and informing Bob her measurement results,Bob can perfectly reconstruct the original state by performing corresponding unitary operators on his qubits.It shown that a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state can be teleported perfectly,i.e.the success probabilities of our schemes are both 1.展开更多
In this paper, we investigate entropy properties of the single-mode coherent optical field interacting with the two two-level atoms initially in one of the four Bell states. It is found that the different initial stat...In this paper, we investigate entropy properties of the single-mode coherent optical field interacting with the two two-level atoms initially in one of the four Bell states. It is found that the different initial states of the two atoms lead to different evolutions of field entropy and the intensity of the field plays an important role for the evolution properties of field entropy.展开更多
基金* Supported by the National Natural Science Foundation of China under Grant Nos 10604008 and 10435020, and Beijing Education Committee under Grant No XK100270454.
文摘A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger- Horne--Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efticiency for qudits in this scheme approaches 100% in principle.
基金supported in part by the Ministry of Science and Technology(MOST)in Taiwan under Grants MOST108-2638-E-002-002-MY2,MOST109-2222-E-005-002-MY3,MOST110-2627-M-002-002,MOST110-2221-E-260-014,MOST110-2222-E-006-011,MOST111-2218-E-005-007-MBK,and MOST111-2119-M-033-001supported in part by Higher Education Sprout Project,Ministry of Education to the Headquarters of University Advancement at National Cheng Kung University.
文摘In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time.
基金Project supported by the Natural Science Foundation of Jiangsu Province, China (Grant No. BK2010291).
文摘We present a new approximation scheme for the centrifugal term, and apply this new approach to the SchrSdinger equation with the modified P5schl Teller potential in the -dimension for arbitrary angular momentum states. The approximate analytical solutions of the scattering states are derived. The normalized wave functions expressed in terms of the hypergeometric functions of the scattering states on the 2 scale and the calculation formula of the phase shifts are given. The numerical results show that our results are in good agreement with those obtained by using the amplitude-phase method (APM).
基金Project supported by the Natural Science Foundation of Jiangsu Province,China (Grant No. BK2010291)
文摘We present a new approximation scheme for the centrifugal term,and apply this new approach to the Schrdinger equation with the modified Pschl-Teller potential in the D-dimension for arbitrary angular momentum states.The approximate analytical solutions of the scattering states are derived.The normalized wave functions expressed in terms of the hypergeometric functions of the scattering states on the k/2π scale and the calculation formula of the phase shifts are given.The numerical results show that our results are in good agreement with those obtained by using the amplitude-phase method(APM).
基金supported by the National Natural Science Foundation of China (Grant Nos. 60873191,60903152,61003286 and 60821001)the Specialized Research Fund for the Doctoral Program of Higher Education,China (Grant Nos. 200800131016 and 20090005110010)+2 种基金the Beijing Nova Program,China (Grant No. 2008B51)the Key Project of the Chinese Ministry of Education (Grant No. 109014)the Natural Science Foundation of Educational Bureau of Henan Province,China (Grant No. 2010B120008)
文摘We propose a new scheme for controlled quantum teleportation with Bell states in which classical keys for controllers' portion are used. We also discuss the security of the proposed scheme and show that it can satisfy the requirements for controlled quantum teleportation. The comparison between this scheme and the previous ones shows that it is more economical and efficient.
基金Project supported by the National Basic Research Program of China(Grant No.2013CB338002)
文摘To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a novel dynamic quantum secret sharing protocol. The new protocol can not only resist some typical attacks, but also be more efficient than the existing protocols. Furthermore, we take advantage of the protocol to establish the dynamic secret sharing of a quantum state protocol for two-particle maximum entangled states.
文摘We present a two-photon three-dimensional multiparty quantum secret sharing scheme.The secret messagesare encoded by performing local operations.This is different from those quantum secret sharing protocols that all sharersmust make a state measurement.The merit of our protocol is the high capacity.
基金supported by the National Natural Science Foundation of China(Grant Nos.61303199,61272514,61170272,61121061,and 61411146001)the Shandong Provincial Natural Science Foundation of China(Grant Nos.ZR2013FM025,ZR2013FQ001,and ZR2014FM003)+4 种基金the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China(Grant Nos.BS2013DX010 and BS2014DX007)the Program for New Century Excellent Talents in Universities,China(Grant No.NCET-13-0681)the National Development Foundation for Cryptological Research,China(Grant No.MMJJ201401012)the Fok Ying Tong Education Foundation,China(Grant No.131067)the Shandong Academy of Sciences Youth Fund Project,China(Grant No.2013QN007)
文摘Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61272501,61272514,61170272,61472048,61402058,61121061,and 61411146001)the Program for New Century Excellent Talents in University of China(Grant No.NCET-13-0681)+4 种基金the National Development Foundation for Cryptological Research(Grant No.MMJJ201401012)the Fok Ying Tong Education Foundation(Grant No.131067)the Natural Science Foundation of Beijing(Grant Nos.4132056 and 4152038)the Postdoctoral Science Foundation of China(Grant No.2014M561826)the National Key Basic Research Program,China(Grant No.2012CB315905)
文摘This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding function, which is designed by exploiting the property of the corresponding logical Bell states immune to collective-dephasing noise and collective-rotation noise, respectively. The secret message can be encoded by two simple unitary operations and decoded by merely performing Bell measurements, which can make the proposed scheme more convenient in practical applications. Moreover, the strategy of one-step quanta transmission, together with the technique of decoy logical qubits checking not only reduces the influence of other noise existing in a quantum channel, but also guarantees the security of the communication between two legitimate users. The final analysis shows that the proposed schemes are feasible and robust against various well-known attacks over the collective noise channel.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 11104159,61201164,and 61271238)the Open Research Fund Program of the State Key Laboratory of Low-Dimensional Quantum Physics Scientific,Tsinghua University,China+2 种基金the Open Research Fund Program of National Laboratory of Solid State Microstructures,Nanjing University,China (Grant Nos. M25020 and M25022)the Priority Academic Development Program of Jiangsu Higher Education Institutions,China,the Open Research Fund of National Mobile Communications Research Laboratory of Southeast University,China (Grant No. 2011D05)the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20123223110003)
文摘We propose a scheme capable of performing complete Bell-state analysis for a single-photon hybrid entangled state.Our single-photon state is encoded in both polarization and frequency degrees of freedom.The setup of the scheme is composed of polarizing beam splitters,half wave plates,frequency shifters,and independent wavelength division multiplexers,which are feasible using current technology.We also show that with this setup we can perform complete two-photon Bell-state analysis schemes for polarization degrees of freedom.Moreover,it can also be used to perform the teleportation scheme between different degrees of freedom.This setup may allow extensive applications in current quantum communications.
文摘How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy preparation of Bell states, a novelanti-noise quantum network coding protocol is proposed in this paper. The new protocolencodes and transmits classical information by virtue of Bell states. It can guarantee thetransparency of the intermediate nodes during information, so that the eavesdropper Evedisables to get any information even if he intercepts the transmitted quantum states. Inview of the inevitability of quantum noise in quantum channel used, this paper analyzesthe influence of four kinds of noises on the new protocol in detail further, and verifies theefficiency of the protocol under different noise by mathematical calculation and analysis.In addition, based on the detailed mathematical analysis, the protocol has functioned wellnot only on improving the efficiency of information transmission, throughput and linkutilization in the quantum network, but also on enhancing reliability and antieavesdroppingattacks.
基金Project supported by the Natural Science Foundation of Education Bureau of Jiangsu Province of China (Grant No 05 KJD 140035).
文摘In this paper a scheme for controlled teleportation of arbitrary high-dimensional unknown quantum states is proposed by using the generalized Bell-basis measurement and the generalized Hadamard transformation. As two special cases, two schemes of controlled teleportation of an unknown single-qutrit state and an unknown two-qutrit state are investigated in detail. In the first scheme, a maximally entangled three-qutrit state is used as the quantum channel, while in the second scheme, an entangled two-qutrit state and an entangled three-qutrit state are employed as the quantum channels. In these schemes, an unknown qutrit state can be teleported to either one of two receivers, but only one of them can reconstruct the qutrit state with the help of the other. Based on the case of qutrits, a scheme of controlled teleportation of an unknown qudit state is presented.
文摘We outline a scheme for entanglement swapping based on cavity QED as well as quasi-Bell state measurement(quasiBSM) methods. The atom–field interaction in the cavity QED method is performed in small and large detuning regimes.We assume two atoms are initially entangled together and, distinctly two cavities are prepared in an entangled coherent–coherent state. In this scheme, we want to transform entanglement to the atom-field system. It is observed that, the fidelities of the swapped entangled state in the quasi-BSM method can be compatible with those obtained in the small and large detuning regimes in the cavity QED method(the condition of this compatibility will be discussed). In addition, in the large detuning regime, the swapped entangled state is obtained by detecting and quasi-BSM approaches. In the continuation,by making use of the atom–field entangled state obtained in both approaches in a large detuning regime, we show that the atomic as well as field states teleportation with complete fidelity can be achieved.
基金supported by the National Natural Science Foundation of China (Grant No 10504039)the Youth Chenguang Project of Science and Technology of Wuhan City of China
文摘This paper proves that it is impossible to identify orthogonally time-separated Bell states. If two qubits of a Bell state interact with the measurement apparatus at different time, any attempt to identify this state will disturb it.
基金The project supported by National Natural Science Foundation of China under Grant No. 10325523the National Fundamental Research Program of China under Grant No. 2001CB309310the Scientific Research Fund of the Education Department of Hunan Province under Grant No. 06C354
文摘We propose a scheme for generating Bell states involving two SQUID-based charge qubits by coupling themto a nanomechanical resonator.We also show that it is possible to implement a two-qubit logic gate between the twocharge qubits by choosing carefully the interaction time.
文摘Bell inequality is violated by the quantum mechanical predictions made from an entangled state of the composite system. In this paper we examine this inequality and entanglement measures in the construction of the coherent states for two-qubit pure and mixed states, we find a link to some entanglement measures through some new parameters (amplitudes of coherent states). Conditions for maximal entanglement and separability are then established for both pure and mixed states. Finally, we analyze and compare the violation of Bell inequality for a class of mixed states with the degree of entanglement by applying the formalism of Horodecki et al.
基金The work is supported by the National Natural Science Foundation of China(Grant No.61672014)the National Cryptography Development Fund(Grant No.MMJJ20180109)+1 种基金the Natural Science Foundation of Guangdong Province(Grant No.2016A030313090)the Fundamental Research Funds for the Central Universities.
文摘Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation(QT).QT was proposed to transmit the unknown states,in which EPR pairs,the entangled states,can be used as quantum channels.In this paper,we present two simple schemes for teleporting a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state respectively.Alice and Bob have shared an entangle state.Two Bell states are used as quantum channels.Then after Alice measuring her qubits and informing Bob her measurement results,Bob can perfectly reconstruct the original state by performing corresponding unitary operators on his qubits.It shown that a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state can be teleported perfectly,i.e.the success probabilities of our schemes are both 1.
基金the Science Foundation of China University of Petroleum under Grant No. Y061815
文摘In this paper, we investigate entropy properties of the single-mode coherent optical field interacting with the two two-level atoms initially in one of the four Bell states. It is found that the different initial states of the two atoms lead to different evolutions of field entropy and the intensity of the field plays an important role for the evolution properties of field entropy.