999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Two-Way Cooperative Quantum Communication with Partial Entanglement Analysis

2013-05-23 02:59:54YunkaiDengZhujunGaoandYingGuo
ZTE Communications 2013年3期

Yunkai Deng,Zhujun Gao,and Ying Guo

(Central South University,Changsha 410083,China)

Abstract In this paper,we describe an improved cooperative two-way quantum communication scheme that works in a for?ward-and-backward fashion.In thisscheme,partial entanglement analysis based on five-qubit entangled Brown stateal?lows for the simultaneous exchange of arbitrary unknown states between Alice and Bob(with the help of trusted Charlie).Security is guaranteed because opposing unknown states are transmitted by performing the suitable recovery operations in a deterministic way or,in the case of irregularities,no results are generated.The current two-way quantum communi?cation scheme can also be extended to transmit arbitrary unknown states.This is done in a probabilistic way by using two-way quantumteleportation based on thegeneralized Brown-likestate.

Keyw ords quantumteleportation;two-way communication;brown state;bell states;entanglement

1 Introduction

E ntanglement has been widely applied in quantum information theory and quantum computation[1].An elegant application of entanglement is quantum teleportation(QT)[2],[3],in which an arbitrary un?known state is transmitted without distributing the quantum carrier itself.QT was first proposed by C.H.Bennett et al.in 1993.Since then,QThas been theoretically and experimental?ly investigated[4].Several schemes with different entangle?ment states have been reported.These states include Bell states[5]-[7],Greenberger-Horne-Zeiling(GHZ)states[8],and W states[9],[10].Two-qubit entanglement states can be transmitted via quantum teleportation based on four-qubit en?tanglement states[11]-[13].All QT schemes allow one-way,point-to-point transmission of single-qubit or multi-qubit en?tanglement states.

In practical applications,problems arise when two partici?pants(Alice and Bob)exchange unknown states in a small quantumnetwork.To solve thisproblem,Mishraet al.[14]pro?pose a two-way quantum communication scheme in which un?known single-qubit states can be exchanged.This exchange is based on the six-qubit entanglement state established between Alice and Bob(with the help of a third party,Charlie).Without Charlie,Alice and Bob could not recover the required states in a deterministic way because they do not know which channel will beestablished between them.

Recently,much research has been done on the multi-qubit entanglement state.In[15],the Brown state is described.This five-qubit maximally entangled state is achieved by using a numerical optimization procedure.Because it is highly entan?gled,this state can be used for QT[16],quantum secret shar?ing,superdense coding,secure communication[17],and infor?mation splitting[18].In[19],Sreraman et al.[19]proposed a one-way QT for transmitting unknown states based on the Brown state.

In a quantum computation network,information may be si?multaneously transmitted from Alice to Bob and from Bob to Alice.Consequently,two one-way QT schemes(one from Al?ice to Bob and one from Bob to Alice)may be switched on.However,a network becomes insecure or dishonest when Bob achieves Alice's unknown states but fails to send his Bell state measurements(BSMs)to Alice.Alice needs to recover Bob's unknown states at the same time Bob receives Alice's unknown because QTneeds the BSM results from sender to re?ceiver to recover unknown states.To solve this problem,QT must simultaneously transmit Alice's unknown states to Bob and Bob's unknown states to Alice.Also,QT must either ex?change unknown states or,in the case of irregularities,gener?ate no results.In this paper,we describe a two-way QT scheme in which partial entanglement analysis is performed.This scheme makes use of two local BSMs that are based on the Brown staterather than the Bell statesusually used in stan?dard QTschemes.

In section 2,we describe an improved cooperative two-way QT scheme that uses the help of a trusted third party,Charlie.We analyze this scheme using partial entanglement analysis based on the Brown state.In section 3,we propose a general two-way QTscheme for transmitting unknown states backward and forward.This transmission occurs in a probabilistic way,and the unknown states are assumed to be Brown-like states.Section 4 concludesthepaper.

2 Cooperative Two-Way QT Based on Brown States

Alice,Bob and Charlie prepare a five-qubit entanglement Brown state jBri12345 as the information carrier in a small quantum network.The subscript pairs 1 and 2,and 4 and 5 re?fer to the modes entangled with Alice and Bob,respectively.The subscript 3 refersto the mode entangled with Charlie.This modeisgiven by

Suppose Alice sends an arbitrary unknown state in mode 0,i.e.︳φɑ〉0=α︳0〉+β︳1〉,to Bob.At the same time,Bob sends another arbitrary unknown state in mode 6,i.e.︳φb〉6=γ︳0〉+δ︳1〉,to Alice.Alice and Bob both obtain the required states or,if there is a discrepancy,do not obtain the required states.Here,the coefficients are real and satisfy the two constraints︳α〉2+︳β〉2=1 and︳γ〉2+︳δ〉2=1.The direct-product state is given as

Therefore,thecombined quantumsystemisgiven by

which can berewritten as

If Alice and Bob want to exchange unknown states,a secure,cooperative two-way communication scheme can be used.This scheme is implemented with the help of Charlie via two-hop QTbased on the Brown state(Fig.1).

▲Figure1.Cooperativetwo-way QT schemebased on the Brawn state.

First,Alice measures the Bell states of the photons in modes 0 and 1.At the same time,Bob measures the Bell states of the photons in modes 5 and 6.Both Alice and Bob convey their BSMs MA,MB∈{00,01,10,11}to the trusted Charlie.These BSMs are sent through the classic channels.The yielded state︳Ω〉234is achieved in modes{2,3,4}(Table 1).Then,Charlie calculates Cm=MA?MB=MA+MBmod 2.After that,he uses the von Neumann measurement(VNM)on the photon in mode 3,with{︳0〉,︳1〉}as the basis of this measurement.The result of the VNMconformsto MC∈{00,01},which means that MC=00/01.This corresponds to the VNM︳0〉/︳1〉.Then,Charlie cal?culates Dm,given by

Finally,Charlie broadcasts Dmto Alice and Bob through the classic channels.

Alice and Bob obtain MBand MA,respectively,when they decode MCfrom the received Dm.If Dm∈{00,01},then Alice obtains MC=00;otherwise,she obtains MC=01.Alice decrypts Bob's MBaccording to her own MA,which is derived from Cm.Similarly,Bob securely obtains Charlie's MCand Alice's MAfrom Dm.Finally,Alice and Bob recover the opposite unknown states︳φb〉and︳φɑ〉,respectively,after performing suitable re?covery operationsin modes2 and 4(Table2).

If Alice and Bob's BSMs are both︳Φ+〉,i.e.MA=MB=00,and if Charlie's VNM is︳0〉,i.e.MC=00,then the resulting state in modes 2 and 4 is

▼Table 1.Relationship between Alice's BSM and the photons in modes 0 and 1,relation?ships between Bob's BSM and the photons in modes 5 and 6,and the entanglement states yielded in modes{2;3;4}

To achieve the unknown direct-product state in modes 2 and 4,and expressed in(3),Alice and Bob perform the controlled-phase operation Z in modes2 and 4,respectively,and obtain thestate

Then,Alice applies the unitary operationσxin mode2.Thisresultsin

Subsequently,Alice and Bob perform the con?trolled-NOT operation,C(2,4),on the photons in modes 2 and 4,where mode 2 is the control qubit,and mode 4 is the target qubit.Finally,Alice and Bob obtain thedirect-product state,given by

From(10),Alice can determine Bob's un?known state︳φb〉2in mode 2,and Bob can deter?mine Alice's unknown state︳φ〉in mode 4 by disentangling[1].

The controlled-phase operation performed in modes 2 and 4,is denoted Z,i.e.,Z 00〉=00〉,Z 01〉=01〉,Z 10〉=10〉,Z 11〉=-11〉.An identity operation is denoted I,and Pauli op?erations are denotedσzand σx.The con?trolled-NOTgate,denoted C(2,4),designates the control qubit in mode 2 and target qubit in mode 4.For simplicity,the normalization of the result?ing states is omitted.

The operations performed by Alice and Bob to exchange unknown states are depend entirely on MCof Charlie.To improve the security of the two-way QT,MA,MBand MCneed to be encrypt?ed by Charlie before being broadcast to Alice and Bob.Without the help of Charlie,Alice and Bob cannot exchange their unknown states.Fur?thermore,if either Alice or Bob fails to convey MAor MB,then Charliewill break off communica?tion without transmitting any information to Bob or Alice.In this scenario,we designate the se?cure two-way QT via the partial entanglement analysis in for?ward-and-backward quantumchannels.

▼Table 2.Recovery operations U 24=U 2?U 4 performed in modes 2 and 4 and based on Aliceand Bob's BSMs,respectively

3 Extended Cooperative Two-Way QT with the Brown-Like State

Here,weextend thetwo-way QTscheme.Thisschemeisex?tended in order so that unknown states,based on entangled Brown-like states established between Alice,Bob,and Char?lie,can be exchanged.Alice and Bob's unknown states can be represented as the direct-product state in(3).However,the f i ve-qubit entanglement state prepared as a quantum channel for QT is not maximally entangled.This is called the Brown-likestate︳?〉12345and isgiven by

where the photons in modes 1 and 2,and 4 and 5 are kept by Alice and Bob,respectively.The photon in mode 3 is kept by the trusted Charlie.The coefficients are real and satisfy the constraintɑ2+b2+c2+d2=1.

Before designating the extended two-way QT scheme,Alice and Bob prepare an unknown state︳φɑ〉0in mode 0 and an un?known state︳φb〉6in mode 6.The f ive-qubit entanglement state?needs to be established between Alice,Bob and Char?liein advance.Then,the whole quantum system becomes

Two-way communication in the extended system flows in a similar way to that in the previous system.Alice takes a BSM in modes 0 and 1,and this measurement is denoted MA′.At the same time,Bob takes a BSM in modes 5 and 6,and this mea?surement is denoted MB′.Alice and Bob both convey their BSMs to Charlie,who takes a VNM in mode 3.The basis of this measurement is{0〉,1〉},and the measurement is denot?ed MC′(from Cm=MA′?MB′).After that,Charlie broadcasts Dm=Cm?MC′to Alice and Bob through the classic channels.Bob decrypts MA′using the received Dmand his own MB′.Simi?larly,Alice obtains MB′by using the received Dmand her own MA′.Finally,Bob and Alice exchange unknown states by per?formingthesuitablerecovery operations.

Without a lossof generality,we consider a case in which two pairs of photons in modes 0 and 1,and 5 and 6 have collapsed into︳Φ+〉,and the VNM of Charlie is MC′=00.According to the previously mentioned process,the resulting state in modes 2 and 4 is

After applying the controlled phase gate Z in modes 2 and 4,Bob preparesan ancillary qubit︳0〉4′in mode 4′.Then,he per?forms the entangling operation C(2,4′)in modes 2 and 4′,and obtains

A state discrimination measurement can be taken to distin?guish b 1〉+c 0〉and b 1〉-c 0〉in mode4′[1].If thismeasure?ment is b 1〉+c 0〉,the yielded state in modes 2 and 4 is given by

Otherwise,theyielded stateisgiven by

To enhance the security of two-way QT,Alice and Bob need to sample a large number of Brown states and compare their measurements,which are based on the entanglement of the states in the eavesdropper-detection phase.As in[20],if Eve uses an intercept-resend attack to eavesdrop on the entangled channels,she may fail to resend the intercepted state.This will be detected by the legal participants in the communication[21].Similarly,the entangled channels established between Al?ice,Bob and Charlie should be made much secure by using known eavesdropper detection approaches.Effective eaves?dropper attacks include intercept-resend[21];entanglement swapping[22];teleportation[23];dense coding[24];channel loss[25],denial-of-service(DoS)[26],[27];correlation-ex?tract ability[28];and Trojan horse[29],[30].These attacks need to be understood to design secure two-way QT using par?tial entanglement analysis in imperfect channels.In addition,authenticating[31]and signing[32]-[36]a message can se?cureit fromillegitimateeavesdropper.

4 Conclusion

In this paper,we have investigated an improved cooperative two-way QT scheme that makes use of partial entanglement analysis of Brown or Brown-like states.We have described how to transfer arbitrary unknown states in a secure and coop?erative manner.Such transference involvesencryption by trust?ed Charlie and combining BSM and VNM with suitable local operations.This is an alternative was of transmitting unknown states with the help of Charlie in forward-and-backward chan?nels.Encryption is critical in quantum repeaters to secure a quantumcomputation network.

Acknowledgements

This work was supported by the National Natural Science Foundation of China(60902044,61172184),the New Century Excellent Talents in University(NCET-11-0510),and partly by the World Class University R32-2010-000-20014-0 NRF,and Fundamental Research 2010-0020942 NRF,Korea.

主站蜘蛛池模板: 538国产在线| 在线精品亚洲一区二区古装| 无遮挡一级毛片呦女视频| 亚洲av综合网| 国产又大又粗又猛又爽的视频| 色精品视频| 国产精品妖精视频| 欧美午夜在线观看| 国产精品视频免费网站| 色成人综合| 久久免费成人| 国产高清在线丝袜精品一区| 精品久久蜜桃| 精品久久久久无码| 国产精品第一区| 综合天天色| 亚洲av中文无码乱人伦在线r| 99视频全部免费| 呦女亚洲一区精品| 免费观看欧美性一级| 青青操国产| 天天综合天天综合| 久久久久人妻精品一区三寸蜜桃| 国产成人高清亚洲一区久久| 国产毛片基地| 欧美色图久久| 亚洲乱强伦| 亚洲美女一区| 欧美色视频网站| 制服丝袜国产精品| 免费一极毛片| 久久精品亚洲专区| 免费高清自慰一区二区三区| 69综合网| 欧美日韩动态图| 免费国产黄线在线观看| 亚洲人成电影在线播放| 国产一级裸网站| lhav亚洲精品| 久久久噜噜噜久久中文字幕色伊伊 | 在线中文字幕日韩| 97在线免费视频| 亚洲第一综合天堂另类专| 99re在线免费视频| 中文字幕无码制服中字| 国产美女一级毛片| 毛片视频网| 欧美另类第一页| 91口爆吞精国产对白第三集| 久久国产乱子伦视频无卡顿| 亚洲精品国产成人7777| 精品无码一区二区三区电影| 中国毛片网| 欧美在线导航| 色噜噜中文网| 欧美日韩高清在线| 国产青榴视频在线观看网站| 国产国语一级毛片在线视频| 久久精品国产精品一区二区| 亚洲成人网在线观看| 亚洲美女操| 免费在线看黄网址| 精品综合久久久久久97超人该| 亚洲成人精品| 青青国产视频| 国产成人精品午夜视频'| www.亚洲国产| 久久久久青草大香线综合精品| 成人福利在线视频免费观看| 国产精品成人一区二区| 欧美一级大片在线观看| 沈阳少妇高潮在线| 波多野一区| 99久久精品国产麻豆婷婷| 亚洲伊人电影| 首页亚洲国产丝袜长腿综合| 亚洲人成成无码网WWW| 国产视频入口| 亚洲精品亚洲人成在线| 国产精品女主播| 亚洲第一页在线观看| 女人av社区男人的天堂|