999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Probabilistic quantum teleportation of shared quantum secret

2022-09-24 07:58:30HengjiLi李恒吉JianLi李劍andXiuboChen陳秀波
Chinese Physics B 2022年9期

Hengji Li(李恒吉) Jian Li(李劍) and Xiubo Chen(陳秀波)

1School of Artificial Intelligence,Beijing University of Posts and Telecommunications,Beijing 100876,China

2School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China

3The Laboratory of Cryptography of Zhejiang Province,Hangzhou 311121,China

4Quantum Technology Laboratory and Applied Mechanics Group,University of Milan,Milan 20133,Italy

Keywords: probabilistic quantum teleportation,shared quantum secret,partially entangled GHZ state

1. Introduction

Quantum teleportation[1]uses a pre-shared quantum channel to faithfully transfer an unknown quantum state between distant nodes within a network.Nowadays,it has played a pivotal role in various quantum information technologies such as measurement-based quantum computation,[2]quantum network[3,4]and a possible further quantum Internet.[5,6]Experimentally, the teleportation of arbitrary quantum states from a two-dimensional qubit[7]to a high-dimensional qudit[8]has been realized.

To realize versatile quantum networks, the incorporation of multiple participants needs to be further considered. Controlled teleportation has been proposed which can split quantum information from one sender to multiple receivers.[9-12]Teleportations of multiparty states have also been demonstrated and studied,[13,14]in which the multipartite entanglement state could be teleported. Besides quantum teleportation, controlled remote state preparation is presented,[15,16]where the goal can only be achieved with the control of the agents. A distributed quantum computation with the control of the controller[17]is proposed. Moreover, there are other typical quantum communication protocols that could facilitate the construction of versatile quantum networks.[18-25]Various kinds of quantum cryptography protocols,such as quantum key distribution,[18,19]quantum secure direct communication[20]and quantum secret sharing,[21,22]could generate a secure communication channel. In such a way, it is impossible in principle to eavesdrop without a high probability of disturbing the transmission, which will be detected.Considering a real situation,for obtaining deterministically maximally entangled pure states,quantum entanglement concentration and purification schemes are proposed,[23-25]which are very important elements for long-distance quantum communication.

Very recently, Leeet al.proposed a teleportation protocol of shared quantum secret states among multiple senders and receivers.[4]It can teleport quantum information shared by an arbitrary number of senders to another arbitrary number of receivers, where neither any single-nor subparties of senders and receivers can fully access the secret quantum information.This indicates that we can relay quantum information over a network in an efficient and distributed manner without requiring fully trusted central or intermediate nodes.[26]In Leeet al.’s scheme,[4]a multipartite maximally entangled GHZ state andntimes of standard Bell-state measurements are required.It can perfectly achieve the teleportation with unit probability.

Due to the fragility of the entanglement[27]and the inevitable effects of environmental noise,[28,29]a maximally entangled state could be degraded into a partially entangled state. On the one hand, employing entanglement concentration,[30,31]one can probabilistically obtain a maximally entangled state,but,for this to occur,a large ensemble of partially entangled states is required. On the other hand,probabilistic teleportation was proposed via direct utilization of a partially entangled state in the network channel. In Ref.[32],the sender still makes a standard Bell-state measurement,however,on reconstruction of the original state,the receiver needs to introduce an auxiliary particle and then perform a twoparticle unitary transformation. Considering the fact that there is one to one correspondence between the joint measurement result and the final state,the proper measurement result might lead the receiver to recover the target state. For example,generalized Bell-state[33]and GHZ measurements[14]have been introduced to probabilistically transfer the state without an auxiliary particle.

In this manuscript, we consider the partially entangled GHZ state as the network channel to achieve the teleportation of shared quantum secret. It is shown that the shared quantum secret can reach its destination with unity fidelity. However,the price we pay to achieve unity fidelity is that the successful probability is less than 1. Two kinds of approaches are given,inspired by prior work.[32,33]The first one involves performingntimes of standard Bell-state measurements, however at the end of the protocol,introduction of an auxiliary qubit and adoption of a general evolution[32]is required at any receiver’s location. The second possibility involves performing a generalized Bell-state measurement[33]at only one sender’s location. Moreover, the successful probability is given, which is determined by the degree of the entanglement of the channel.

The paper is structured as follows. Firstly, the original protocols is shown in Section 2,and then we present two new proposals of probabilistic teleportation of the shared quantum secret in Section 3. In Section 4,we discuss our two schemes and Section 5 contains our conclusions.

2. The original protocol

Then they communicate the outcomes to the receiversrj.Conditioned on the results, the state of the channel at the receivers’locations is|φ〉mrplus logical Pauli operators. Lastly,the receivers can reconstruct the target state|φ〉mrby carrying out the local Pauli operators,according to the results of all the senders. Figure 1 shows the protocol, while taking|ε〉n+mas the network channel andM1=···=Mn=B.

Fig. 1. The (n+m)-particle entangled state ({s'1,s'2,...,s'n} and {r1,r2,...,rm}), as the network channel is utilized to teleport a quantum secret|φ〉ns ({s1,s2,...,sn})between n senders and m receivers. After performing n joint measurements(the dotted frame),denoted as Mi,the receivers can reconstruct the shared secret.

3. Teleportation with a partial multipartite entanglement state

Instead of sharing a GHZ state, the senders and the receivers may initially share a non-maximally entangled state of the form

3.1. Teleportation based on n times of standard Bell state measurements

In this subsection, we present our simple scheme, wherentimes ofBs are still performed at every sender’s location.Figure 1 shows the protocol, while taking|ε'〉n+mas the network channel andM1=···=Mn=B. It is shown here that the shared quantum secret can be recovered with unit fidelity,however, a proper generalized revolution is needed. First of all,write the initial composite system as

After performingntimes ofBs, they inform the receivers of the results via the classical channels. Define the measurement result of the sendersiaszixiand let the classical bits{00,10,01,11}correspond to{|φ+〉,|φ-〉,|ψ+〉,|ψ-〉}.

Next,he implements aZ-measurement on the auxiliary qubit.When the result is|0〉aux,the target state can be recovered with the probability|Pp|2. Adding up both the contributions, the optimal probability of successful teleportation is obtained asQ1=2|Pp|2.

3.2. Teleportation based on a single generalized Bell state measurement

In the subsection above, for teleporting the initial state with unity fidelity, an auxiliary qubit needs to be introduced and a two-particle collective transformation is then performed.Here, we show that it is possible for the receivers to recover the target state without the auxiliary qubit, though not with unit probability. To fulfill this, instead of performingn Bs,a single generalized Bell state measurement(BG)is required.Firstly,define the generalized Bell basis[33]

Adjust the order and rewrite the composite system as

4. Analysis

The access information in the probabilistic teleportation of shared secret state can be shown by the same methods presented in Ref. [4]. Any subparties can not fully access the quantum secret during the teleportation procedures. Note thatntimes ofBs are not necessary. Actually, only one Bellstate measurement is sufficient for implementing the protocol.Rewrite Eqs.(5a)and(5b)as(without normalized)

Fig.2. The successful probability Q2,Qs2 and Qo2.

In general, decoherence and noise degrade the entanglement of the channel in a rather complicated way. For example,the initial two-qubit network channel might evolve into a mixed state(Werner state),[40]which is non unitary. A quantum state can not be teleported via the channel with unit fidelity, even if the successful probability is less than unit.[41]Here, we focus on the question whether the teleportation can be achieved with unit fidelity. Therefore,we consider the case that a maximally entangled pure channel still evolves to a pure partially entangled one. Note that for some kinds of unitary noises,[42]such as bit and phase flip noise, the degree of the entanglement of the channel remains unchanged. In this case,the receivers can easily overcome it by performing the proper local Pauli operations at the end of the protocol. For example,while a phase flip noise occurs at any sender’s location in the network channel,any receiver could carry out an extraσzgate to retrieve the teleported state.

5. Conclusion

In summary, in this work, we describe two optimal methods for teleporting a shared quantum secret via a nonmaximally multipartite GHZ state in a quantum network. The unit fidelity transfer of the initial state can be achieved with a calculable probability, which is determined by the degree of entanglement of the channel. For reconstructing the state,an auxiliary qubit is required to be introduced at anyone of the receivers in the first strategy. However, in the second approach, after any sender performs the generalized Bell-state measurement,the state can be recovered with a certain probability without the need for an auxiliary qubit. We will discuss the case that the network channel degrades in a rather complicated way in our future work.

Acknowledgements

Project supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province, China (Grant No. SKLACSS-202108), the Open Research Fund of Key Laboratory of Cryptography of Zhejiang Province, China (Grant No. ZCL21006), the National Natural Science Foundation of China(Grant Nos.U1636106,92046001, 61671087, 61962009, and 61170272), the BUPT Excellent Ph.D.Students Foundation(Grant No.CX2020310),Natural Science Foundation of Beijing Municipality, China(Grant No. 4182006), and the Fundamental Research Funds for the Central Universities,China(Grant No.2019XD-A02).

主站蜘蛛池模板: 亚洲国产无码有码| 波多野结衣一区二区三区88| 国产精品亚洲欧美日韩久久| 免费在线国产一区二区三区精品| 亚欧成人无码AV在线播放| 67194在线午夜亚洲| 亚洲精品手机在线| 国产剧情一区二区| 国产91蝌蚪窝| 潮喷在线无码白浆| 日韩欧美综合在线制服| 99re在线视频观看| 日本妇乱子伦视频| 呦女亚洲一区精品| 亚洲成人在线免费| 国产精品免费入口视频| 国产黑丝一区| 成人午夜亚洲影视在线观看| 92午夜福利影院一区二区三区| 日韩精品无码一级毛片免费| 亚洲精品少妇熟女| 亚洲一区二区在线无码| 亚洲品质国产精品无码| 99这里精品| 91偷拍一区| 高清无码一本到东京热| 欧美日韩在线第一页| 精品国产成人国产在线| 国产日本一线在线观看免费| 欧美亚洲综合免费精品高清在线观看| 国产成人亚洲综合a∨婷婷| 亚洲日韩国产精品综合在线观看| 亚洲中文字幕国产av| 国产精品男人的天堂| 依依成人精品无v国产| 99re精彩视频| 在线色国产| 99成人在线观看| 国产无码高清视频不卡| 手机在线免费不卡一区二| 日韩黄色大片免费看| 国产永久免费视频m3u8| 久久99热这里只有精品免费看| 天堂亚洲网| 黄色片中文字幕| 日韩一区精品视频一区二区| 午夜限制老子影院888| 在线观看免费黄色网址| 呦视频在线一区二区三区| 亚洲日本中文综合在线| yy6080理论大片一级久久| 国产91高清视频| 国产剧情国内精品原创| 特级aaaaaaaaa毛片免费视频| 色综合色国产热无码一| 免费国产好深啊好涨好硬视频| 欧美不卡视频一区发布| 九九热在线视频| 日本在线欧美在线| 精品成人一区二区三区电影 | 国产精品不卡片视频免费观看| 久久特级毛片| 中文字幕色站| 欧美区一区二区三| 欧美A级V片在线观看| 91综合色区亚洲熟妇p| 国产理论最新国产精品视频| 九九九久久国产精品| 偷拍久久网| 精品一区二区三区水蜜桃| 99久视频| 国内熟女少妇一线天| 国产嫖妓91东北老熟女久久一| 色丁丁毛片在线观看| 国产黄色视频综合| 久精品色妇丰满人妻| 黄网站欧美内射| 亚洲专区一区二区在线观看| 亚洲综合亚洲国产尤物| 国产成人乱无码视频| 国产美女在线观看| 成人欧美在线观看|