Loading [MathJax]/jax/output/CommonHTML/jax.js
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    A threshold multi-verifier quantum signature scheme based on localizable distinguishability of GHZ states

    In this paper, we propose a new quantum signature protocol with identity-based threshold multiple verifiers. In this protocol, first, the signature process combines the HMAC hash function with the participant identity to realize the compression encryption of the signature message, at the same time, the signature particles are encoded and generated by selecting the 3-particle GHZ state of the C2C2C2 spatially localizable distinguished (LOCC), which avoids the complex entanglement operation and effectively improves the signature efficiency; second, it takes at least t verifying members of the set of valid verifications specified by the signer to verify the validity of the final signature, which increases the utility of the signature protocol in multi-verification scenarios; finally, the security analysis shows that the proposed threshold multiparty verifiable quantum signature protocol scheme can resist entanglement measurement attacks, intercept retransmission attacks, and at the same time be unforgeable, nonrepudiable, and traceable. Most importantly, the protocol does not require Quantum One-Way Function (QOWF), Quantum State Swap Test (SWAP), and has no complex entanglement operations. Therefore, the proposed scheme is more efficient than similar multiparty signature protocols.

  • articleNo Access

    Continuous-variable multiparty quantum key agreement based on third party

    General quantum key agreement (QKA) protocols require each participant to make the same contribution to the generation of a shared key, but this situation cannot meet the needs of government or military which require a third party only to control key agreement process. This paper proposed a continuous-variable quantum key agreement (CVQKA) protocol with multi-party Greenberg–Horne–Zeilinger (GHZ) entangled states generated by a third party. The third party prepares quantum states by sending multi-photon beam with higher emission frequency and stronger signal. Taking continuous variable as carrier, the information carried by each carrier increases, which improves the security key rate. In this paper, the third party controls but does not contribute to the final key. After receiving the states, each participant encodes his or her own key, adds a decoy state and sends it to the next participant, until receiving the quantum state that was encoded by all the participants. Then, participants can measure and calculate to get the final shared key. It shows that our protocol is easy to implement and has high efficiency. Security analysis shows that our protocol can resist collusion attacks, beam splitter attack, etc.

  • articleNo Access

    Controlled quantum key agreement based on maximally three-qubit entangled states

    In this paper, we propose a two-party and a three-party controlled quantum key agreement (QKA) protocols with three-qubit GHZ states and Bell measurements. Compared with previous protocols, the significant change of our schemes is that a supervisor is introduced for controlling the agreement process to improve the controllability. Moreover, our protocols ensure each communication participant contribute equally to the agreement keys, and all participants can negotiate the shared keys without exchanging classical bits between them. The performance analysis shows that our protocols can be immune to outsider and participant attack.

  • articleNo Access

    Stochastic Path Model of Polaroid Polarizer for Bell's Theorem and Triphoton Experiments

    Depending on the outcome of the triphoton experiment now underway, it is possible that the new local realistic Markov Random Field (MRF) models will be the only models now available to correctly predict both that experiment and Bell's theorem experiments. The MRF models represent the experiments as graphs of discrete events over space-time. This paper extends the MRF approach to continuous time, by defining a new class of realistic model, the stochastic path model, and showing how it can be applied to ideal polaroid type polarizers in such experiments. The final section discusses possibilities for future research, ranging from uses in other experiments or novel quantum communication systems, to extensions involving stochastic paths in the space of functions over continuous space. As part of this, it derives a new Boltzmann-like density operator over Fock space, which predicts the emergent statistical equilibria of nonlinear Hamiltonian field theories, based on our previous work of extending the Glauber–Sudarshan P mapping from the case of classical systems described by a complex state variable α to the case of classical continuous fields. This extension may explain the stochastic aspects of quantum theory as the emergent outcome of nonlinear PDE in a time-symmetric universe.

  • articleNo Access

    PERFECT TELEPORTATION OF UNKNOWN QUDIT BY A d-LEVEL GHZ CHANNEL

    In the past decades, various schemes of teleportation of quantum states through different types of quantum channels (a prior shared entangled state between the sender and the receiver), e.g. EPR pairs, generalized Bell states, qubit GHZ states, standard W states and its variations, genuine multiqubit entanglement states, etc., have been developed. Recently, three-qutrit quantum states and two-qudit quantum states have also been considered as quantum channels for teleportation. In this paper, we investigate the teleportation of an unknown qudit using a d level GHZ state, i.e. a three-qudit maximally entangled state, as quantum channel. We design a general scheme of faithful teleportation of an unknown qudit using a d-level GHZ state shared between the sender and the receiver, or among the sender, the receiver and the controller; an unknown two-qudit of Schmidt form using a d level GHZ state shared between the sender and the receiver; as well as an unknown arbitrary two-qudit using two shared d level GHZ states between the sender, the receiver and the controller, or using one shared d level GHZ state and one shared generalized Bell state. We obtain the general formulas of Alice's measurement basis, Charlie's measurement basis and Bob's unitary operations to recover the input state of Alice. It is intuitionistic to generalize the protocols of teleporting an arbitrary two-qudit state to teleporting an arbitrary n-qudit state.

  • articleNo Access

    SECURITY OF MULTIPARTY QUANTUM SECRET SHARING WITH MULTIQUBIT GHZ STATES

    We study the security of multiparty quantum secret sharing (QSS) with multiqubit Greenberger–Horne–Zeilinger states. We give a detailed proof that the original scheme of Xiao et al. [Phys. Rev. A69 (2004) 052307] is insecure against the interior attack (i.e. the participants' attack) which is the most serious threat for QSS protocols. Thereafter, an improvement of this QSS protocol is proposed.

  • articleNo Access

    SCHEME FOR GENERATION OF GREENBERGER-HORNE-ZEILINGER STATES OF REMOTE ATOMS TRAPPED IN SEPARATE OPTICAL CAVITIES

    We propose a scheme for generating maximally entangled states for three atoms trapped in three distant cavities connected by two identical single-mode fibers. During the operation, neither the atomic system nor the fibers are excited, which is important in view of decoherence. Under certain conditions, the probability of the excited cavities can be negligible. Taking advantage of adiabatic passage, the GHZ state can be generated deterministically, and the fidelity of entanglement is insensitive to fluctuation of experimental parameters. Compared to the previous schemes, the significant advantage of the proposed scheme is that each cavity can interact with the other two directly, which can avoid the effect of indirect interaction brought about using only local quantum operator and nonlocal resources.

  • articleNo Access

    Study of controlled dense coding with some discrete tripartite and quadripartite states

    The paper presents a detailed study of controlled dense coding scheme for different types of three and four-particle states. It consists of GHZ state, GHZ type states, maximal slice (MS), state, 4-particle GHZ state and W class of states. It is shown that GHZ-type states can be used for controlled dense coding in a probabilistic sense. We have shown relations among parameter of GHZ type state, concurrence of the shared bipartite state by two parties with respect to GHZ type and Charlie's measurement angle θ. The GHZ states as a special case of MS states, depending on parameters, have also been considered here. We have seen that tripartite W state and quadripartite W state cannot be used in controlled dense coding whereas |WnABC states can be used probabilistically. Finally, we have investigated controlled dense coding scheme for tripartite qutrit states.

  • articleNo Access

    The role of localizable concurrence in quantum teleportation protocols

    Teleporting an unknown qubit state is a paradigmatic quantum information processing task revealing the advantage of quantum communication protocols over their classical counterpart. For a teleportation protocol using a Bell state as quantum channel, the resource has been identified to be the concurrence. However, for mixed multipartite states the lack of computable entanglement measures has made the identification of the quantum resource responsible for this advantage more challenging. Here, by building on previous results showing that localizable concurrence is the necessary resource for controlled quantum teleportation, we show that any teleportation protocol using an arbitrary multipartite state, that includes a Bell measurement, requires a nonvanishing localizable concurrence between two of its parties to perform better than the classical protocol. By first analyzing Greenberger–Horne–Zeilinger (GHZ) channel and GHZ measurement teleportation protocol, in the presence of GHZ-symmetric-preserving noise, we compare different multipartite entanglement measures with the fidelity of teleportation, and we find that the protocol performs better than the classical protocol when all multipartite entanglement measures vanish, except for the localizable concurrence. Finally, we extend our proof to an arbitrary teleportation protocol with an arbitrary multipartite entangled channel.

  • articleNo Access

    Classifying entanglement by algebraic geometry

    Quantum Entanglement is one of the key manifestations of quantum mechanics that separate the quantum realm from the classical one. Characterization of entanglement as a physical resource for quantum technology became of uppermost importance. While the entanglement of bipartite systems is already well understood, the ultimate goal to cope with the properties of entanglement of multipartite systems is still far from being realized. This paper covers characterization of multipartite entanglement using algebraic-geometric tools. First, we establish an algorithm to classify multipartite entanglement by k-secant varieties of the Segre variety and -multilinear ranks that are invariant under Stochastic Local Operations with Classical Communication (SLOCC). We present a fine-structure classification of multiqubit and tripartite entanglement based on this algorithm. Another fundamental problem in quantum information theory is entanglement transformation that is quite challenging regarding to multipartite systems. It is captivating that the proposed entanglement classification by algebraic geometry can be considered as a reference to study SLOCC and asymptotic SLOCC interconversions among different resources based on tensor rank and border rank, respectively. In this regard, we also introduce a new class of tensors that we call persistent tensors and construct a lower bound for their tensor rank. We further cover SLOCC convertibility of multipartite systems considering several families of persistent tensors.

  • chapterNo Access

    Chapter 4: EPR Pair and Measurement

      In the 1920s when quantum mechanics was being established, there was a famous controversy between Bohr and Einstein about the statistical interpretation of quantum mechanics. The controversy was finally concluded by an emphatic victory of Bohr, since his statistical interpretation and the duality of wave and particle explained many experimental facts without any difficulty. The “Gedanken” experiment on two entangled particles (the EPR pair) presented by Einstein, Podolski and Rosen in the course of the controversy, however, has had a continuous influence for many years on quantum communication and quantum cryptography which are being developed at the present day.

    • chapterNo Access

      EPR Pair and Measurement

        The following sections are included:

        • EPR pair
        • Transmission of quantum states
        • Einstein's locality principle in quantum mechanics
        • Measurement of two correlated particles and hidden variable theorem
          • CHSH inequality
          • Classical correlation vs. quantal correlation: a case of nuclear fission
        • EPR experiment by photon pairs
        • Four-photon GHZ states
        • Problems

      • chapterNo Access

        DISCRIMINATION OF QUANTUM STATES BY LOCAL OPERATION AND CLASSICAL COMMUTATION

        It is well know that orthogonal quantum states are shared by spatially separated parties, and then the discrimination of these states is very different from the fact that orthogonal quantum states always can be perfectly discriminated. The aim of this paper is to discuss problems of quantum state can be distinguished and cannot be distinguished by LOCC. First, we get two necessary conditions for the quantum states shared by two parties can be accurately distinguished, second, followed by construction of the non-LOCC distinguished subspace, and one set of four and pure states that is undistinguished by LOCC the was constructed, also this result is extended to the subspace of N elements.