Quantum information splitting of a two-qubit Bell state using a four-qubit entangled state

  • A scheme is proposed for quantum information splitting of a two-qubit Bell state by using a four-qubit entangled state as a quantum channel. In the scenario, it is supposed that there are three legitimate parties, say Alice, Bob and Charlie. Alice is the sender of quantum information. Bob and Charlie are two agents. Alice first performs GHZ state measurement and tells Bob and Charlie the measurement results via a classical channel. It is impossible for Bob to reconstruct the original state with local operations unless help is obtained from Charlie. If Charlie allows Bob to reconstruct the original state information, he needs to perform a single-qubit measurement and tell Bob the measurement result. Using the measurement results from Alice and Charlie, Bob can reconstruct the original state. We also consider the problem of security attacks. This protocol is considered to be secure.
      PCAS:
  • 加载中
  • [1] Bennett C H, Brassard G. Proc. IEEE Int. Conf. Comput. Syst. Signal Processing. New York: IEEE, 1984. 175[2] Ekert A K. Phys. Rev. Lett., 1991, 67: 661[3] Bennett C H, Brassard G, Mermin N D. Phys. Rev. Lett., 1992, 68: 557[4] DENG F G, LONG L. Phys. Rev. A, 2003, 68: 042315[5] LI X H, DENG F U, ZHOU H Y. Phys. Rev. A, 2008, 78: 022321[6] LI J, SONG D J, GUO X J, JINGB. Chin. Phys. C, 2012, 36: 31[7] HUANG W, WEN Q Y, JIA H, Y, QIN S J, GAO F. Chin. Phys. B, 2012, 21: 100308[8] SUN Z W, DU R G, LONG D Y. Int. J Theor. Phys., 2012, 51: 1946[9] GU B, ZHANG C Y, CHENG G S, HUANG Y G. Sci. China. Phys. Mech. Astron, 2011, 54: 942[10] REN B C, WEI H R. HUA M, LI T, DENG F G. Eur. Phys. J. D, 2013, 67: 30[11] LONG G L, LIU X S. Phys. Rev. A, 2012, 65: 032302[12] DENG F G, LONG G L, LIU X S. Phys. Rev. A, 2003, 68: 042317[13] DENG F G, LONG G L. Phys. Rev. A, 2004, 69: 052319[14] WANG C, DENG F G, LI Y S, LIU X S, LONG G L. Phys. Rev. A, 2005, 71: 044305[15] WANG C, DENG F G, LONG G L. Opt. Commun, 2005, 253: 15[16] ZHU A D, XIA Y, FAN Q B, ZHANG S. Phys. Rev. A, 2006, 73: 022338[17] GAO F, GUO F Z, WEN Q Y, ZHU F C. Sci. China Ser. G Phys. Mech. Astron, 2009, 51: 1853[18] WANG T J, LI T, DU F F, DENG F G. Chin. Phys. Lett., 2011, 28: 040305[19] LIU D, CHEN J L, JIANG W. Int. J. Theor. Phys., 2012, 51: 2923[20] Bennet C H, Brassard G, Crepeau C, Phys. Rev. Letts., 1993, 70: 1895-1899[21] Karlsson A, Bourennane M. Phys. Rev. A, 1998, 58: 4394[22] Gorbachev V N, Trubilko A I, Rodichkina A A. Phys. Lett. A, 2003, 314: 267[23] Agrawal P, Pati A. Phys. Rev. A, 2006, 74: 062320[24] NIE Y Y, HONG Z H, HUANG Y B, YI X J, LI S S. Theor. Phys., 2009, 48: 1485[25] Bouwmeester D. Nature, 1997, 390: 575-579[26] Walther P, Resch K J, Rudolph T, Schenck E, Weinfurter H, Vedral V, Aselmeyer M, Zeilinger A. Nature, 2005, 434: 169-176[27] Sreraman M, Prasanta K P. Phy. Rev. A, 2008, 78: 062333[28] LI Y H, LIU J C, NIE Y Y. Commun. Theor. Phys., 2011, 55: 421-425[29] Ralidharan S, Panigrahi P K. Phys. Rev. A, 2003, 78(6): 062333[30] DENG F G, LI C Y, LI Y S et al. Phy. Rev. A, 1999, 59: 1829-1834[31] Hillery M, Buzek V, BerthiaumeA. Phy. Rev. A, 1999, 59: 1829-1834[32] HOU K, LI Y B, SHI S H. Opt. Commun, 2010, 283: 1961-1965[33] Borras A, Plastino A R, Batle J, Zander C, Casas M. Plastino, 2007, 40: 13407[34] Hillery M, Buzcaronek V, Lacute et al. Phy. Rev. A, 1999, 59: 1829-1834[35] NIE Y Y, HONG Z H, YI B et al. Int J Theor Phys., 2009, 48: 1485-1490[36] NIE Y Y, SANG M H, LI Y H, LIU J C et al. Int. J. Theor. Phys., 2011, 50: 1367[37] NIE Y Y, LI Y H, LIU J C, SANG M H. Opt. Commun, 2011, 284: 1457[38] Jain S, Muralidharan S, Panigrahi P K. Eur. Phy. Lett., 2009, 87: 60008[39] Boyer M, Kenigsberg D, Mor T. Phys. Rev. Lett., 2007, 99(14): 140501[40] Boyer M, Gelles R, Kenigsberg D, Mor T. Phys. Rev. A, 2009, 79(3): 032341[41] ZHAO Z, CHEN Y A, ZHANG A N, YANG T, PAN J W et al. Nature, 2004, 430: 54[42] DENG F G et al. Physics Rev. A, 2005, 72: 044301[43] YIN X F, LIU Y M, ZHANG W, ZHANG Z J. Commun. Theor. Phys., 2010, 53: 49-53[44] NIE Y Y, LI Y H, LIN J C, SANG M H. Quantum Inf. Process, 2011, 10: 603-608[45] YANG C P, CHU S I, HAN S Y. Phys. Rev. A, 2004, 70(2): 022329[46] Choudhury S, Muralidharan S, Panigrahi P K. J. Phys. A, 2009, 42(11): 115303[47] MAN Z X, XIA Y J, AN N B. Phys. Rev. A, 2007, 75(5): 052306[48] Muralidharan S, Panigrahi P K. Phys. Rev. A, 2008, 77(3): 032321[49] DENG F G, LI X H, LI C Y, ZHOU P, ZHOU H Y. Phys. Rev. A, 2005, 72(4): 044301[50] HOU K, LI Y B, SHI S H. Opt. Commun, 2010, 283(9): 1961C1965[51] Muralidharan S, Panigrahi P K. Phys. Rev. A, 2008, 78(6): 062333[52] LI D F, WANG R J, ZHANG F L. Int. J. Theor. Phys., 10.1007/s10773-014-2310-7, 2014, to be published
  • 加载中

Get Citation
LI Dong-Fen, WANG Rui-Jin and ZHANG Feng-Li. Quantum information splitting of a two-qubit Bell state using a four-qubit entangled state[J]. Chinese Physics C, 2015, 39(4): 043103. doi: 10.1088/1674-1137/39/4/043103
LI Dong-Fen, WANG Rui-Jin and ZHANG Feng-Li. Quantum information splitting of a two-qubit Bell state using a four-qubit entangled state[J]. Chinese Physics C, 2015, 39(4): 043103.  doi: 10.1088/1674-1137/39/4/043103 shu
Milestone
Received: 2014-05-13
Revised: 2014-09-23
Article Metric

Article Views(1426)
PDF Downloads(241)
Cited by(0)
Policy on re-use
To reuse of subscription content published by CPC, the users need to request permission from CPC, unless the content was published under an Open Access license which automatically permits that type of reuse.
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Email This Article

Title:
Email:

Quantum information splitting of a two-qubit Bell state using a four-qubit entangled state

    Corresponding author: LI Dong-Fen,
    Corresponding author: WANG Rui-Jin,
    Corresponding author: ZHANG Feng-Li,

Abstract: A scheme is proposed for quantum information splitting of a two-qubit Bell state by using a four-qubit entangled state as a quantum channel. In the scenario, it is supposed that there are three legitimate parties, say Alice, Bob and Charlie. Alice is the sender of quantum information. Bob and Charlie are two agents. Alice first performs GHZ state measurement and tells Bob and Charlie the measurement results via a classical channel. It is impossible for Bob to reconstruct the original state with local operations unless help is obtained from Charlie. If Charlie allows Bob to reconstruct the original state information, he needs to perform a single-qubit measurement and tell Bob the measurement result. Using the measurement results from Alice and Charlie, Bob can reconstruct the original state. We also consider the problem of security attacks. This protocol is considered to be secure.

    HTML

Reference (1)

目录

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return