欢迎登录材料期刊网

材料期刊网

高级检索

基于Bennett等提出的非纠缠的非局域性,提出了两个三态粒子的直积态正交集的性质,即用三个幺正变换能够实现不同的复合空间之间的转换,并且不同的复合空间之间具有关联性.这些性质可以被用于量子通讯和量子密码术.作为这些性质的应用,我们提出了一个量子密钥分配方案以及量子受控通讯的方案.由此说明,将三态粒子的直积态用于量子信息处理,不仅具有大容量、高效率的优点,而且能够保证安全性.

On basis of the nonlocality without entanglement proposed by Bennett, the properties of an orthogonal set of product states of two qutrits are revealed, i.e., the transformation among different composite spaces can be realized by using three unitary operations, and the correlation between two composite spaces is found. These properties can be used to quantum communication and quantum cryptography. As examples, we propose a scheme of controlled quantum secure direct communication and one of quantum key distribution. It is shown that applying the product state of qutrit to quantum information processing not only is of the advantages of large capacity and high efficiency, but ensures the security.

参考文献

[1] Ekert A K,Quantum cryptography based on Bell's theorem[J].Phys.Rev.Lett.,1991,67(6):661-663.
[2] Ribordy G,Brendel J,Gautier J D,et al.Long-distance entanglement-based quantum key distribution[J].Phys.Rev.A,2000,63(1):012309.
[3] Durkin G A,Simon C,Bouwmeester D.Multiphoton entanglement concentration and quantum cryptography[J].Phys.Rev.Lett.,2002,88(18):187902.
[4] Xiao L,et al.Efficient multiparty quantum-secret-sharing schemes[J],Phys.Rev.A,2004,69(5):052307.
[5] Curty M,Lewenstein M,Lütkenhaus N.Entanglement as a precondition for secure quantum key distribution[J].Phys.Rev.Lett.,2004,92(21):217903.
[6] Brandt H E.Quantum-cryptographic entangling probe[J],Phys.Rev.A,2005,71(4):042312.
[7] Lee J,Lee S,Kim J,et al.Entanglement swapping secures multiparty quantum communication[J].Phys.Rev.A,2004,70(3):032305.
[8] Bagan E,Baig M,Mu(n)oz-Tapia R.Entanglement-assisted alignment of reference frames using a dense covariant coding[J].Phys.Rev.A,2004,69(5):050303.
[9] Bennett C H,Brassard G,Crepeau C,et al.Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels[J].Phys.Rev.Lett.,1993,70(13):1895-1899.
[10] Ghosh S,et al.Entanglement teleportation via Bell mixtures[J].Phys.Rev.A,2002 66(2):024301.
[11] Lu H,Guo G C,Teleportation of a two-particle entangled state via entanglement swapping[J].Phys.Lett.A,2000,276(2):209-212.
[12] Xiong K W,Ye L,Zhang W,et al.Teleportation of a two-qubit unknown atomic state through the Raman interaction of Λ-type three-level atom with a coherent state cavity-field[J].Chinese Journal of Quantum Electronics(量子电子学报),2004,21(4):464-467 (in Chinese).
[13] Bennett C H,Brassard G.Quantum cryptography:public key distribution and coin tossing[C].Proc.IEEE Int.Conf.on Computers,Systems and Signal Processing,Bangalore,India IEEE,New York:1984,175-179.
[14] Bennett C H,Brassard G,Mermin N D.Quantum cryptography without Bell's theorem[J].Phys.Rev.Lett.,1992,68(5):557-559.
[15] Goldenberg L,Vaidman L.Quantum cryptography based on orthogonal states[J].Phys.Rev.Lett.,1995,75(7):1239-1243.
[16] Koashi M,Imoto N.Quantum cryptography based on split transmission of one-bit information in two steps[J].Phys.Rev.Lett.,1997,79(12):2383-2386.
[17] Cabello A.Quantum key distribution without alternative measurements[J].Phys.Rev.A,2000,61(5):052312.
[18] Cabello A.Quantum key distribution in the holevo limit[J].Phys.Rev.Lett.,2000,85(26):5635-5638.
[19] Liu Y,Ou H M,Liu W Y,et al.Scheme design and improvement of quantum key distribution network[J].Chinese Journal Quantum Electronics (量子电子学报),2005,22(5):699-703 (in Chinese).
[20] Beige A,Englert BG,Kurtsiefer Ch,et al.Secure communication with a publicly known key[J].Acta Phys.Pol.A,2002,101(3):357-371.
[21] Bostr(o)em K,Felbinger T.Deterministic secure direct communication using entanglement[J].Phys.Rev.Lett.,2002,89(18):187902.
[22] Bennett C H,Divincenzo D P,Fuchs C A,et al.Quantum nonlocality without entanglement[J].Phys.Rev.A,1999,59(2):1070-1091.
[23] Karimipour1 V,Bahraminasab A,Bagherinezhad S.Quantum key distribution for d-level systems with generalized Bell states[J].Phys.Rev.A,2002,65(5):052331.
[24] Ac(i)n A,Durt T,Gisin N,et al.Quantum nonlocality in two three-level systems[J].Phys.Rev.A,2002,65(5):052325.
[25] Boileau J C,Tamaki K,Batuwantudawe J,et al.Unconditional security of a three state quantum key distribution protocol[J].Phys.Rev.Lett.,2005,94(4):040503.
[26] Tittel W,Weihs G.Photonic entanglement for fundamental tests and quantum communication[J].Quantum Inf.Comput.,2001,1(2):3.
[27] Zeilinger A,Zukowski M,Horne M A,et al.in Fundamental Aspects of Quantum Theory[M].edited by J.Anandan and J.L.Safko (World Scientific,Singapore,1993); Zukowski M,Zeilinger A,Horne M A.Realizable higher-dimensional two-particle entanglements via multiport beam splitters[J].Phys.Rev.A,1997,55(4):2564-2579.
[28] Zeilinger A,Zukowski M,Horne M A,et al.in Fundamental Aspects of Quantum Theory[M].edited by J.Anandan and J.L.Safko (World Scientific,Singapore,1993); Zukowski M,Zeilinger A,Horne M A.Realizable higher-dimensional two-particle entanglements via multiport beam splitters[J].Phys.Rev.A,1997,55(4):2564-2579.
[29] Guo G P,Li C F,Shi B S,Li J,et al.Quantum key distribution scheme with orthogonal product states[J].Phys.Rev.A,2001,64(4):042301.
[30] Hsu L Y,Li C M.Quantum secret sharing using product states[J].Phys.Rev.A,2005,71(2):022321.
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%