Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-sp...Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.展开更多
Assisted by multipartite entanglement, Quantum information may be split so that the original qubit can be reconstructed if and only if the recipients cooperate. This paper proposes an experimentally feasible scheme fo...Assisted by multipartite entanglement, Quantum information may be split so that the original qubit can be reconstructed if and only if the recipients cooperate. This paper proposes an experimentally feasible scheme for splitting quantum information via W-type entangled states in cavity QED systems, where three-level Rydberg atoms interact with nonresonant cavities. Since W-type states are used as the quantum channel and the cavities are only virtually excited, the scheme is easy to implement and robust against decoherence, and the dependence on the quality factor of the cavities is greatly reduced.展开更多
Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit stat...Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit state. In this scheme, the sender transmits the two-qubit secret state to three agents who are divided into two grades with two Bell-state measurements,and broadcasts the measurement results via a classical channel. One agent is in the upper grade and two agents are in the lower grade. The agent in the upper grade only needs to cooperate with one of the other two agents to recover the secret state but both of the agents in the lower grade need help from all of the agents. Every agent who wants to recover the secret state needs to introduce two ancillary qubits and performs a positive operator-valued measurement(POVM) instead of the usual projective measurement. Moreover, due to the symmetry of the cluster state, we extend this protocol to multiparty agents.展开更多
Quantum teleportation with entanglement channels and a series of two-qubit SWAP gates between the nearestneighbor qubits are usually utilized to achieve the transfers of unknown quantum state from the sender to the di...Quantum teleportation with entanglement channels and a series of two-qubit SWAP gates between the nearestneighbor qubits are usually utilized to achieve the transfers of unknown quantum state from the sender to the distant receiver. In this paper, by simplifying the usual SWAP gates we propose an approach to speed up the transmissions of unknown quantum information, specifically including the single-qubit unknown state and two-qubit unknown entangled ones,by a series of entangling and disentangling operations between the remote qubits with distant interactions. The generic proposal is demonstrated specifically with experimentally-existing Ising-type quantum channels without transverse interaction; liquid NMR-molecules driven by global radio frequency electromagnetic pulses and capacitively-coupled Josephson circuits driven by local microwave pulses. The proposal should be particularly useful to set up the connections between the distant qubits in a chip of quantum computing.展开更多
We develop a design of a hybrid quantum interface for quantum information transfer (QIT), adopting a nanome- chanical resonator as the intermedium, which is magnetically coupled with individual nitrogen-vacancy cent...We develop a design of a hybrid quantum interface for quantum information transfer (QIT), adopting a nanome- chanical resonator as the intermedium, which is magnetically coupled with individual nitrogen-vacancy centers as the solid qubits, while eapacitively coupled with a coplanar waveguide resonator as the quantum data bus. We describe the Hamiltonian of the model, and analytically demonstrate the QIT for both the resonant interaction and large detuning cases. The hybrid quantum interface allows for QIT between arbitrarily selected individual nitrogen-vacancy centers, and has advantages of the sealability and controllability. Our methods open an alter- native perspective for implementing QIT, which is important during quantum storing or processing procedures in quantum computing.展开更多
We propose an arbitrary controlled-unitary (CU) gate and a bidirectional transfer scheme of quantum information (BTQI) for unknown photons. The proposed CU gate utilizes quantum non-demolition photon-number-resolv...We propose an arbitrary controlled-unitary (CU) gate and a bidirectional transfer scheme of quantum information (BTQI) for unknown photons. The proposed CU gate utilizes quantum non-demolition photon-number-resolving measure- ment based on the weak cross-Kerr nonlinearities (XKNLs) and two quantum bus beams; the proposed CU gate consists of consecutive operations of a controlled-path gate and a gathering-path gate. It is almost deterministic and is feasible with current technology when a strong amplitude of the coherent state and weak XKNLs are employed. Compared with the existing optical multi-qubit or controlled gates, which utilize XKNLs and homodyne detectors, the proposed CU gate can increase experimental realization feasibility and enhance robustness against decoherence. According to the CU gate, we present a BTQI scheme in which the two unknown states of photons between two parties (Alice and Bob) are mutually swapped by transferring only a single photon. Consequently, by using the proposed CU gate, it is possible to experimentally implement the BTQI scheme with a certain probability of success.展开更多
The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical ke...The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical key generation rate in the presence of fluctuation of the dark count rate, and compare the result with the result of the decoy-state without fluctuation. It is found that the key generation rate and maximal secure distance will be decreased under the influence of the fluctuation of the dark count rate.展开更多
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep...We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information.展开更多
A strong and stable correlation in quantum information is of high quality for quantum information processing.We define two quantities,selective average correlation and ripple coefficient,to evaluate the quality of cor...A strong and stable correlation in quantum information is of high quality for quantum information processing.We define two quantities,selective average correlation and ripple coefficient,to evaluate the quality of correlation in quantum information in a time interval.As a new communication channel,Heisenberg spin chains are widely investigated.We select a two-qubit Heisenberg XXZs pin chain with Dzyaloshinskii-Moriya interaction in an inhomogeneous magnetic field as an example,and use the two quantities to evaluate the qualities of the correlation in quantum information with different measures.The result shows that,if the time evolutions are similar,there needs only evaluating one of them to know when the correlation has high quality for quantum information processing.展开更多
The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which off...The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which offers unconditional security based on some principles of quantum mechanics, has become a significant branch and hotspot in the field of modern cryptography research. In this paper, we review the research and development of several important and well-studied branches of quantum cryptography in terms of theory and experiment, including quantum key distribution, quantum secret sharing, quantum secure direct communication, quantum signature, and quantum private query. We also briefly review the research and development of some other branches which are currently in the stage of theoretical research but receive widespread concern from academia, including quantum private comparison, quantum anonymous voting, quantum secure multi-party summation, quantum sealed-bid auction, quantum public key cryptosystem, quantum key agreement, quantum dialogue, and quantum identity authentication. In addition, we discuss some open issues and future research directions for the branches referred to above.展开更多
Utilizing both the general quantum teleportation and the two-step protocol, a new method is presented by which multi-qubit quantum information can be teleported in a much easier way from a sender Alice to a receiver B...Utilizing both the general quantum teleportation and the two-step protocol, a new method is presented by which multi-qubit quantum information can be teleported in a much easier way from a sender Alice to a receiver Bob via the control of many agents in a network than by Yang et al's method. In this method, only all the agents collaborate with Bob can the unknown states in Alice's qubits be fully reconstructed in Bob's qubits. Comparisons between the method and Yang et al's method are made. Results show that, in this method, the preparation difficulty of initial states and the identification difficulty of entangled states are considerably reduced, new method is more feasible in technique, and Hadamard operations are not needed at all.展开更多
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security thr...Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security.展开更多
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an...Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.展开更多
We investigate a planar ion chip design with a two-dimensional array of linear ion traps for scalable quantum information processing. Qubits are formed from the internal electronic states of trapped ^40Ca^+ ions. The...We investigate a planar ion chip design with a two-dimensional array of linear ion traps for scalable quantum information processing. Qubits are formed from the internal electronic states of trapped ^40Ca^+ ions. The segmented electrodes reside in a single plane on a substrate and a grounded metal plate separately, a combination of appropriate rf and DC potentials is applied to them for stable ion confinement. Every two adjacent electrodes can generate a linear ion trap in and between the electrodes above the chip at a distance dependent on the geometrical scale and other considerations. The potential distributions are calculated by using a static electric field qualitatively. This architecture provides a conceptually simple avenue to achieving the microfabrication and large-scale quantum computation based on the arrays of trapped ions.展开更多
Effective Hamiltonian method is widely used in quantum information. We introduce a method to calculate effective Hamiltonians and give two examples in quantum information to demonstrate the method. We also give a rela...Effective Hamiltonian method is widely used in quantum information. We introduce a method to calculate effective Hamiltonians and give two examples in quantum information to demonstrate the method. We also give a relation between the effective Hamiltonian in the Shr?dinger picture and the corresponding effective Hamiltonian in the interaction picture.Finally, we present a relation between our effective Hamiltonian method and the James–Jerke method which is currently used by many authors to calculate effective Hamiltonians in quantum information science.展开更多
This paper proposes a simple scheme for realizing one-qubit and two-qubit quantum gates as well as multiqubit entanglement based on de-SQUID charge qubits through the control of their coupling to a 1D transmission lin...This paper proposes a simple scheme for realizing one-qubit and two-qubit quantum gates as well as multiqubit entanglement based on de-SQUID charge qubits through the control of their coupling to a 1D transmission line resonator (TLR). The TLR behaves effectively as a quantum data-bus mode of a harmonic oscillator, which has several practical advantages including strong coupling strength, reproducibility, immunity to 1/f noise, and suppressed spontaneous emission. In this protocol, the data-bus does not need to stay adiabatically in its ground state, which results in not only fast quantum operation, hut also high-fidelity quantum information processing. Also, it elaborates the transfer process with the 1D transmission line.展开更多
A protocol is proposed to generate atomic entangled states and implement quantum information transfer in a cavity quantum electrodynamics system. It utilizes Raman transitions or stimulated Raman adiabatic passages be...A protocol is proposed to generate atomic entangled states and implement quantum information transfer in a cavity quantum electrodynamics system. It utilizes Raman transitions or stimulated Raman adiabatic passages between two systems to entangle the ground states of two three-state A-type atoms trapped in a single mode cavity. It does not need the measurements on cavity field nor atomic detection and can be implemented in a deterministic fashion. Since the present protocol is insensitive to both cavity decay and atomic spontaneous emission, it may have some interesting applications in quantum information processing.展开更多
We describe a new electrode design for a grooved surface-electrode ion trap,which is fabricated in printed-circuitboard technology with segmented electrodes.This design allows a laser beam to get through the central g...We describe a new electrode design for a grooved surface-electrode ion trap,which is fabricated in printed-circuitboard technology with segmented electrodes.This design allows a laser beam to get through the central groove to avoid optical access blocking and laser scattering from the ion trap surface.The confining potentials are modeled both analytically and numerically.We optimize the radio frequency(rf) electrodes and dc electrodes to achieve the maximum trap depth for a given ion height above the trap electrodes.We also compare our design with the reality ion chip MI I for practical considerations.Comparison results show that our design is superior to MI I.This ion trap design may form the basis for large scale quantum computers or parallel quadrupole mass spectrometers.展开更多
We propose a new quantum watermarking scheme based on threshold selection using informational entropy of quantum image.The core idea of this scheme is to embed information into object and background of cover image in ...We propose a new quantum watermarking scheme based on threshold selection using informational entropy of quantum image.The core idea of this scheme is to embed information into object and background of cover image in different ways.First,a threshold method adopting the quantum informational entropy is employed to determine a threshold value.The threshold value can then be further used for segmenting the cover image to a binary image,which is an authentication key for embedding and extraction information.By a careful analysis of the quantum circuits of the scheme,that is,translating into the basic gate sequences which show the low complexity of the scheme.One of the simulation-based experimental results is entropy difference which measures the similarity of two images by calculating the difference in quantum image informational entropy between watermarked image and cover image.Furthermore,the analyses of peak signal-to-noise ratio,histogram and capacity of the scheme are also provided.展开更多
Quantum information processing is an active cross-disciplinary field drawing upon theoretical and experimental physics, computer science, engineering, mathematics, and material science. Its scope ranges from fundament...Quantum information processing is an active cross-disciplinary field drawing upon theoretical and experimental physics, computer science, engineering, mathematics, and material science. Its scope ranges from fundamental issues in quantum physics to prospective commercial exploitation by the computing and communications industries.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant No 60872052)
文摘Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.
基金Project supported by the National Natural Science Foundation of China (Grant No 60677044)the Funds for Introduced Talent of Ocean University of China
文摘Assisted by multipartite entanglement, Quantum information may be split so that the original qubit can be reconstructed if and only if the recipients cooperate. This paper proposes an experimentally feasible scheme for splitting quantum information via W-type entangled states in cavity QED systems, where three-level Rydberg atoms interact with nonresonant cavities. Since W-type states are used as the quantum channel and the cavities are only virtually excited, the scheme is easy to implement and robust against decoherence, and the dependence on the quality factor of the cavities is greatly reduced.
基金Project supported by the National Natural Science Foundation of China(Grant No.61671087)
文摘Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit state. In this scheme, the sender transmits the two-qubit secret state to three agents who are divided into two grades with two Bell-state measurements,and broadcasts the measurement results via a classical channel. One agent is in the upper grade and two agents are in the lower grade. The agent in the upper grade only needs to cooperate with one of the other two agents to recover the secret state but both of the agents in the lower grade need help from all of the agents. Every agent who wants to recover the secret state needs to introduce two ancillary qubits and performs a positive operator-valued measurement(POVM) instead of the usual projective measurement. Moreover, due to the symmetry of the cluster state, we extend this protocol to multiparty agents.
基金partly supported by the National Natural Science Foundation of China(Grant No.U1330201)
文摘Quantum teleportation with entanglement channels and a series of two-qubit SWAP gates between the nearestneighbor qubits are usually utilized to achieve the transfers of unknown quantum state from the sender to the distant receiver. In this paper, by simplifying the usual SWAP gates we propose an approach to speed up the transmissions of unknown quantum information, specifically including the single-qubit unknown state and two-qubit unknown entangled ones,by a series of entangling and disentangling operations between the remote qubits with distant interactions. The generic proposal is demonstrated specifically with experimentally-existing Ising-type quantum channels without transverse interaction; liquid NMR-molecules driven by global radio frequency electromagnetic pulses and capacitively-coupled Josephson circuits driven by local microwave pulses. The proposal should be particularly useful to set up the connections between the distant qubits in a chip of quantum computing.
基金Supported by the National Natural Science Foundation of China under Grant No 11305021the Fundamental Research Funds for the Central Universities of China under Grants Nos 3132014229 and 3132014328
文摘We develop a design of a hybrid quantum interface for quantum information transfer (QIT), adopting a nanome- chanical resonator as the intermedium, which is magnetically coupled with individual nitrogen-vacancy centers as the solid qubits, while eapacitively coupled with a coplanar waveguide resonator as the quantum data bus. We describe the Hamiltonian of the model, and analytically demonstrate the QIT for both the resonant interaction and large detuning cases. The hybrid quantum interface allows for QIT between arbitrarily selected individual nitrogen-vacancy centers, and has advantages of the sealability and controllability. Our methods open an alter- native perspective for implementing QIT, which is important during quantum storing or processing procedures in quantum computing.
文摘We propose an arbitrary controlled-unitary (CU) gate and a bidirectional transfer scheme of quantum information (BTQI) for unknown photons. The proposed CU gate utilizes quantum non-demolition photon-number-resolving measure- ment based on the weak cross-Kerr nonlinearities (XKNLs) and two quantum bus beams; the proposed CU gate consists of consecutive operations of a controlled-path gate and a gathering-path gate. It is almost deterministic and is feasible with current technology when a strong amplitude of the coherent state and weak XKNLs are employed. Compared with the existing optical multi-qubit or controlled gates, which utilize XKNLs and homodyne detectors, the proposed CU gate can increase experimental realization feasibility and enhance robustness against decoherence. According to the CU gate, we present a BTQI scheme in which the two unknown states of photons between two parties (Alice and Bob) are mutually swapped by transferring only a single photon. Consequently, by using the proposed CU gate, it is possible to experimentally implement the BTQI scheme with a certain probability of success.
基金Supported by the National Natural Science Foundation of China under Grant No 10504042.
文摘The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical key generation rate in the presence of fluctuation of the dark count rate, and compare the result with the result of the decoy-state without fluctuation. It is found that the key generation rate and maximal secure distance will be decreased under the influence of the fluctuation of the dark count rate.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61301171 and 61372076the Fundamental Research Funds for the Central Universities of China under Grant No K5051301018the National 111 Project of Higher Education of China under Grant No B8038
文摘We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information.
基金Supported by the National Natural Science Foundation of China(11075013,11375025)
文摘A strong and stable correlation in quantum information is of high quality for quantum information processing.We define two quantities,selective average correlation and ripple coefficient,to evaluate the quality of correlation in quantum information in a time interval.As a new communication channel,Heisenberg spin chains are widely investigated.We select a two-qubit Heisenberg XXZs pin chain with Dzyaloshinskii-Moriya interaction in an inhomogeneous magnetic field as an example,and use the two quantities to evaluate the qualities of the correlation in quantum information with different measures.The result shows that,if the time evolutions are similar,there needs only evaluating one of them to know when the correlation has high quality for quantum information processing.
基金supported by the State Key Program of National Natural Science of China No. 61332019the Major State Basic Research Development Program of China (973 Program) No. 2014CB340601+2 种基金the National Science Foundation of China No. 61202386, 61402339the National Cryptography Development Fund No. MMJJ201701304the Science and Technology Research Project of Hebei higher education No. QN2017020
文摘The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which offers unconditional security based on some principles of quantum mechanics, has become a significant branch and hotspot in the field of modern cryptography research. In this paper, we review the research and development of several important and well-studied branches of quantum cryptography in terms of theory and experiment, including quantum key distribution, quantum secret sharing, quantum secure direct communication, quantum signature, and quantum private query. We also briefly review the research and development of some other branches which are currently in the stage of theoretical research but receive widespread concern from academia, including quantum private comparison, quantum anonymous voting, quantum secure multi-party summation, quantum sealed-bid auction, quantum public key cryptosystem, quantum key agreement, quantum dialogue, and quantum identity authentication. In addition, we discuss some open issues and future research directions for the branches referred to above.
基金Project supported by the National Natural Science Foundation of China (Grant No 10304022).
文摘Utilizing both the general quantum teleportation and the two-step protocol, a new method is presented by which multi-qubit quantum information can be teleported in a much easier way from a sender Alice to a receiver Bob via the control of many agents in a network than by Yang et al's method. In this method, only all the agents collaborate with Bob can the unknown states in Alice's qubits be fully reconstructed in Bob's qubits. Comparisons between the method and Yang et al's method are made. Results show that, in this method, the preparation difficulty of initial states and the identification difficulty of entangled states are considerably reduced, new method is more feasible in technique, and Hadamard operations are not needed at all.
文摘Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security.
基金supported by the National Natural Science Foundation of China(Grant Nos.61303199,61272514,61170272,61121061,and 61411146001)the Shandong Provincial Natural Science Foundation of China(Grant Nos.ZR2013FM025,ZR2013FQ001,and ZR2014FM003)+4 种基金the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China(Grant Nos.BS2013DX010 and BS2014DX007)the Program for New Century Excellent Talents in Universities,China(Grant No.NCET-13-0681)the National Development Foundation for Cryptological Research,China(Grant No.MMJJ201401012)the Fok Ying Tong Education Foundation,China(Grant No.131067)the Shandong Academy of Sciences Youth Fund Project,China(Grant No.2013QN007)
文摘Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.
基金Project supported by the Shanghai Pujiang Programme and the National Basic Research Programme of China (Grant No 2006CB921202)
文摘We investigate a planar ion chip design with a two-dimensional array of linear ion traps for scalable quantum information processing. Qubits are formed from the internal electronic states of trapped ^40Ca^+ ions. The segmented electrodes reside in a single plane on a substrate and a grounded metal plate separately, a combination of appropriate rf and DC potentials is applied to them for stable ion confinement. Every two adjacent electrodes can generate a linear ion trap in and between the electrodes above the chip at a distance dependent on the geometrical scale and other considerations. The potential distributions are calculated by using a static electric field qualitatively. This architecture provides a conceptually simple avenue to achieving the microfabrication and large-scale quantum computation based on the arrays of trapped ions.
基金Project supported by the National Natural Science Foundation of China(Grant No.11674059)
文摘Effective Hamiltonian method is widely used in quantum information. We introduce a method to calculate effective Hamiltonians and give two examples in quantum information to demonstrate the method. We also give a relation between the effective Hamiltonian in the Shr?dinger picture and the corresponding effective Hamiltonian in the interaction picture.Finally, we present a relation between our effective Hamiltonian method and the James–Jerke method which is currently used by many authors to calculate effective Hamiltonians in quantum information science.
基金supported by Hunan Provincial Natural Science Foundation of China (Grant No 06JJ50014)the Key Project Foundation of the Education Commission of Hunan Province of China (Grant No 06A055)
文摘This paper proposes a simple scheme for realizing one-qubit and two-qubit quantum gates as well as multiqubit entanglement based on de-SQUID charge qubits through the control of their coupling to a 1D transmission line resonator (TLR). The TLR behaves effectively as a quantum data-bus mode of a harmonic oscillator, which has several practical advantages including strong coupling strength, reproducibility, immunity to 1/f noise, and suppressed spontaneous emission. In this protocol, the data-bus does not need to stay adiabatically in its ground state, which results in not only fast quantum operation, hut also high-fidelity quantum information processing. Also, it elaborates the transfer process with the 1D transmission line.
基金Project supported by the National Basic Research Program of China (Grant No.2010CB923102)the National Natural Science Foundation of China (Grant No.11074199)
文摘A protocol is proposed to generate atomic entangled states and implement quantum information transfer in a cavity quantum electrodynamics system. It utilizes Raman transitions or stimulated Raman adiabatic passages between two systems to entangle the ground states of two three-state A-type atoms trapped in a single mode cavity. It does not need the measurements on cavity field nor atomic detection and can be implemented in a deterministic fashion. Since the present protocol is insensitive to both cavity decay and atomic spontaneous emission, it may have some interesting applications in quantum information processing.
基金Project supported by the National Natural Science Foundation of China (Grant No. 1097421)
文摘We describe a new electrode design for a grooved surface-electrode ion trap,which is fabricated in printed-circuitboard technology with segmented electrodes.This design allows a laser beam to get through the central groove to avoid optical access blocking and laser scattering from the ion trap surface.The confining potentials are modeled both analytically and numerically.We optimize the radio frequency(rf) electrodes and dc electrodes to achieve the maximum trap depth for a given ion height above the trap electrodes.We also compare our design with the reality ion chip MI I for practical considerations.Comparison results show that our design is superior to MI I.This ion trap design may form the basis for large scale quantum computers or parallel quadrupole mass spectrometers.
基金supported by the National Natural Science Foundation of China(Grant No.6217070290)the Shanghai Science and Technology Project(Grant Nos.21JC1402800 and 20040501500)+2 种基金the Scientific Research Fund of Hunan Provincial Education Department(Grant No.21A0470)the Hunan Provincial Natural Science Foundation of China(Grant No.2020JJ4557)Top-Notch Innovative Talent Program for Postgraduate Students of Shanghai Maritime University(Grant No.2021YBR009)。
文摘We propose a new quantum watermarking scheme based on threshold selection using informational entropy of quantum image.The core idea of this scheme is to embed information into object and background of cover image in different ways.First,a threshold method adopting the quantum informational entropy is employed to determine a threshold value.The threshold value can then be further used for segmenting the cover image to a binary image,which is an authentication key for embedding and extraction information.By a careful analysis of the quantum circuits of the scheme,that is,translating into the basic gate sequences which show the low complexity of the scheme.One of the simulation-based experimental results is entropy difference which measures the similarity of two images by calculating the difference in quantum image informational entropy between watermarked image and cover image.Furthermore,the analyses of peak signal-to-noise ratio,histogram and capacity of the scheme are also provided.
文摘Quantum information processing is an active cross-disciplinary field drawing upon theoretical and experimental physics, computer science, engineering, mathematics, and material science. Its scope ranges from fundamental issues in quantum physics to prospective commercial exploitation by the computing and communications industries.