Implementation of Non-Local Multi-Qubit CNOT Operation with Multi-Qubit GHZ States ¡¤¡¤¡¤¡¤¡¤¡¤

2008 ◽  
Vol 53 (2) ◽  
pp. 477-480 ◽  
Author(s):  
Yan-Hui Zhou ◽  
Xiao-Qiang Shao ◽  
Chun-Jiao Yang ◽  
Shou Zhang ◽  
Kyu-Hwang Yeon
Keyword(s):  
2004 ◽  
Vol 21 (1) ◽  
pp. 9-11 ◽  
Author(s):  
Zheng Yi-Zhuang ◽  
Ye Peng ◽  
Guo Guang-Can

2004 ◽  
Vol 18 (20n21) ◽  
pp. 2953-2961 ◽  
Author(s):  
LIBING CHEN ◽  
HONG LU ◽  
WEICHENG CHEN

We show how a non-local quantum CNOT with (N-1)-target operation can be implemented with unit fidelity and unit probability by using a N-qubit maximally entangled GHZ state as quantum channel. We also put forward two schemes for probabilistic implementing the operation with unit fidelity by employing a partially entangled pure GHZ state as quantum channel. The overall physical resources required for accomplishing these schemes are different, and the successful implementation probabilities are also different. We also point out the non-local CNOT with (N-1)-target operation can be used as a purification protocol to concentrate entanglement from an ensemble of partially entangled GHZ states into a subensemble of maximally entangled ones.


2016 ◽  
Vol 14 (01) ◽  
pp. 1650007 ◽  
Author(s):  
Ye-Feng He ◽  
Wen-Ping Ma

Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.


2005 ◽  
Vol 43 (6) ◽  
pp. 1003-1008
Author(s):  
Chen Li-Bing ◽  
Lu Hong ◽  
Chen Wei-Cheng
Keyword(s):  

Author(s):  
Zhifeng Shao

Recently, low voltage (≤5kV) scanning electron microscopes have become popular because of their unprecedented advantages, such as minimized charging effects and smaller specimen damage, etc. Perhaps the most important advantage of LVSEM is that they may be able to provide ultrahigh resolution since the interaction volume decreases when electron energy is reduced. It is obvious that no matter how low the operating voltage is, the resolution is always poorer than the probe radius. To achieve 10Å resolution at 5kV (including non-local effects), we would require a probe radius of 5∽6 Å. At low voltages, we can no longer ignore the effects of chromatic aberration because of the increased ratio δV/V. The 3rd order spherical aberration is another major limiting factor. The optimized aperture should be calculated as


Author(s):  
Zhifeng Shao ◽  
A.V. Crewe

For scanning electron microscopes, it is plausible that by lowering the primary electron energy, one can decrease the volume of interaction and improve resolution. As shown by Crewe /1/, at V0 =5kV a 10Å resolution (including non-local effects) is possible. To achieve this, we would need a probe size about 5Å. However, at low voltages, the chromatic aberration becomes the major concern even for field emission sources. In this case, δV/V = 0.1 V/5kV = 2x10-5. As a rough estimate, it has been shown that /2/ the chromatic aberration δC should be less than ⅓ of δ0 the probe size determined by diffraction and spherical aberration in order to neglect its effect. But this did not take into account the distribution of electron energy. We will show that by using a wave optical treatment, the tolerance on the chromatic aberration is much larger than we expected.


1998 ◽  
Vol 08 (PR8) ◽  
pp. Pr8-309-Pr8-316 ◽  
Author(s):  
Y. Z. Povstenko
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document