bell basis
Recently Published Documents


TOTAL DOCUMENTS

18
(FIVE YEARS 1)

H-INDEX

7
(FIVE YEARS 0)

Author(s):  
Shamiya Javed ◽  
Ranjana Prakash ◽  
Hari Prakash

We propose a new scheme in which perfect transmission of 1-qubit information is achieved with high success using purposefully delayed sharing of non-maximally entangled 2-qubit resource and repeated generalized Bell-state measurements (GBSM). Alice possesses initially all qubits and she makes repeated GBSM on the pair of qubits, consisting of (1) the qubit of information state and (2) one of the two entangled resource qubits (taken alternately) until transmission with perfect fidelity is indicated. Alice then sends to Bob, the qubit not used in the last GBSM and also the result of this GBSM and Bob applies a suitable unitary transformation to replicate exactly the information state. Continued probabilistic transmission with unit fidelity is achieved by changing continuously the generalized Bell basis and also the pair of measured qubits of the collapsed states. We calculate the success probability up to the third repeated attempt of GBSM and plot it with concurrence of the entangled resource state. We also discuss the maximal average fidelity.


2020 ◽  
Vol 14 (5) ◽  
Author(s):  
Yuanyuan Chen ◽  
Wuhong Zhang ◽  
Dongkai Zhang ◽  
Xiaodong Qiu ◽  
Lixiang Chen
Keyword(s):  

2020 ◽  
Author(s):  
Ashlesha Patil ◽  
Mihir Pant ◽  
Dirk Englund ◽  
Don Towsley ◽  
Saikat Guha

Abstract We develop a protocol for entanglement generation in the quantum internet that allows a repeater node to use n-qubit Greenberger-Horne-Zeilinger (GHZ) projective measurements that can fuse n successfully-entangled links, i.e., two-qubit entangled Bell pairs shared across n network edges, incident at that node. Implementing n-fusion, for n≥3, is in principle not much harder than 2-fusions (Bell-basis measurements) in solid-state qubit memories. If we allow even 3-fusions at the nodes, we find---by developing a connection to a modified version of the site-bond percolation problem---that despite lossy (hence probabilistic) link-level entanglement generation, and probabilistic success of the fusion measurements at nodes, one can generate entanglement between end parties Alice and Bob at a rate that stays constant as the distance between them increases. We prove that this powerful network property is not possible to attain with any quantum networking protocol built with Bell measurements and multiplexing alone. We also design a two-party quantum key distribution protocol that converts the entangled states shared between two nodes into a shared secret, at a key generation rate that is independent of the distance between the two parties.


Entropy ◽  
2019 ◽  
Vol 21 (7) ◽  
pp. 692 ◽  
Author(s):  
William Stuckey ◽  
Michael Silberstein ◽  
Timothy McDevitt ◽  
Ian Kohler

To answer Wheeler’s question “Why the quantum?” via quantum information theory according to Bub, one must explain both why the world is quantum rather than classical and why the world is quantum rather than superquantum, i.e., “Why the Tsirelson bound?” We show that the quantum correlations and quantum states corresponding to the Bell basis states, which uniquely produce the Tsirelson bound for the Clauser–Horne–Shimony–Holt (CHSH) quantity, can be derived from conservation per no preferred reference frame (NPRF). A reference frame in this context is defined by a measurement configuration, just as with the light postulate of special relativity. We therefore argue that the Tsirelson bound is ultimately based on NPRF just as the postulates of special relativity. This constraint-based/principle answer to Bub’s question addresses Fuchs’ desideratum that we “take the structure of quantum theory and change it from this very overt mathematical speak ... into something like [special relativity].” Thus, the answer to Bub’s question per Fuchs’ desideratum is, “the Tsirelson bound obtains due to conservation per NPRF”.


2019 ◽  
Vol 33 (03) ◽  
pp. 1950023 ◽  
Author(s):  
Huawang Qin ◽  
Wallace K. S. Tang ◽  
Raylin Tso

A three-party quantum secret sharing scheme is proposed, in which the dealer uses the d-dimensional Bell state to distribute the secret, the participants perform the single-particle measurements to get their shares, and the dealer performs the Bell-basis measurements to check the eavesdropping. The main merit of our scheme is that the participants only need to measure the particles in one basis. Compared to the existing schemes in which the participants need to measure the particles in two bases, our scheme will be more practical.


2018 ◽  
Vol 57 (12) ◽  
pp. 3839-3849
Author(s):  
Xiang-yu Zhu ◽  
Yuan-hong Tao

2018 ◽  
Vol 32 (10) ◽  
pp. 1850125 ◽  
Author(s):  
Ying-Hua Jiang ◽  
Shi-Bin Zhang ◽  
Jin-Qiao Dai ◽  
Zhi-Ping Shi

In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.


Optica ◽  
2017 ◽  
Vol 4 (12) ◽  
pp. 1462 ◽  
Author(s):  
Feiran Wang ◽  
Manuel Erhard ◽  
Amin Babazadeh ◽  
Mehul Malik ◽  
Mario Krenn ◽  
...  
Keyword(s):  

2017 ◽  
Vol 381 (38) ◽  
pp. 3282-3288 ◽  
Author(s):  
Xiao-Jun Wang ◽  
Long-Xi An ◽  
Xu-Tao Yu ◽  
Zai-Chen Zhang

2012 ◽  
Vol 10 (05) ◽  
pp. 1250061 ◽  
Author(s):  
XIU-LAO TIAN ◽  
WEI ZHANG ◽  
MEI-XIA ZHAO ◽  
XIAO-QIANG XI

We proposed a general transformation in probabilistic teleportation, which is based on different entanglement matching coefficients K corresponding to different unitary evolution which provides one with more flexible evolution method experimentally. Through analysis based on the Bell basis and generalized Bell basis measurement for two probabilistic teleportation, we suggested a general probability of successful teleportation, which is not only determined by the entanglement degree of transmission channels and measurement methods, but also related to the unitary transformation in the teleportation process.


Sign in / Sign up

Export Citation Format

Share Document