Quantum two-state sharing

被引:0
作者
Ma, Peng-Cheng [1 ]
Chen, Gui-Bin [2 ]
Li, Xiao-Wei [1 ]
Zhan, You-Bang [1 ]
机构
[1] Huaiyin Normal Univ, Sch Phys & Elect Elect Engn, Huaian 223300, Peoples R China
[2] Huaiyin Normal Univ, Jiangsu Key Lab Chem Low Dimens Mat, Huaian 223300, Peoples R China
来源
MODERN PHYSICS LETTERS B | 2021年 / 35卷 / 17期
关键词
Quantum two-state sharing; five-qubit entangled state; four-qubit measurement; unitary operation; INFORMATION; STATE; ENTANGLEMENT;
D O I
10.1142/S0217984921502924
中图分类号
O59 [应用物理学];
学科分类号
摘要
In this paper, we propose a novel scheme for quantum two-state sharing (QTSS) by using a five-qubit entangled state as the quantum channel. In this scheme, a dealer Alice has two unknown quantum states and wants her three agents to share the quantum states. After the dealer performs a four-qubit measurement on her qubits, and the controller employs a single-qubit measurement on his own qubit, the state receivers can reconstruct the original states by using the appropriate unitary operations. It is shown that, only if all agents collaborate with each other, the QTSS can be completed with unit success probability.
引用
收藏
页数:9
相关论文
共 38 条
[1]   Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers [J].
Bagherinezhad, S ;
Karimipour, V .
PHYSICAL REVIEW A, 2003, 67 (04) :4
[2]   Quantum secret sharing using the d-dimensional GHZ state [J].
Bai, Chen-Ming ;
Li, Zhi-Hui ;
Xu, Ting-Ting ;
Li, Yong-Ming .
QUANTUM INFORMATION PROCESSING, 2017, 16 (03)
[3]   TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS [J].
BENNETT, CH ;
BRASSARD, G ;
CREPEAU, C ;
JOZSA, R ;
PERES, A ;
WOOTTERS, WK .
PHYSICAL REVIEW LETTERS, 1993, 70 (13) :1895-1899
[4]   Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate [J].
Chau, HF .
PHYSICAL REVIEW A, 2002, 66 (06) :4
[5]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[6]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)
[7]   Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs [J].
Deng, FG ;
Li, XH ;
Li, CY ;
Zhou, P ;
Zhou, HY .
PHYSICAL REVIEW A, 2005, 72 (04)
[8]   Circular quantum secret sharing [J].
Deng, Fu-Guo ;
Zhou, Hong-Yu ;
Long, Gui Lu .
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2006, 39 (45) :14089-14099
[9]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[10]   Accessing quantum secrets via local operations and classical communication [J].
Gheorghiu, Vlad ;
Sanders, Barry C. .
PHYSICAL REVIEW A, 2013, 88 (02)