Effect of noise on deterministic joint remote preparation of an arbitrary two-qubit state

被引:0
作者
Ming-Ming Wang
Zhi-Guo Qu
Wei Wang
Jin-Guang Chen
机构
[1] Xi’an Polytechnic University,School of Computer Science
[2] Nanjing University of Information Science and Technology,Jiangsu Engineering Center of Network Monitoring
来源
Quantum Information Processing | 2017年 / 16卷
关键词
Quantum secure communication; Quantum noise; Deterministic joint remote state preparation; Fidelity;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum communication has attracted much attention in recent years. Deterministic joint remote state preparation (DJRSP) is an important branch of quantum secure communication which could securely transmit a quantum state with 100% success probability. In this paper, we study DJRSP of an arbitrary two-qubit state in noisy environment. Taking a GHZ based DJRSP scheme of a two-qubit state as an example, we study how the scheme is influenced by all types of noise usually encountered in real-world implementations of quantum communication protocols, i.e., the bit-flip, phase-flip (phase-damping), depolarizing, and amplitude-damping noise. We demonstrate that there are four different output states in the amplitude-damping noise, while there is the same output state in each of the other three types of noise. The state-independent average fidelity is presented to measure the effect of noise, and it is shown that the depolarizing noise has the worst effect on the DJRSP scheme, while the amplitude-damping noise or the phase-flip has the slightest effect depending on the noise rate. Our results are also suitable for JRSP and RSP.
引用
收藏
相关论文
共 151 条
[1]  
Hillery M(1999)Quantum secret sharing Phys. Rev. A 59 1829-undefined
[2]  
Bužek V(2001)Hiding bits in Bell states Phys. Rev. Lett. 86 5807-undefined
[3]  
Berthiaume A(2010)Novel quantum steganography with large payload Opt. Commun. 283 4782-undefined
[4]  
Terhal BM(2001)Quantum authentication of classical messages Phys. Rev. A 64 062309-undefined
[5]  
DiVincenzo DP(1979)How to share a secret Commun. ACM 22 612-undefined
[6]  
Leung DW(2014)Steganalysis of least significant bit matching using multi-order differences Secur. Commun. Netw. 7 1283-undefined
[7]  
Qu ZG(2016)Steganalysis of LSB matching using differences between nonadjacent pixels Multimed. Tools Appl. 75 1947-undefined
[8]  
Chen XB(2014)A variable threshold-value authentication architecture for wireless mesh networks J. Internet Technol. 15 929-undefined
[9]  
Zhou XJ(2015)Mutual verifiable provable data auditing in public cloud storage J. Internet Technol. 16 317-undefined
[10]  
Niu XX(1997)Quantum mechanics helps in searching for a needle in a haystack Phys. Rev. Lett. 79 325-undefined