834 research outputs found
A Simultaneous Quantum Secure Direct Communication Scheme between the Central Party and Other M Parties
We propose a simultaneous quantum secure direct communication scheme between
one party and other three parties via four-particle GHZ states and swapping
quantum entanglement. In the scheme, three spatially separated senders, Alice,
Bob and Charlie, transmit their secret messages to a remote receiver Diana by
performing a series local operations on their respective particles according to
the quadripartite stipulation. From Alice, Bob, Charlie and Diana's Bell
measurement results, Diana can infer the secret messages. If a perfect quantum
channel is used, the secret messages are faithfully transmitted from Alice, Bob
and Charlie to Diana via initially shared pairs of four-particle GHZ states
without revealing any information to a potential eavesdropper. As there is no
transmission of the qubits carrying the secret message in the public channel,
it is completely secure for the direct secret communication. This scheme can be
considered as a network of communication parties where each party wants to
communicate secretly with a central party or server.Comment: 4 pages, no figur
A general scheme for information interception in the ping pong protocol
The existence of an undetectable eavesdropping of dense coded information has
been already demonstrated by Pavi\v{c}i\'c for the quantum direct communication
based on the ping-pong paradigm. However, a) the explicit scheme of the circuit
is only given and no design rules are provided, b) the existence of losses is
implicitly assumed, c) the attack has been formulated against qubit based
protocol only and it is not clear whether it can be adapted to higher
dimensional systems. These deficiencies are removed in the presented
contribution. A new generic eavesdropping scheme built on a firm theoretical
background is proposed. In contrast to the previous approach, it does not refer
to the properties of the vacuum state, so it is fully consistent with the
absence of losses assumption. Moreover, the scheme applies to the communication
paradigm based on signal particles of any dimensionality. It is also shown that
some well known attacks are special cases of the proposed scheme.Comment: 10 pages, 4 figure
Polarization entangled photon-pair source based on quantum nonlinear photonics and interferometry
We present a versatile, high-brightness, guided-wave source of polarization
entangled photons, emitted at a telecom wavelength. Photon-pairs are generated
using an integrated type-0 nonlinear waveguide, and subsequently prepared in a
polarization entangled state via a stabilized fiber interferometer. We show
that the single photon emission wavelength can be tuned over more than 50 nm,
whereas the single photon spectral bandwidth can be chosen at will over more
than five orders of magnitude (from 25 MHz to 4 THz). Moreover, by performing
entanglement analysis, we demonstrate a high degree of control of the quantum
state via the violation of the Bell inequalities by more than 40 standard
deviations. This makes this scheme suitable for a wide range of quantum optics
experiments, ranging from fundamental research to quantum information
applications. We report on details of the setup, as well as on the
characterization of all included components, previously outlined in F. Kaiser
et al. (2013 Laser Phys. Lett. 10, 045202).Comment: 16 pages, 7 figure
A Two-Step Quantum Direct Communication Protocol Using Einstein-Podolsky-Rosen Pair Block
A protocol for quantum secure direct communication using blocks of EPR pairs
is proposed. A set of ordered EPR pairs is used as a data block for sending
secret message directly. The ordered EPR set is divided into two particle
sequences, a checking sequence and a message-coding sequence. After
transmitting the checking sequence, the two parties of communication check
eavesdropping by measuring a fraction of particles randomly chosen, with random
choice of two sets of measuring bases. After insuring the security of the
quantum channel, the sender, Alice encodes the secret message directly on the
message-coding sequence and send them to Bob. By combining the checking and
message-coding sequences together, Bob is able to read out the encoded messages
directly. The scheme is secure because an eavesdropper cannot get both
sequences simultaneously. We also discuss issues in a noisy channel.Comment: 8 pages and 2 figures. To appear in Phys Rev
Quantum entanglement
All our former experience with application of quantum theory seems to say:
{\it what is predicted by quantum formalism must occur in laboratory}. But the
essence of quantum formalism - entanglement, recognized by Einstein, Podolsky,
Rosen and Schr\"odinger - waited over 70 years to enter to laboratories as a
new resource as real as energy.
This holistic property of compound quantum systems, which involves
nonclassical correlations between subsystems, is a potential for many quantum
processes, including ``canonical'' ones: quantum cryptography, quantum
teleportation and dense coding. However, it appeared that this new resource is
very complex and difficult to detect. Being usually fragile to environment, it
is robust against conceptual and mathematical tools, the task of which is to
decipher its rich structure.
This article reviews basic aspects of entanglement including its
characterization, detection, distillation and quantifying. In particular, the
authors discuss various manifestations of entanglement via Bell inequalities,
entropic inequalities, entanglement witnesses, quantum cryptography and point
out some interrelations. They also discuss a basic role of entanglement in
quantum communication within distant labs paradigm and stress some
peculiarities such as irreversibility of entanglement manipulations including
its extremal form - bound entanglement phenomenon. A basic role of entanglement
witnesses in detection of entanglement is emphasized.Comment: 110 pages, 3 figures, ReVTex4, Improved (slightly extended)
presentation, updated references, minor changes, submitted to Rev. Mod. Phys
- …