4,953 research outputs found

    Analysis of N-qubit Perfect Controlled Teleportation Schemes from the Controller\u27s Point of View

    Get PDF
    We quantitatively analyze and evaluate the controller\u27s power in N-qubit controlled teleportation schemes. We calculate the minimum control power required to ensure the controller\u27s authority such that the teleportation fidelity without the controller\u27s permission is no more than the classical bound. We revisit several typical controlled teleportation schemes from the controller\u27s point of view and evaluate the control power in these schemes. We find that for teleporting arbitrary N-qubit states, each controller should control at least N bits of useful information to ensure his or her authority over the protocol. We also discuss the general rules that must be satisfied by controlled teleportation schemes to ensure both teleportation fidelity and control power

    Control power in perfect controlled teleportation via partially entangled channels

    Get PDF
    We analyze and evaluate perfect controlled teleportation via three-qubit entangled channels from the point of view of the controller. The key idea in controlled teleportation is that the teleportation is performed only with the participation of the controller. We calculate a quantitative measure of the controller's power and establish a lower bound on the control power required for controlled teleportation. We show that the maximally entangled GHZ state is a suitable channel for controlled teleportation of arbitrary single qubits - the controller's power meets the bound and the teleportation fidelity without the controller's permission is no better than the fidelity of a classical channel. We also construct partially entangled channels that exceed the bound for controlled teleportation of a restricted set of states called the equatorial states. We calculate the minimum entanglement required in these channels to exceed the bound. Moreover, we find that in these restricted controlled teleportation schemes, the partially entangled channels can outperform maximally entangled channels with respect to the controller's power. Our results provide a new perspective on controlled teleportation schemes and are of practical interest since we propose useful partially entangled channels.Comment: 5 page, Physical Review A 201

    Deep attentive video summarization with distribution consistency learning

    Get PDF
    This article studies supervised video summarization by formulating it into a sequence-to-sequence learning framework, in which the input and output are sequences of original video frames and their predicted importance scores, respectively. Two critical issues are addressed in this article: short-term contextual attention insufficiency and distribution inconsistency. The former lies in the insufficiency of capturing the short-term contextual attention information within the video sequence itself since the existing approaches focus a lot on the long-term encoder-decoder attention. The latter refers to the distributions of predicted importance score sequence and the ground-truth sequence is inconsistent, which may lead to a suboptimal solution. To better mitigate the first issue, we incorporate a self-attention mechanism in the encoder to highlight the important keyframes in a short-term context. The proposed approach alongside the encoder-decoder attention constitutes our deep attentive models for video summarization. For the second one, we propose a distribution consistency learning method by employing a simple yet effective regularization loss term, which seeks a consistent distribution for the two sequences. Our final approach is dubbed as Attentive and Distribution consistent video Summarization (ADSum). Extensive experiments on benchmark data sets demonstrate the superiority of the proposed ADSum approach against state-of-the-art approaches

    Multiparty quantum secret splitting and quantum state sharing

    Full text link
    A protocol for multiparty quantum secret splitting is proposed with an ordered NN EPR pairs and Bell state measurements. It is secure and has the high intrinsic efficiency and source capacity as almost all the instances are useful and each EPR pair carries two bits of message securely. Moreover, we modify it for multiparty quantum state sharing of an arbitrary mm-particle entangled state based on quantum teleportation with only Bell state measurements and local unitary operations which make this protocol more convenient in a practical application than others.Comment: 7 pages, 1 figure. The revision of the manuscript appeared in PLA. Some procedures for detecting cheat have been added. Then the security loophole in the original manuscript has been eliminate
    corecore