109 research outputs found
Hierarchical quantum communication
A general approach to study the hierarchical quantum information splitting
(HQIS) is proposed and the same is used to systematically investigate the
possibility of realizing HQIS using different classes of 4-qubit entangled
states that are not connected by SLOCC. Explicit examples of HQIS using 4-qubit
cluster state and 4-qubit |\Omega> state are provided. Further, the proposed
HQIS scheme is generalized to introduce two new aspects of hierarchical quantum
communication. To be precise, schemes of probabilistic hierarchical quantum
information splitting and hierarchical quantum secret sharing are obtained by
modifying the proposed HQIS scheme. A number of practical situations where
hierarchical quantum communication would be of use are also presented.Comment: 14 pages, 6 tables, no figur
Hierarchical Joint Remote State Preparation in Noisy Environment
A novel scheme for quantum communication having substantial applications in
practical life is designed and analyzed. Specifically, we have proposed a
hierarchical counterpart of the joint remote state preparation (JRSP) protocol,
where two senders can jointly and remotely prepare a quantum state. One sender
has the information regarding amplitude, while the other one has the phase
information of a quantum state to be jointly prepared at the receiver's port.
However, there exists a hierarchy among the receivers, as far as powers to
reconstruct the quantum state is concerned. A 5-qubit cluster state has been
used here to perform the task. Further, it is established that the proposed
scheme for hierarchical JRSP (HJRSP) is of enormous practical importance in
critical situations involving defense and other sectors, where it is essential
to ensure that an important decision/order that can severely affect a society
or an organization is not taken by a single person, and once the order is
issued all the receivers don't possess an equal right to implement it. Further,
the effect of different noise models (e.g., amplitude damping (AD), phase
damping (PD), collective noise and Pauli noise models) on the HJRSP protocol
proposed here is investigated. It is found that in AD and PD noise models a
higher power agent can reconstruct the quantum state to be remotely prepared
with higher fidelity than that done by the lower power agent(s). In contrast,
the opposite may happen in the presence of collective noise models. We have
also proposed a scheme for probabilistic HJRSP using a non-maximally entangled
5-qubit cluster state.Comment: 24 pages, 6 figure
Orthogonal-state-based protocols of quantum key agreement
Two orthogonal-state-based protocols of quantum key agreement (QKA) are
proposed. The first protocol of QKA proposed here is designed for two-party
QKA, whereas the second protocol is designed for multi-party QKA. Security of
these orthogonal-state-based protocols arise from monogamy of entanglement.
This is in contrast to the existing protocols of QKA where security arises from
the use of non-orthogonal state (non-commutativity principle). Further, it is
shown that all the quantum systems that are useful for implementation of
quantum dialogue and most of the protocols of secure direct quantum
communication can be modified to implement protocols of QKA.Comment: 9 pages, no figur
Beyond the Goldenberg-Vaidman protocol: Secure and efficient quantum communication using arbitrary, orthogonal, multi-particle quantum states
It is shown that maximally efficient protocols for secure direct quantum
communications can be constructed using any arbitrary orthogonal basis. This
establishes that no set of quantum states (e.g. GHZ states, W states, Brown
states or Cluster states) has an advantage over the others, barring the
relative difficulty in physical implementation. The work provides a wide choice
of states for experimental realization of direct secure quantum communication
protocols. We have also shown that this protocol can be generalized to a
completely orthogonal state based protocol of Goldenberg-Vaidman (GV) type. The
security of these protocols essentially arises from duality and monogamy of
entanglement. This stands in contrast to protocols that employ non-orthogonal
states, like Bennett-Brassard 1984 (BB84), where the security essentially comes
from non-commutativity in the observable algebra.Comment: 7 pages, no figur
Protocols and quantum circuits for implementing entanglement concentration in cat state, GHZ-like state and 9 families of 4-qubit entangled states
Three entanglement concentration protocols (ECPs) are proposed. The first ECP
and a modified version of that are shown to be useful for the creation of
maximally entangled cat and GHZ-like states from their non-maximally entangled
counterparts. The last two ECPs are designed for the creation of maximally
entangled -qubit state
from the partially entangled -qubit normalized state
, where
and . It is
also shown that W, GHZ, GHZ-like, Bell and cat states and specific states from
the 9 SLOCC-nonequivalent families of 4-qubit entangled states can be expressed
as
and consequently the last two ECPs proposed here are applicable to all these
states. Quantum circuits for implementation of the proposed ECPs are provided
and it is shown that the proposed ECPs can be realized using linear optics.
Efficiency of the ECPs are studied using a recently introduced quantitative
measure (Phys. Rev. A , 012307 (2012)). Limitations of the measure
are also reported.Comment: 11 pages 7 figure
Semi-quantum communication: Protocols for key agreement, controlled secure direct communication and dialogue
Semi-quantum protocols that allow some of the users to remain classical are
proposed for a large class of problems associated with secure communication and
secure multiparty computation. Specifically, first time semi-quantum protocols
are proposed for key agreement, controlled deterministic secure communication
and dialogue, and it is shown that the semi-quantum protocols for controlled
deterministic secure communication and dialogue can be reduced to semi-quantum
protocols for e-commerce and private comparison (socialist millionaire
problem), respectively. Complementing with the earlier proposed semi-quantum
schemes for key distribution, secret sharing and deterministic secure
communication, set of schemes proposed here and subsequent discussions have
established that almost every secure communication and computation tasks that
can be performed using fully quantum protocols can also be performed in
semi-quantum manner. Further, it addresses a fundamental question in context of
a large number problems- how much quantumness is (how many quantum parties are)
required to perform a specific secure communication task? Some of the proposed
schemes are completely orthogonal-state-based, and thus, fundamentally
different from the existing semi-quantum schemes that are
conjugate-coding-based. Security, efficiency and applicability of the proposed
schemes have been discussed with appropriate importance.Comment: 19 pages 1 figur
A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features
Generalizing the notion of dynamic quantum secret sharing (DQSS), a
simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is
proposed and it is shown that the protocol can be implemented using any
existing protocol of quantum key distribution, quantum key agreement or secure
direct quantum communication. The security of this proposed protocol against
eavesdropping and collusion attacks is discussed with specific attention
towards the issues related to the composability of the subprotocols that
constitute the proposed protocol. The security and qubit efficiency of the
proposed protocol is also compared with that of other existing protocols of
DQSS. Further, it is shown that it is possible to design a semi-quantum
protocol of HDQSS and in principle, the protocols of HDQSS can be implemented
using any quantum state. It is also noted that the completely
orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS
can be experimentally realized using a large number of alternative approaches.Comment: 9 pages, 1 figur
- …
