Time filter

Source Type

Nie Y.-Y.,Jiangxi Normal University | Nie Y.-Y.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province | Nie Y.-Y.,Shanghai JiaoTong University | Li Y.-H.,Jiangxi Normal University | And 2 more authors.
Quantum Information Processing | Year: 2013

By using a generalized Greenberger-Horne-Zeilinger (GHZ) state in which is locally unitarily connected with standard GHZ state as a communication channel, semi-quantum key distribution is extended to study semi-quantum information splitting protocols for secret sharing of quantum information. In our scheme, quantum Alice splits arbitrary two, three and N-qubit states with two classical parties, Bob and Charlie, in a way that both parties are sufficient to reconstruct Alice's original states only under the condition of which she/he obtains the help from another one, but one of them cannot. The presented protocols are helpful for both secure against certain eavesdropping attacks and economical in processing of quantum information. © 2012 Springer Science+Business Media, LLC.


Zhang Q.-n.,Jiangxi Normal University | Li C.-c.,Jiangxi Normal University | Li Y.-h.,Jiangxi Normal University | Li Y.-h.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province | And 3 more authors.
International Journal of Theoretical Physics | Year: 2013

A novel quantum secure direct communication scheme based on four-qubit cluster states is proposed. In this scheme, the quantum channel between the sender Alice and the receiver Bob consists of an ordered sequence of cluster states which are prepared by Alice. After ensuring the security of quantum channel, Alice prepares the encoded Bell-state sequence, and performs Bell-basis measurements on the qubits at hand. Then Alice tells the measured results to Bob, and Bob also performs Bell-basis measurements on his own qubits. Finally Bob can get the secret information through the analysis of their measured results. In our scheme, the qubits carrying the secret message do not need to be transmitted in public channel. We show this scheme is determinate and secure. © 2012 Springer Science+Business Media, LLC.


Li Y.-H.,Jiangxi Normal University | Liu J.-C.,Jiangxi Normal University | Nie Y.-Y.,Jiangxi Normal University | Nie Y.-Y.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province
International Journal of Theoretical Physics | Year: 2010

A new application of the genuinely entangled six-qubit state introduced recently by Tapiador et al. (J. Phys. A 42:415301, 2009) is investigated for the quantum teleportation of an arbitrary three-qubit state and for quantum information splitting (QIS) of an arbitrary two-qubit state. For QIS, we have shown that it can be completed perfectly with two distinct measurement methods. In our scheme, the joint Bell-state measurement and the joint multi-qubit measurement are needed. This quantum teleportation and QIS schemes are deterministic. © 2010 Springer Science+Business Media, LLC.


Nie Y.-Y.,Jiangxi Normal University | Nie Y.-Y.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province | Li Y.-H.,Jiangxi Normal University | Liu J.-C.,Jiangxi Normal University | Sang M.-H.,Jiangxi Normal University
Optics Communications | Year: 2011

A new application of the W-class state is investigated for quantum state sharing (QSTS) of an arbitrary threequbit state. We demonstrate that four sets of W-class states can be used to realize the deterministic QSTS of an arbitrary three-qubit state based on the three-qubit von Neumann measurements and the local unitary operations. Our scheme considered here is secure against certain eavesdropping attacks. © 2010 Elsevier B.V. All rights reserved.


Nie Y.-Y.,Jiangxi Normal University | Nie Y.-Y.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province | Li Y.-H.,Jiangxi Normal University | Liu J.-C.,Jiangxi Normal University | Sang M.-H.,Jiangxi Normal University
International Journal of Theoretical Physics | Year: 2011

We demonstrate that a six-atom cluster state can be used to realize the deterministic quantum state sharing of an arbitrary two-atom state in cavity QED. The scheme does not involve Bell-state measurement and is insensitive to both the cavity decay and the thermal field. In our scheme, any one of the two agents is sufficient to reconstruct the original state under the condition that he/she obtains the help of the other one, but only one of them cannot. © 2011 Springer Science+Business Media, LLC.


Nie Y.-Y.,Jiangxi Normal University | Nie Y.-Y.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province | Li Y.-H.,Jiangxi Normal University | Liu J.-C.,Jiangxi Normal University | Sang M.-H.,Jiangxi Normal University
Quantum Information Processing | Year: 2011

A new application of the four-qubit cluster state is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. Muralidharan and Panigrahi (Phys Rev A 78:062333, 2008) argued that a four-qubit cluster state is impossible for QIS of an arbitrary two-qubit state. In this paper, we demonstrate that two four-qubit cluster states can be used to realize the deterministic QIS of an arbitrary three-qubit state by performing only the Bell-state measurements. Our scheme considered here is secure against certain eavesdropping attacks. © 2010 Springer Science+Business Media, LLC.


Li Y.-H.,Jiangxi Normal University | Li Y.-H.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province | Nie L.-P.,Jiangxi Normal University | Nie L.-P.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province
International Journal of Theoretical Physics | Year: 2013

We present a scheme for bidirectional controlled teleportation by using a five-qubit composite GHZ-Bell state as quantum channel. Based on the C-not operation and single qubit measurements, Alice may transmit an arbitrary single qubit state of qubit A to Bob and Bob may transmit an arbitrary single qubit state of qubit B to Alice via the control of the supervisor Charlie. © 2013 Springer Science+Business Media New York.


Li Y.,Jiangxi Normal University | Li Y.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province | Nie L.,Jiangxi Normal University | Nie L.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province
International Journal of Theoretical Physics | Year: 2013

A cavity quantum electrodynamics scheme for implementing the deterministic quantum information splitting of an arbitrary three-atom state is proposed. In the scheme, a genuine five-atom entangled state and a Bell-state can be used as the quantum channel, which does not involve Bell-state measurement and only needs to perform the single-atom measurements. Our scheme is insensitive to both the cavity decay and the atom radiation, and considered here is secure against certain eavesdropping attacks. © 2012 Springer Science+Business Media New York.


Xu Y.,Jiangxi Normal University | Li Y.-H.,Jiangxi Normal University | Li Y.-H.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province
International Journal of Theoretical Physics | Year: 2013

We propose a scheme for the generation of a genuine five-atom entangled state in cavity QED. In our scheme, the atoms interact simultaneously with a highly detuned cavity mode with the assistance of a strong classical driving field. Thus the scheme is insensitive to both the cavity decay and the thermal field, which is of importance from the experimental point of view. © 2013 Springer Science+Business Media New York.


Nie Y.-Y.,Jiangxi Normal University | Nie Y.-Y.,Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province | Li Y.-H.,Jiangxi Normal University | Liu J.-C.,Jiangxi Normal University | Sang M.-H.,Jiangxi Normal University
Quantum Information Processing | Year: 2012

A new application of the genuinely entangled five-qubit state introduced by Brown et al. (J Phys A 38(5), 1119-1131, 2005) is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. We demonstrate that such a genuine five-qubit entangled state and a Bell-state can be used to realize the deterministic QIS of an arbitrary three-qubit state by performing the Bell-state measurements and single qubit measurement. The presented protocol is showed to be secure against certain eavesdropping attacks. © 2011 Springer Science+Business Media, LLC.

Loading Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province collaborators
Loading Key Laboratory of Optoelectronic and Telecommunication of Jiangxi Province collaborators