Next Article in Journal
A Positivity-Preserving Finite Volume Scheme for Nonequilibrium Radiation Diffusion Equations on Distorted Meshes
Next Article in Special Issue
Minimum Adversarial Examples
Previous Article in Journal
Special Issue “Complex Dynamic System Modelling, Identification and Control”
Previous Article in Special Issue
Meaningful Secret Image Sharing with Saliency Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Splitting an Arbitrary Three-Qubit State via a Five-Qubit Cluster State and a Bell State

1
School of Information Science and Technology, North China University of Technology, Beijing 100144, China
2
Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu 610025, China
3
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
4
School of Electronic Engineering, Dublin City University, D09 W6Y4 Dublin, Ireland
*
Authors to whom correspondence should be addressed.
Entropy 2022, 24(3), 381; https://doi.org/10.3390/e24030381
Submission received: 7 February 2022 / Revised: 1 March 2022 / Accepted: 4 March 2022 / Published: 8 March 2022

Abstract

:
Quantum information splitting (QIS) provides an idea for transmitting the quantum state through a classical channel and a preshared quantum entanglement resource. This paper presents a new scheme for QIS based on a five-qubit cluster state and a Bell state. In this scheme, the sender transmits the unknown three-qubit secret state to two agents by the quantum channel with the Bell basis measurement three times and broadcasts the measurement results to the agents through the classical channel. The agent who restores the secret state can successfully recover the initial information to be transmitted through the appropriate unitary operation with the help of the other party. Firstly, our scheme’s process can be accurately realized by performing the applicable Bell basis measurement, single-qubit measurement, and local unitary operation instead of a multiparticle joint measurement. The splitting process of quantum information is realized through a convenient operation. Secondly, compared with some previous schemes, the efficiency of the total scheme has been improved in principle, and the qubit consumption is reduced. Finally, the security of the quantum information splitting scheme is analyzed from the perspectives of external attacks and participant attacks. It is proved that our scheme can effectively resist internal participant attacks and external eavesdropper attacks.

1. Introduction

The traditional public-key cryptography is based on mathematically difficult problems. Moreover, the emergence and development of quantum computers significantly threaten the conventional cryptosystem’s security. However, with the in-depth study of the quantum mechanical phenomena and quantum information theory, security can be guaranteed in the process of encryption technology [1,2] and quantum communication [3,4,5]. Quantum communication, an essential branch of quantum information theory, uses quantum entanglement for quantum transmission. Quantum entanglement exerts an immense influence on the principles of quantum mechanics. It is widely used in quantum communication technologies, such as quantum teleportation [6,7], controlled teleportation [8,9,10], quantum secret sharing (QSS) [11,12,13], and quantum information splitting [14,15]. In general, QSS mainly involves two principles: one is to share classical secret information [16,17], and the other is to share confidential quantum information [18,19].
In 1993, Bennett et al. [20] proposed the scheme of quantum teleportation for two-level systems to transmit an arbitrary qubit from the sender to a long-distance receiver. In 1999, the concept of quantum information splitting by extending the idea of Bennett [20] was proposed by Hillery et al. [21] for the first time. Any receiver cannot reconfigure the original state alone but must be assisted by other agents. Quantum information splitting uses quantum entanglement resources to split the transmitted state [22], which can be regarded as the quantum counterpart of classical secret sharing. Since then, quantum information splitting has been extensively studied in theory [23,24] and experiments [25,26]. Subsequently, the splitting schemes for an arbitrary single-qubit secret state [27,28] and two-qubit secret state [29,30,31] have been introduced one after another. Nie et al. [32] designed a deterministic protocol for splitting an arbitrary three-qubit state using a genuinely entangled five-qubit state and a Bell state as the quantum entanglement resource. Shortly afterwards, Zhong et al. [33] demonstrated how to draw support from a four-qubit cluster state and a Greenberger−Horne−Zeilinge state to split the state to be transmitted in the sender’s hand.
In this paper, a new scheme to realize the splitting process of an arbitrary three-qubit state using a five-qubit cluster state and a Bell state as the quantum entanglement resource is presented. Firstly, the sender, Alison, needs to perform the corresponding Bell basis measurements on the three pairs of qubits she owns and send out the measurement outcomes to Bond and Calvin through the classical channel. Secondly, if Bond intends to reconstruct the initial secret information, the assistance of a third-party controller, Calvin, is necessary. It means that Calvin has to performthe X basis measurement on his particle and tell Bond the measurement outcome. Finally, by combining the information from Alison and Calvin, Bond can perform the appropriate unitary operations on the owned qubits to reconstruct the state to be transmitted. Compared with the previous schemes, our quantum information splitting process can be completed only by the Bell basis measurement, X basis measurement, and simple unitary transformation, without a multiparticle joint measurement. A more convenient way can accomplish the communication process, improve the qubit efficiency and the scheme’s security, and reduce communication costs.
The structure of thispaper is as follows. Section 2 briefly introduces some basic quantum gates and the preparation of the five-qubit cluster state from the principles of quantum circuits. Then, in Section 3, the scheme for splitting an arbitrary three-qubit state using a five-qubit cluster state and a Bell state as the quantum entanglement resource is proposed. Section 4 analyses the scheme’s security from internal participant and external eavesdropper attacks and the efficiency of our scheme. Finally, Section 5 concludes the paper.

2. Preliminaries

2.1. Basic Quantum Gates

Unitary operators play a significant part in quantum communication and quantum computation. The operators can act on qubits, in which the quantum gate can transform an input qubit state into a desired output state. A set of basic operations with single-qubit states is known as Pauli operators or I, X, Y, Z gates. The matrix specific forms and actions on the computational basis states are defined as follows:
I = 1 0 0 1 , X = 0 1 1 0 , i Y = i 0 i i 0 = 0 1 1 0 , i Y 0 = 1 , i Y 1 = 0 , Z = 1 0 0 1
The Hadamard matrix gate, or H gate, is defined as follows:
H   =   1 2 1 1 1 1
The elementary gate also contains the two-qubit gate, except the single-qubit gates mentioned above, namely the Controlled-NOT (CNOT) gate, which is defined as follows:
C N O T   =   1 0 0 0 0 1 0 0 0 0 0 1 0 0 1 0

2.2. Cluster State

In Ref. [34], an important kind of entangled states, namely cluster states, was introduced. Cluster states enjoy the following remarkable property: each pair of qubits can be projected into a maximally entangled state with certainty by single-qubit measurements on all the other qubits. This property might suitably be referred to as maximal connectedness.
For conceptual simplicity, we first restrict ourselves to one-dimensional lattices. Let us recall the definition of one-dimensional cluster states for N qubits. Consider an N-site lattice, with a qubit attached to each site. As a novel multi-qubit entangled state, the cluster state is written as follows:
ϕ C   =   1 2 N / 2 a   =   1 N [ 0 a   +   1 a ( σ z ) a   +   1 ]
where ( σ i ) a ( i   =   x , y , z ) are the Pauli matrices assigned for site a in the lattice, and σ z s a   =   ( 1 ) s s ,( s { 0 , 1 } ).

2.3. The Preparation of the Five-Qubit Cluster State

In this section, the quantum circuit that the five-qubit cluster state prepared from five individual single qubits is plotted, which is shown in the following Figure 1.
(1)
Prepare the five individual single qubits a , b , c , d , e in the states 0 a , 0 b , 0 c , 0 d , 0 e , respectively.
(2)
Perform H gateon qubits a , c .
(3)
Carry out the CNOT gate on the qubit pairs a , b , c , d , a , c , and c , e , in which the control qubit is the former particle in the qubit pairs, and the target qubitis the second inputparticle, respectively.
Next, the preparation process of a five-qubit cluster state from five qubits can be shown as follows:
0 a 0 b 0 c 0 d 0 e H a I b H c I d I e 1 2 0 + 1 a 0 b 1 2 0   +   1 c 0 d 0 e C N O T a b 1 2 00   +   11 a b 0   +   1 c 0 d 0 e C N O T c d 1 2 00   +   11 a b 00   +   11 c d 0 e C N O T a c 1 2 0000 + 0011   +   1110   +   1101 a b c d 0 e C N O T c e 1 2 00000   +   00111   +   11101   +   11010 a b c d e

3. Splitting an Arbitrary Three-Qubit State

Our scheme is illustrated in detail in this section. There are only three legal parties in this scheme: Alison, Bond, and Calvin. Alisonis the sender; Bond and Calvin are the two agents of Alison. Bond is the information receiver, and Calvin is the controller. Alison first prepares the required quantum entanglement resources as the quantum channel [18], which is given as follows:
Ψ 12345   =   1 2 00000   +   00111   +   11101   +   11010 12345 ϕ + 67   =   1 2 00   +   11 67
Thus, the quantum resource of the seven-qubit can be expressed as the following equation:
Θ 1234567 = ψ 12345 ϕ + 67 = 1 2 00000   +   00111   +   11101   +   11010 12345 1 2 00   +   11 67 = 1 2 2 0000000   +   0011100   +   1110100   +   1101000 + 0000011   +   0011111   +   1110111   +   1101011 1234567
Alison possesses an arbitrary unknown three-qubit state as follows:
ψ x y z = δ 000 000   +   δ 001 001   +   δ 010 010   +   δ 011 011 + δ 100 100   +   δ 101 101   +   δ 110 110   +   δ 111 111 x y z
where the three particles x, y, and z make up the state ψ x y z ,and each of these coefficients is a complex number that satisfies the condition of normalization.
l 1 , l 2 , l 3   =   0 1 δ l 1 l 2 l 3 2   =   1
Hence, the entire system can be combined and written as the following state:
Ψ x y z 1234567   =   ψ x y z Θ 1234567
where Alison owns the particles x, y, z, 2, 4, and 6, Bond owns the qubits 1, 3, and 7, and Calvin owns the qubit 5, respectively.
The principle of our quantum information splitting scheme is shown in Figure 2, in which the particles connected by solid linesare in an entangled state. BM represents the Bell basis measurement, and SM represents the single-qubit measurement; U1, U3, and U7 represent unitary operations on the particles 1, 3, and 7, respectively. Next, the specific process is described in detail.
Step 1 Share the particles of quantum entangled states securely
Firstly, the sender Alison and the agents Bond and Calvin securely distribute the ψ 12345 state and the ϕ + 67 state. Alison, Bond, and Calvin possess the particles 246, 137, 5, respectively. At the same time, Alison has the three particles of the three-qubit state ψ x y z .
Step 2 Alison performs the Bell basis measurements
Alison performs the BM three times on her owned qubit pairs (x, 2), (y, 4), and (z, 6), respectively. The Bell basis measurement is ϕ ±   =   1 2 00   ±   11 and φ ±   =   1 2 01   ±   10 . After that, it is possible to obtain 43measurement results in an equal probability form, and she will get one of them. Meanwhile, the residual particles will collapse and acquire one of the corresponding states through the above operation. In the following equations, the symbol ± in ϑ 1357 represents the results of three qubit pairs (x, 2), (y, 4), and (z, 6) under the Bell basis ϕ ± , φ ± in the left-to-right order, respectively. See Equations (11)–(18) for the specific measurement outcomes.
ϕ ± x 2 ϕ ± y 4 ϕ ± z 6 ϑ 1357 = 1 8 δ 000 0000 + + ± δ 001 0001 + ± + δ 010 0110 + ± ± δ 011 0111 ± + + δ 100 1110 ± + ± δ 101 1111 ± ± + δ 110 1000 ± ± ± δ 111 1001 1357
ϕ ± x 2 ϕ ± y 4 φ ± z 6 ϑ 1357 = 1 8 δ 000 0001 + + ± δ 001 0000 + ± + δ 010 0111 + ± ± δ 011 0110 ± + + δ 100 1111 ± + ± δ 101 1110 ± ± + δ 110 1001 ± ± ± δ 111 1000 1357
ϕ ± x 2 φ ± y 4 ϕ ± z 6 ϑ 1357 = 1 8 δ 000 0110 + + ± δ 001 0111 + ± + δ 010 0000 + ± ± δ 011 0001 ± + + δ 100 1000 ± + ± δ 101 1001 ± ± + δ 110 1110 ± ± ± δ 111 1111 1357
ϕ ± x 2 φ ± y 4 φ ± z 6 ϑ 1357 = 1 8 δ 000 0111 + + ± δ 001 0110 + ± + δ 010 0001 + ± ± δ 011 0000 ± + + δ 100 1001 ± + ± δ 101 1000 ± ± + δ 110 1111 ± ± ± δ 111 1110 1357
φ ± x 2 ϕ ± y 4 ϕ ± z 6 ϑ 1357 = 1 8 δ 000 1110 + + ± δ 001 1111 + ± + δ 010 1000 + ± ± δ 011 1001 ± + + δ 100 0000 ± + ± δ 101 0001 ± ± + δ 110 0110 ± ± ± δ 111 0111 1357
φ ± x 2 ϕ ± y 4 φ ± z 6 ϑ 1357 = 1 8 δ 000 1111 + + ± δ 001 1110 + ± + δ 010 1001 + ± ± δ 011 1000 ± + + δ 100 0001 ± + ± δ 101 0000 ± ± + δ 110 0111 ± ± ± δ 111 0110 1357
φ ± x 2 φ ± y 4 ϕ ± z 6 ϑ 1357 = 1 8 δ 000 1000 + + ± δ 001 1001 + ± + δ 010 1110 + ± ± δ 011 1111 ± + + δ 100 0110 ± + ± δ 101 0111 ± ± + δ 110 0000 ± ± ± δ 111 0001 1357
φ ± x 2 φ ± y 4 φ ± z 6 ϑ 1357 = 1 8 δ 000 1001 + + ± δ 001 1000 + ± + δ 010 1111 + ± ± δ 011 1110 ± + + δ 100 0111 ± + ± δ 101 0110 ± ± + δ 110 0001 ± ± ± δ 111 0000 1357
Step 3 Calvin performs the single-qubit measurement
Alisontransmits the Bell measurement outcomes to Calvin and Bond using the classical channel. Only through Calvin’s assistance can Bond reconstruct the shared information. Consequently, to gain the original information, Calvin performs the X basismeasurement toparticle 5 on his own. After that, Calvin will obtain one of the two possible results at random, and the particles (1,3,7) held by Bond will collapse to the corresponding state.
Step 4 Bond reconstructs the state to be transmitted
Bond recovers this unknown state under the cooperation of Calvin. By combining the outcomes of Alison and Calvin, Bond can carry out aproper unitary operation on the particles he owns to restore the state to be transmitted.
For the sake of a simple but general description of the process, we take Alison’s measurement outcomes ϕ x 2 ϕ y 4 ϕ z 6 as an example to expound and prove the process of the splitting scheme. The remaining particles will collapse into the following state:
ϑ 1357 = 1 8 δ 000 0000 δ 001 0001 δ 010 0110 + δ 011 0111 δ 100 1110 + δ 101 1111 + δ 110 1000 δ 111 1001 1357 = 1 8 2 + 5 δ 000 000 δ 001 001 δ 010 010 + δ 011 011 δ 100 110 + δ 101 111 + δ 110 100 δ 111 101 137 + 5 ( δ 000 000 δ 001 001 + δ 010 010 δ 011 011 + δ 100 110 δ 101 111 + δ 110 100 δ 111 101 ) 137 ]
If Calvin, the controller, is willing to help Bond, he will make the X basis measurement on the particle5he owns, and then he transmits the measurement outcome to Bond. The X basis measurement is + = 1 2 0 + 1 and = 1 2 0 1 . If the result is + 5 or 5 , Bond needs to perform the corresponding operation C 13 Z 3 Z 7 or C 13 Z 7 on his owned particles 1, 3 and 7, respectively. By completing the procedures mentioned above, Bond can accurately recover the information to be transmitted.

4. Security and Efficiency

We analyze the quantum information splitting scheme proposed in this paper from two aspects of security and efficiency in this section. The security is described from external eavesdropper attacks and internal participant attacks. Then, the efficiency of the qubit and the whole scheme is given in turn.

4.1. Security Analysis

4.1.1. Internal Participant Attack

Let us first discuss the case of an internal attack. Suppose the controller Calvin is the dishonest agent. He intercepts the Bell measurement results sent by Alison. After that, Calvin sends the usurped entangled information that is prepared in advance to Bond. Therefore, when Bondis responsible for reconstructing the quantum information, he will get the wrong original quantum state. At this time, Bond has a suspicion that there is an insider so that the prepared original quantum state is wrong. When Alison and Bond compare the partial information with the state reconstructed through a classical communication channel, they can detect the existence of an attack. Therefore, the communication is discarded.

4.1.2. External Eavesdropper Attack

An external eavesdropper, Eve, manages to steal the information of Alison, Bond, and Calvin. Eve wants to obtain the state to be transmittedby entangling an auxiliary qubit to the whole system during the particle distribution process. However, it is assumed that the three legitimate parties in the scheme are not conscious of the eavesdropping from Eve. After Alison performs the BM three times, the quantum system of Calvin, Bond, and Eve collapses into a state of entanglement. Then, Calvin performs the X basis measurement; at this time, the Bond−Eve system collapses into the tensorproductoftwo states. Eve can not gainany helpful information about the original stateto be transmitted in the process.
Take Alison’s measurement results of ϕ + x 2 ϕ + y 4 ϕ + z 6 as an example. If Eve’s entangled auxiliary particles are 1 2 0 + 1 E , then the entangled state of Bond, Calvin, and Eve can be expressed as follows:
Ξ 1357 E   =   1 8 2 δ 000 00000 + δ 000 00001 + δ 001 00010 + δ 001 00011 + δ 010 01100 + δ 010 01101 + δ 011 01110 + δ 011 01111 + δ 100 11100 + δ 100 11101 + δ 101 11110 + δ 101 11111 + δ 110 10000 + δ 110 10001 + δ 111 10010 + δ 111 10011 1357 E
If Calvin’s X basis measurement outcome is + 5 , then the remaining particles in the Bond−Eve system will collapse into the ξ 1 137 E state.
ξ 1 137 E   =   1 16 δ 000 0000 + δ 000 0001 + δ 001 0010 + δ 001 0011 + δ 010 0100 + δ 010 0101 + δ 011 0110 + δ 011 0111 + δ 100 1100 + δ 100 1101 + δ 101 1110 + δ 101 1111 + δ 110 1000 + δ 110 1001 + δ 111 1010 + δ 111 1011 137 E = 1 8 2 δ 000 000 + δ 001 001 + δ 010 010 + δ 011 011 + δ 100 110 + δ 101 111 + δ 110 100 + δ 111 101 137 1 2 0 + 1 E
If Calvin’s X basis measurement outcome is 5 , then the remaining particles in the Bond−Eve system will collapse into the ξ 2 137 E state.
ξ 2 137 E   =   1 16 δ 000 0000 + δ 000 0001 + δ 001 0010 + δ 001 0011 δ 010 0100 δ 010 0101 δ 011 0110 δ 011 0111 δ 100 1100 δ 100 1101 δ 101 1110 δ 101 1111 + δ 110 1000 + δ 110 1001 + δ 111 1010 + δ 111 1011 137 E = 1 8 2 δ 000 000 + δ 001 001 δ 010 010 δ 011 011 δ 100 110 δ 101 111 + δ 110 100 + δ 111 101 137 1 2 0 + 1 E
It is easy to see that Eve acquires no information about the original state.

4.2. Efficiency Analysis

The security of the QIS process is guaranteed by establishing a secure quantum channel. In distributing particles by the sender, decoy photons technology is introduced to detect the presence of eavesdroppers. The decoy state used to detect eavesdropping accounts for only a small part, which can be neglectedin the abstract. Hence, the qubits’ efficiency η = q u / q t can reach 100% in our scheme, where the amount of the useful qubitsis expressed as q u , and the amount of qubits transferredis expressed as  q t . Cabello [35] gave a formula of the efficiency of a quantum key distribution scheme from the perspective of the quantum information theory. Here, the total efficiency of the quantum information splitting scheme can be calculated from the following:
ε   =   q s q t   +   b t
where q s stands for the quantity of qubits of the quantum state to be shared and q t and b t stand for the quantity of qubits transferred and the total number of classical bits used by agents to transmit the measurement results in the communication process, respectively. In our QIS for sharing an arbitrary three-qubit state between the three parties, the total efficiency is ε   =   q s q t   +   b t   =   3 4   +   7   =   3 11 , which is the maximum value for the splitting scheme, in theory. Nevertheless, in Yin et al.’s scheme [36] for splitting the quantum state between the three legal parties, the efficiency is ε   =   q s q t   +   b t   =   3 5   +   8   =   3 13 , which is lower than that of our QIS scheme.
We summarize the comparison of arbitrary three particle states under different quantum channels and give the following Table 1. On the one hand, in comparison to Ref. [32], although the efficiency is the same as ours, it sacrifices more complex quantum resources to recover the quantum state. On the other hand, in comparison to Ref. [36], it is worth noting that we use less quantum resources and improve the efficiency of the scheme.

5. Conclusions

To sum up, a novel scheme is studied and proposed about the QIS of an arbitrary three-qubit system via a five-qubit cluster state and a Bell state as the quantum entanglement resource. In this scheme, Alison performs the BM on the owned three pairs of qubits and then sends out the measurement outcomes to Bond and Calvin through a classical communication channel. It is impractical for Bond to recover the secret by performing a unitary operation without the help of Calvin. Consequently, to recover the state to be transmitted, Calvin is supposed to carry out the X basis measurement and informs Bond of the measurement outcome with the aid of a classical channel. By the measurement results of Alison and Calvin, Bond can recover the state to be transmitted using an applicable unitary operation on his qubits. In addition, the scheme is demonstrated to be secure under internal and external attacks. Therefore, the scheme is experimentally achievable.

Author Contributions

Conceptualization, G.X.; methodology, X.-B.C.; software, T.Z. and G.X.; validation, G.X., T.Z., X.-B.C. and X.W.; formal analysis, T.Z.; investigation, G.X.; resources, X.-B.C.; data curation, G.X. and T.Z.; writing—original draft preparation, T.Z. and G.X.; writing—review and editing, X.-B.C. and G.X.; visualization, G.X. and T.Z.; supervision, X.-B.C. and X.W.; funding acquisition, G.X. and X.-B.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Grant No. SKLACSS-202101), NSFC (Grant Nos. 62176273, 61962009, U1936216), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No.2019BDKFJJ010, 2019BDKFJJ014), the Fundamental Research Funds for Beijing Municipal Commission of Education, Beijing Urban Governance Research Base of North China University of Technology, the Natural Science Foundation of Inner Mongolia (2021MS06006), Baotou Kundulun District Science and technology plan project (YF2020013), and Inner Mongolia discipline inspection and supervision big data laboratory open project fund (IMDBD2020020).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xia, Z.H.; Jiang, L.Q.; Liu, D.D.; Lu, L.H.; Jeon, B. BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans. Serv. Comput. 2019, 15, 202–214. [Google Scholar] [CrossRef]
  2. Xia, Z.H.; Wang, X.H.; Sun, X.M.; Wang, Q. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans. Parallel. Distrib. Syst. 2015, 27, 340–352. [Google Scholar] [CrossRef]
  3. Xu, G.; Xiao, K.; Li, Z.P.; Niu, X.X.; Ryan, M. Controlled secure direct communication protocol via the three-qubit partially entangled set of states. Comput. Mater. Contin. 2019, 58, 809–827. [Google Scholar] [CrossRef] [Green Version]
  4. Zhang, Z.X.; Qu, Z.G. Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model. J. Quantum Comput. 2019, 1, 89–109. [Google Scholar] [CrossRef]
  5. Chen, S.Y.; Xu, G.; Chen, X.B.; Ahmad, H.; Chen, Y.L. Measurement-based quantum repeater network coding. Intell. Autom. Soft Comput. 2021, 30, 273–284. [Google Scholar] [CrossRef]
  6. Pfaff, W.; Hensen, B.J.; Bernien, H.; van Dam, S.B.; Blok, M.S.; Taminiau, T.H.; Tiggelman, M.J.; Schouten, R.N.; Markham, M.; Twitchen, D.J.; et al. Unconditional quantum teleportation between distant solid-state quantum bits. Science 2014, 345, 532–535. [Google Scholar] [CrossRef] [Green Version]
  7. Karlsson, A.; Bourennane, M. Quantum teleportation using three-particle entanglement. Phys. Rev. A 1998, 58, 4394–4400. [Google Scholar] [CrossRef]
  8. Deng, F.G.; Li, C.Y.; Li, Y.S.; Zhou, H.Y.; Wang, Y. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement. Phys. Rev. A 2005, 72, 022338. [Google Scholar] [CrossRef] [Green Version]
  9. Chen, X.B.; Zhang, N.; Lin, S.; Wen, Q.Y.; Zhu, F.C. Quantum circuits for controlled teleportation of two-particle entanglement via a W state. Opt. Commun. 2008, 281, 2331–2335. [Google Scholar] [CrossRef]
  10. Wang, T.Y.; Wen, Q.Y. Controlled quantum teleportation with Bell states. Chin. Phys. B 2011, 20, 65–69. [Google Scholar] [CrossRef]
  11. Guo, G.P.; Guo, G.C. Quantum secret sharing without entanglement. Phys. Lett. A 2003, 310, 247–251. [Google Scholar] [CrossRef] [Green Version]
  12. Wang, T.Y.; Wen, Q.Y.; Chen, X.B.; Guo, F.Z.; Zhu, F.C. An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 2008, 281, 6130–6134. [Google Scholar] [CrossRef]
  13. Sun, Y.; Wen, Q.Y.; Gao, F.; Chen, X.B.; Zhu, F.C. Multiparty quantum secret sharing based on Bell measurement. Opt. Commun. 2009, 282, 3647–3651. [Google Scholar] [CrossRef]
  14. Nie, Y.Y.; Li, Y.H.; Liu, J.C.; Sang, M.H. Quantum state sharing of an arbitrary four-qubit GHZ-type state by using a four-qubit cluster state. QuantumInf. Processing 2011, 10, 603–608. [Google Scholar] [CrossRef]
  15. Chen, Y. Splitting an Arbitrary Two-ubit State Via a Seven-qubit Maximally Entangled State. Int. J. Theor. Phys. 2015, 54, 1515–1518. [Google Scholar] [CrossRef]
  16. Deng, F.G.; Long, G.L.; Zhou, H.Y. An efficient quantum secret sharing scheme with Einstein–Podolsky–Rosen pairs. Phys. Lett. A 2005, 340, 43–50. [Google Scholar] [CrossRef] [Green Version]
  17. Xu, G.; Shan, R.T.; Chen, X.B.; Dong, M.X.; Chen, Y.L. Probabilistic and hierarchical quantum information splitting based on the non-maximally entangled cluster state. Comput. Mater. Contin. 2021, 69, 339–349. [Google Scholar] [CrossRef]
  18. Ramírez, M.D.G.; Falaye, B.J.; Sun, G.H.; Cruz-Irisson, M.; Dong, S.H. Quantum teleportation and information splitting via four-qubit cluster state and a Bell state. Front. Phys. 2017, 12, 171–179. [Google Scholar] [CrossRef] [Green Version]
  19. Ma, L.Y. Two-Qubit Quantum State Sharing Protocol Based on Bell State. Int. J. Theor. Phys. 2020, 59, 1844–1853. [Google Scholar] [CrossRef]
  20. Bennett, C.H.; Brassard, G.; Crépeau, C.; Jozsa, R.; Peres, A.; Wootters, W.K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993, 70, 1895–1899. [Google Scholar] [CrossRef] [Green Version]
  21. Hillery, M.; Bužek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829–1834. [Google Scholar] [CrossRef] [Green Version]
  22. Kang, S.Y.; Chen, X.B.; Yang, Y.X. Multi-party quantum state sharing of an arbitrary multi-qubit state via χ-type entangled states. Quantum Inf. Processing 2014, 13, 2081–2098. [Google Scholar] [CrossRef]
  23. Deng, F.G.; Li, X.H.; Li, C.Y.; Zhou, P.; Zhou, H.Y. Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs. Phys. Rev. A 2005, 72, 044301. [Google Scholar] [CrossRef] [Green Version]
  24. Xu, G.; Wang, C.; Yang, Y.X. Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state. Quantum Inf. Processing 2014, 13, 43–57. [Google Scholar] [CrossRef]
  25. Zhao, Z.; Chen, Y.A.; Zhang, A.N.; Yang, T.; Briegel, H.J.; Pan, J.W. Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature 2004, 430, 54–58. [Google Scholar] [CrossRef]
  26. Bell, B.A.; Markham, D.; Herrera-Martí, D.A.; Marin, A.; Wadsworth, W.J.; Rarity, J.G.; Tame, M.S. Experimental demonstration of graph-state quantum secret sharing. Nat. Commun. 2014, 5, 5480. [Google Scholar] [CrossRef] [Green Version]
  27. Muralidharan, S.; Panigrahi, P.K. Quantum-information splitting using multipartite cluster states. Phys. Rev. A 2008, 78, 062333. [Google Scholar] [CrossRef] [Green Version]
  28. Chen, X.B.; Niu, X.X.; Zhou, X.J.; Yang, Y.X. Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Processing 2013, 12, 365–380. [Google Scholar] [CrossRef]
  29. Shi, R.H.; Huang, L.S.; Yang, W.; Zhong, H. Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states. QuantumInf. Processing 2011, 10, 231–239. [Google Scholar] [CrossRef]
  30. Wang, R.J.; Li, D.F.; Deng, F.H. Quantum information splitting of a two-qubit bell state using a five-qubit entangled state. Int. J. Theor. Phys. 2015, 54, 3229–3237. [Google Scholar] [CrossRef]
  31. Yang, Y.; Li, D.; Liu, M.; Chen, J. Quantum Information Splitting of Arbitrary Two-Qubit State Via a Five-Qubit Cluster State and a Bell-State. Int. J. Theor. Phys. 2020, 59, 187–199. [Google Scholar] [CrossRef]
  32. Nie, Y.Y.; Li, Y.H.; Liu, J.C.; Sang, M.H. Quantum information splitting of an arbitrary three-qubit state by using a genuinely entangled five-qubit state and a Bell-state. Quantum Inf. Processing 2012, 11, 563–569. [Google Scholar] [CrossRef]
  33. Zhong, L.Y.; Guo, Q.; Cheng, L.Y.; Su, S.L.; Zhu, L.; Wang, H.F.; Zhang, S. Quantum information splitting of an arbitrary three-qubit state via the cavity input–output process. Opt. Commun. 2012, 285, 4616–4620. [Google Scholar] [CrossRef]
  34. Zhou, D.L.; Zeng, B.; Xu, Z.; Sun, C.P. Quantum computation based on d-Level cluster state. Phys. Rev. A 2003, 68, 062303. [Google Scholar] [CrossRef] [Green Version]
  35. Cabello, A. Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 2000, 85, 5635–5638. [Google Scholar] [CrossRef] [Green Version]
  36. Yin, A.; Wang, J. Quantum Information Splitting of Arbitrary Three-qubit State by Using Five-qubit Cluster state and GHZ-state. Int. J. Theor. Phys. 2016, 55, 5250–5264. [Google Scholar] [CrossRef]
Figure 1. Circuit diagram representation for the preparation of the five-qubit cluster state.
Figure 1. Circuit diagram representation for the preparation of the five-qubit cluster state.
Entropy 24 00381 g001
Figure 2. The QIS process between the three parties. The particles connected by solid lines are in an entangled state. BM represents the Bell basis measurement, and SM represents the single-qubit measurement, U1, U3 and U7 represent unitary operations on the particles 1, 3 and 7, respectively. In the step 1 (a), Alison, Bond and Calvin possess the particles 246, 137 and 5, respectively. In the step 2 (b), Alison performs three times BM on her owned qubit pairs (x, 2), (y, 4) and (z, 6), respectively. In the step 3 (c), Calvin performs SM on particle 5. In the step 4 (d), Bond reconstructs the state to be transmitted through appropriate U1, U3 and U7 operations.
Figure 2. The QIS process between the three parties. The particles connected by solid lines are in an entangled state. BM represents the Bell basis measurement, and SM represents the single-qubit measurement, U1, U3 and U7 represent unitary operations on the particles 1, 3 and 7, respectively. In the step 1 (a), Alison, Bond and Calvin possess the particles 246, 137 and 5, respectively. In the step 2 (b), Alison performs three times BM on her owned qubit pairs (x, 2), (y, 4) and (z, 6), respectively. In the step 3 (c), Calvin performs SM on particle 5. In the step 4 (d), Bond reconstructs the state to be transmitted through appropriate U1, U3 and U7 operations.
Entropy 24 00381 g002
Table 1. The comparison for using the different quantum channels to split an arbitrary three-qubit state.
Table 1. The comparison for using the different quantum channels to split an arbitrary three-qubit state.
Entanglement ResourceqtbtEfficiency
Nie’s scheme [32]genuinely entangled five-qubit state + Bell state473/11
Yin’s scheme [36]five-qubit cluster state + GHZ state583/13
our schemefive-qubit cluster state + Bell state473/11
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Xu, G.; Zhou, T.; Chen, X.-B.; Wang, X. Splitting an Arbitrary Three-Qubit State via a Five-Qubit Cluster State and a Bell State. Entropy 2022, 24, 381. https://doi.org/10.3390/e24030381

AMA Style

Xu G, Zhou T, Chen X-B, Wang X. Splitting an Arbitrary Three-Qubit State via a Five-Qubit Cluster State and a Bell State. Entropy. 2022; 24(3):381. https://doi.org/10.3390/e24030381

Chicago/Turabian Style

Xu, Gang, Tianai Zhou, Xiu-Bo Chen, and Xiaojun Wang. 2022. "Splitting an Arbitrary Three-Qubit State via a Five-Qubit Cluster State and a Bell State" Entropy 24, no. 3: 381. https://doi.org/10.3390/e24030381

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop