Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Quantum information splitting of an arbitrary three-qubit state by using two four-qubit cluster states

Quantum information splitting of an arbitrary three-qubit state by using two four-qubit cluster... A new application of the four-qubit cluster state is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. Muralidharan and Panigrahi (Phys Rev A 78:062333, 2008) argued that a four-qubit cluster state is impossible for QIS of an arbitrary two-qubit state. In this paper, we demonstrate that two four-qubit cluster states can be used to realize the deterministic QIS of an arbitrary three-qubit state by performing only the Bell-state measurements. Our scheme considered here is secure against certain eavesdropping attacks. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Quantum Information Processing Springer Journals

Quantum information splitting of an arbitrary three-qubit state by using two four-qubit cluster states

Loading next page...
 
/lp/springer-journals/quantum-information-splitting-of-an-arbitrary-three-qubit-state-by-MXFbHQOy92

References (32)

Publisher
Springer Journals
Copyright
Copyright © 2010 by Springer Science+Business Media, LLC
Subject
Physics; Quantum Information Technology, Spintronics; Quantum Computing; Data Structures, Cryptology and Information Theory; Quantum Physics; Mathematical Physics
ISSN
1570-0755
eISSN
1573-1332
DOI
10.1007/s11128-010-0196-8
Publisher site
See Article on Publisher Site

Abstract

A new application of the four-qubit cluster state is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. Muralidharan and Panigrahi (Phys Rev A 78:062333, 2008) argued that a four-qubit cluster state is impossible for QIS of an arbitrary two-qubit state. In this paper, we demonstrate that two four-qubit cluster states can be used to realize the deterministic QIS of an arbitrary three-qubit state by performing only the Bell-state measurements. Our scheme considered here is secure against certain eavesdropping attacks.

Journal

Quantum Information ProcessingSpringer Journals

Published: Sep 11, 2010

There are no references for this article.