Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Quantum information splitting of an arbitrary three-qubit state by using a genuinely entangled five-qubit state and a Bell-state

Quantum information splitting of an arbitrary three-qubit state by using a genuinely entangled... A new application of the genuinely entangled five-qubit state introduced by Brown et al. (J Phys A 38(5), 1119–1131, 2005) is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. We demonstrate that such a genuine five-qubit entangled state and a Bell-state can be used to realize the deterministic QIS of an arbitrary three-qubit state by performing the Bell-state measurements and single qubit measurement. The presented protocol is showed to be secure against certain eavesdropping attacks. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Quantum Information Processing Springer Journals

Quantum information splitting of an arbitrary three-qubit state by using a genuinely entangled five-qubit state and a Bell-state

Loading next page...
 
/lp/springer-journals/quantum-information-splitting-of-an-arbitrary-three-qubit-state-by-TX4Q0hhsbu

References (20)

Publisher
Springer Journals
Copyright
Copyright © 2011 by Springer Science+Business Media, LLC
Subject
Physics; Physics, general; Theoretical, Mathematical and Computational Physics; Quantum Physics; Computer Science, general; Mathematics, general
ISSN
1570-0755
eISSN
1573-1332
DOI
10.1007/s11128-011-0264-8
Publisher site
See Article on Publisher Site

Abstract

A new application of the genuinely entangled five-qubit state introduced by Brown et al. (J Phys A 38(5), 1119–1131, 2005) is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. We demonstrate that such a genuine five-qubit entangled state and a Bell-state can be used to realize the deterministic QIS of an arbitrary three-qubit state by performing the Bell-state measurements and single qubit measurement. The presented protocol is showed to be secure against certain eavesdropping attacks.

Journal

Quantum Information ProcessingSpringer Journals

Published: Jul 28, 2011

There are no references for this article.