To realize efficient quantum communication based on quantum repeater, we propose a secure quantum network coding scheme for controlled repeater networks, which adds a controller as a trusted party and is able to contr...
详细信息
To realize efficient quantum communication based on quantum repeater, we propose a secure quantum network coding scheme for controlled repeater networks, which adds a controller as a trusted party and is able to control the process of EPR-pair distribution. As the key operations of quantum repeater, local operations and quantum communication are designed to adopt quantum one-time pad to enhance the function of identity authentication instead of local operations and classical communication. Scheme analysis shows that the proposed scheme can defend against active attacks for quantum communication and realize long-distance quantum communication with minimal resource consumption.
This paper proposes a quantum network coding scheme for general repeater networks so as to support long-distance quantum communication over quantum repeater networks with complex topology. The scheme includes three co...
详细信息
This paper proposes a quantum network coding scheme for general repeater networks so as to support long-distance quantum communication over quantum repeater networks with complex topology. The scheme includes three core parts: graph transformation, quantum channel generation, quantum information transmission. Concretely, the degree-3 (D-3) graph transformation scheme is introduced, the quantum channel generation schemes for the cases of one-to-many, many-to-one, and many-to-many are given, and quantum information is transmitted by means of quantum teleportation. Without limitation of preparation, entangled states with arbitrary entanglement degree can be consumed as a resource of quantum communication. Scheme analysis shows that the proposed quantum network coding scheme can realize high-rate and long-distance transmission of quantum information in general networks.
Transferring quantum states efficiently between distant nodes of an information processing circuit is an essential primitive in quantum communication and information processing. Here, we present in a solid-state syste...
详细信息
Transferring quantum states efficiently between distant nodes of an information processing circuit is an essential primitive in quantum communication and information processing. Here, we present in a solid-state system base transmitting K quantum states crossly in the quantumnetworks with K-pair sender-receiver and one bottleneck channel with high fidelity only with sharing quantum entanglement between senders.
Considering the problem of how to efficiently transmit unknown quantum states in multi-unicast networks, we propose a nonlinear quantum network coding scheme with classical communication resource. On the conditions of...
详细信息
ISBN:
(纸本)9781467395267
Considering the problem of how to efficiently transmit unknown quantum states in multi-unicast networks, we propose a nonlinear quantum network coding scheme with classical communication resource. On the conditions of free classical communication between adjacent nodes in a network, as well as unlimited capacities of classical channels, perfect quantum network coding is available. By means of local phase deviation correction, we design the encoding procedure of nonlinear coding scheme. Moreover, we provide the upper bound on the total number of classical communication which is required to achieve quantum communication, as well as the analysis of scheme property.
It seems impossible to endow opportunistic characteristic to quantumnetwork on the basis that quantum channel cannot be overheard without disturbance. We propose an opportunistic quantum network coding scheme by taki...
详细信息
ISBN:
(纸本)9781467395267
It seems impossible to endow opportunistic characteristic to quantumnetwork on the basis that quantum channel cannot be overheard without disturbance. We propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation. On one hand, it utilizes quantum channel for the secure transmission of quantum states and can detect eavesdroppers by means of quantum channel verification. On the other hand, it utilizes classical channel for opportunistic listening and can acquire coding opportunity from neighbors. Analysis results show that our scheme can reduce the times of transmissions for relay nodes and can effectively defend against classical passive attack and quantum active attack.
This letter proposes new quantum network coding schemes based on controlled teleportation to control the decoding process of receivers in a butterfly network. Firstly, a quantum network coding scheme with two controll...
详细信息
This letter proposes new quantum network coding schemes based on controlled teleportation to control the decoding process of receivers in a butterfly network. Firstly, a quantum network coding scheme with two controllers is proposed based on the paradigm XQQ (crossing two qubits) protocol. Then the other scheme based on the perfect quantum network coding protocol with prior entanglement is designed for high fidelity. By introducing the controller, our schemes realize that the decoding process of unicast stream can be controlled, which is helpful to extend these schemes to a general network with unicast or multicast. Our schemes also provide a convenient model to combine authentication into quantumnetwork and would be significant to enhance the security of quantum communication.
It seems impossible to endow opportunistic characteristic to quantumnetwork on the basis that quantum channel cannot be overheard without disturbance. We propose an opportunistic quantum network coding scheme by taki...
详细信息
ISBN:
(纸本)9781467395274
It seems impossible to endow opportunistic characteristic to quantumnetwork on the basis that quantum channel cannot be overheard without disturbance. We propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation. On one hand, it utilizes quantum channel for the secure transmission of quantum states and can detect eavesdroppers by means of quantum channel verification. On the other hand, it utilizes classical channel for opportunistic listening and can acquire coding opportunity from neighbors. Analysis results show that our scheme can reduce the times of transmissions for relay nodes and can effectively defend against classical passive attack and quantum active attack.
Although perfect quantum network coding has been proved to be achievable, it is stiU puzzling whether it is feasible whenever one or more of the channels are replaced by the hidden ones emerging from quantum entanglem...
详细信息
Although perfect quantum network coding has been proved to be achievable, it is stiU puzzling whether it is feasible whenever one or more of the channels are replaced by the hidden ones emerging from quantum entanglement. The question is answered in this paper. First, we propose a quantum network coding protocol over a butterfly network with two hidden channels. Second, we investigate a more generaJ situation, where d-level quantum letters are transmitted through the network containing arbitrarily distributed hidden channels, and prove that quantum network coding on such networks is still achievable.
We propose a scheme where one can exploit auxiliary resources to achieve quantum multicast communication with networkcoding over the butterfly *** this paper,we propose the quantum 2-pair multicast communication sche...
详细信息
We propose a scheme where one can exploit auxiliary resources to achieve quantum multicast communication with networkcoding over the butterfly *** this paper,we propose the quantum 2-pair multicast communication scheme,and extend it to k-pair multicast communication over the extended butterfly ***,an EPR pair is shared between each adjacent node on the butterfly network,and make use of local operation and classical communication to generate entangled relationship between non-adjacent ***,each sender adds auxiliary particles according to the multicast number k,in which the CNOT operations are applied to form the multi-particle entangled ***,combined with networkcoding and free classical communication,quantum multicast communication based on quantum measurements is completed over the extended butterfly *** only the bottleneck problem is solved,but also quantum multicast communication can be completed in our *** the same time,regardless of multicast number k,the maximum capacity of classical channel is 2 bits,and quantum channel is used only once.
In order to solve the information leakage caused by dishonest intermediate nodes in quantum network coding, we apply quantum homomorphic encryption to the butterfly network, and propose a secure protocol for crossing ...
详细信息
In order to solve the information leakage caused by dishonest intermediate nodes in quantum network coding, we apply quantum homomorphic encryption to the butterfly network, and propose a secure protocol for crossing two qubits. Firstly, in the communication process between two senders and the first intermediate node, two senders encrypt their measured particles and send them to the first intermediate node for encoding. If two intermediate nodes are dishonest and know the encryption rules between two senders and two receivers, or there is an external eavesdropper, none of them can recover the transmitted qubits of two senders from the encrypted transmitted particles. In this way, our protocol can transmit two qubits safely and crossly in the butterfly network. Secondly, by analyzing the internal participant attack and the external eavesdropper attack launched by dishonest intermediate nodes and an external eavesdropper respectively, it is confirmed that our protocol is secure. Finally, the experimental simulation results based on the Qiskit framework prove that our protocol is feasible.
暂无评论