-
Condition on n-Qubit State For Getting Perfect Quantum Teleportation
Authors:
Shamiya Javed,
Phool Singh Yadav,
Ranjana Prakash,
Hari Prakash
Abstract:
It is shown that standard quantum teleportation (SQT) with multi-qubit resource result in fidelity $(2+C)/3$ where $C$ is concurrence of the resource in bipartite entanglement between qubit going to receiver and rest of the qubits. For perfect SQT, obviously, $C=1$. For a general 3-qubit resource, we find conditions for getting perfect SQT for state expressed in any basis states. Zha et al. [Mod.…
▽ More
It is shown that standard quantum teleportation (SQT) with multi-qubit resource result in fidelity $(2+C)/3$ where $C$ is concurrence of the resource in bipartite entanglement between qubit going to receiver and rest of the qubits. For perfect SQT, obviously, $C=1$. For a general 3-qubit resource, we find conditions for getting perfect SQT for state expressed in any basis states. Zha et al. [Mod. Phys. Lett. B 22, 2523-2528 (2008)], who studied perfect SQT using 3-qubit resource, reported conditions for perfect SQT for only those resource states which are given in the 3-qubit canonical form of Acin representation. We show that there is an alternative easily derivable representation which gives more generalized results. To illustrate the difference between the two schemes, we build an example of 3-qubit entangled state, giving perfect SQT and not included in Zha et al. results.
△ Less
Submitted 13 June, 2023;
originally announced June 2023.
-
Probabilistic Quantum Teleportation via 3-Qubit Non-Maximally Entangled GHZ State by Repeated Generalized Measurements
Authors:
Shamiya Javed,
Ravi Kamal Pandey,
Phool Singh Yadav,
Ranjana Prakash,
Hari Prakash
Abstract:
We propose a scheme of repeated generalized Bell state measurement (GBSM) for probabilistic quantum teleportation of single qubit state of a particle (say, 0) using 3-qubit non-maximally entangled (NME) GHZ state as a quantum channel. Alice keeps two qubits (say, 1 and 2) of the 3-qubit resource and the third qubit (say, 3) goes to Bob. Initially, Alice performs GBSM on qubits 0 and 1 which may le…
▽ More
We propose a scheme of repeated generalized Bell state measurement (GBSM) for probabilistic quantum teleportation of single qubit state of a particle (say, 0) using 3-qubit non-maximally entangled (NME) GHZ state as a quantum channel. Alice keeps two qubits (say, 1 and 2) of the 3-qubit resource and the third qubit (say, 3) goes to Bob. Initially, Alice performs GBSM on qubits 0 and 1 which may lead to either success or failure. On obtaining success, Alice performs projective measurement on qubit 2 in the eigen basis of $σ_{x}$. Both these measurement outcomes are communicated to Bob classically, which helps him to perform a suitable unitary transformation on qubit 3 to recover the information state. On the other hand, if failure is obtained, the next attempt of GBSM is performed on qubits 0 and 2. This process of repeating GBSM on alternate pair of qubits may continue until perfect teleportation with unit fidelity is achieved. We have obtained analytical expressions for success probability up to three repetitions of GBSM. The success probability is shown to be a polynomial function of bipartite concurrence of the NME resource. The variation of success probability with the bipartite concurrence has been plotted which shows the convergence of success probability to unity with GBSM repetitions.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
Strongly bound excitons in monolayer MoSi$_2$Z$_4$ (Z = pnictogen)
Authors:
Pushpendra Yadav,
Bramhachari Khamari,
Bahadur Singh,
K. V. Adarsh,
Amit Agarwal
Abstract:
Reduced dielectric screening in two-dimensional materials enables bound excitons, which modifies their optical absorption and optoelectronic response even at room temperature. Here, we demonstrate the existence of excitons in the bandgap of the monolayer family of the newly discovered synthetic MoSi$_2$Z$_4$ (Z = N, P, and As) series of materials. All three monolayers support several bright and st…
▽ More
Reduced dielectric screening in two-dimensional materials enables bound excitons, which modifies their optical absorption and optoelectronic response even at room temperature. Here, we demonstrate the existence of excitons in the bandgap of the monolayer family of the newly discovered synthetic MoSi$_2$Z$_4$ (Z = N, P, and As) series of materials. All three monolayers support several bright and strongly bound excitons with binding energies varying from 1 eV to 1.35 eV for the lowest energy exciton resonances. On increasing the pump fluence, the exciton binding energies get renormalized, leading to a redshift-blueshift crossover. Our study shows that the MoSi$_2$Z$_4$ series of monolayers offer an exciting test-bed for exploring the physics of strongly bound excitons and their non-equilibrium dynamics.
△ Less
Submitted 10 July, 2022;
originally announced July 2022.
-
Controlled bi-directional quantum teleportation of superposed coherent state using five qubit cluster-type entangled coherent state as a resource
Authors:
Ravi Kamal Pandey,
Phool Singh Yadav,
Ranjana Prakash,
Hari Prakash
Abstract:
We consider the problem of bi-directional controlled quantum teleportation of information encoded in phase opposite coherent state among two distant partners Alice and Bob, with the consent of controller, Charlie. We use five-mode cluster-type entangled coherent state as the quantum resource to achieve this task. The scheme uses linear optical devices such as beam splitter, phase shifters, and pho…
▽ More
We consider the problem of bi-directional controlled quantum teleportation of information encoded in phase opposite coherent state among two distant partners Alice and Bob, with the consent of controller, Charlie. We use five-mode cluster-type entangled coherent state as the quantum resource to achieve this task. The scheme uses linear optical devices such as beam splitter, phase shifters, and photon counters. We have shown that for moderately large coherent amplitude, near-perfect bi-directional controlled teleportation can be obtained in terms of the average fidelity of teleportation.
△ Less
Submitted 14 December, 2021; v1 submitted 2 May, 2021;
originally announced May 2021.
-
Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation
Authors:
Mariano Lemus,
Mariana F. Ramos,
Preeti Yadav,
Nuno A. Silva,
Nelson J. Muga,
Andre Souto,
Nikola Paunkovic,
Paulo Mateus,
Armando N. Pinto
Abstract:
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments us…
▽ More
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments using classical hash functions. With the presented hybrid approach, quantum and classical, we obtain a practical and high-speed oblivious transfer protocol, secure even against quantum computer attacks. The oblivious distributed keys allow implementing a fast and secure oblivious transfer protocol, which can pave the way for the widespread of applications based on secure multiparty computation.
△ Less
Submitted 17 June, 2020; v1 submitted 25 September, 2019;
originally announced September 2019.
-
Experimental Semi-quantum Key Distribution With Classical Users
Authors:
Francesco Massa,
Preeti Yadav,
Amir Moqanaki,
Walter O. Krawec,
Paulo Mateus,
Nikola Paunković,
André Souto,
Philip Walther
Abstract:
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanic…
▽ More
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanics and therefore requires the users to be capable of performing quantum operations, such as state preparation or measurements in multiple bases. A natural question is whether and to what extent these requirements can be relaxed and the quantum capabilities of the users reduced. Here we demonstrate a novel quantum key distribution scheme, where users are fully classical. In our protocol, the quantum operations are performed by an untrusted third party acting as a server, which gives the users access to a superimposed single photon, and the key exchange is achieved via interaction-free measurements on the shared state. We also provide a full security proof of the protocol by computing the secret key rate in the realistic scenario of finite-resources, as well as practical experimental conditions of imperfect photon source and detectors. Our approach deepens the understanding of the fundamental principles underlying quantum key distribution and, at the same time, opens up new interesting possibilities for quantum cryptography networks
△ Less
Submitted 18 September, 2022; v1 submitted 5 August, 2019;
originally announced August 2019.
-
Quantum contract signing with entangled pairs
Authors:
P. Yadav,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients' honesty and deliver signed certificates. The protocol is {\em fair}, i.e., the probability that a client, say Bob, can o…
▽ More
We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients' honesty and deliver signed certificates. The protocol is {\em fair}, i.e., the probability that a client, say Bob, can obtain a signed copy of the contract, while Alice cannot, can be made arbitrarily small, and scales as $N^{-1/2}$, where $4N$ is the total number of rounds (communications between the two clients) of the protocol. Thus, the protocol is {\em optimistic}, as the cheating is not successful, and the clients rarely have to contact Trent to confirm their honesty by delivering the actual signed certificates of the contract. Unlike the previous protocol [Paunković, et al., 2017], in the present proposal, a single client can obtain the signed contract alone, without the need for the other client's presence. When first contacting Trent, the clients do not have to agree upon a definitive contract. Moreover, even upon terminating the protocol, the clients do not reveal the actual contract to Trent. Finally, the protocol is based on the laws of physics, rather than on mathematical conjectures and the exchange of a large number of signed authenticated messages during the actual contract signing process. Therefore, it is {\em abuse-free}, as Alice and Bob cannot prove they are involved in the contract signing process.
△ Less
Submitted 3 September, 2019; v1 submitted 27 November, 2017;
originally announced November 2017.
-
Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique
Authors:
Preeti Yadav,
R. Srikanth,
Anirban Pathak
Abstract:
The Goldenberg-Vaidman (GV) protocol for quantum key distribution (QKD) uses orthogonal encoding states of a particle. Its security arises because operations accessible to Eve are insufficient to distinguish the two states encoding the secret bit. We propose a two-particle cryptographic protocol for quantum secure direct communication, wherein orthogonal states encode the secret, and security aris…
▽ More
The Goldenberg-Vaidman (GV) protocol for quantum key distribution (QKD) uses orthogonal encoding states of a particle. Its security arises because operations accessible to Eve are insufficient to distinguish the two states encoding the secret bit. We propose a two-particle cryptographic protocol for quantum secure direct communication, wherein orthogonal states encode the secret, and security arises from restricting Eve from accessing any two-particle operations. However, there is a non-trivial difference between the two cases. While the encoding states are perfectly indistinguishable in GV, they are partially distinguishable in the bi-partite case, leading to a qualitatively different kind of information-vs-disturbance trade-off and also options for Eve in the two cases.
△ Less
Submitted 9 September, 2014; v1 submitted 19 September, 2012;
originally announced September 2012.