Waiting time in quantum repeaters with probabilistic entanglement swapping
نویسندگان
چکیده
منابع مشابه
Quantum Key Distribution using Entanglement Swapping
Cryptography has been one of the most fruitful applications coming out of quantum information theory and it appears to be practically implementible in the nearest future among quantum technology [1]. A number of cryptographic key distribution protocols based on quantum mechanics have been proposed. Bennett and Brassard [2] were the first to propose a quantum based key distribution (called BB84)...
متن کاملDeterminant Quantum Key Distribution Via Entanglement Swapping
The efficiency of the quantum key agreement protocol that was designed by replacing classical channel with a quantum one during quantum teleportation is reanalyzed and an improved quantum key distribution protocol is presented by making best of the properties of entanglement swapping. The improved quantum key distribution protocol is secure because the key bits only depend on the random measure...
متن کاملSecure quantum dialogue using entanglement swapping
In this study, a protocol for secure quantum dialogue using entanglement swapping was proposed. The protocol employs two independent communication channels, a classical channel and a quantum channel. In this scheme, the legitimate communicators Alice and Bob can pass the authentication by the classical trusted channel. Afterwards, a quantum channel sequence is provided for them, on which Alice ...
متن کاملQuantum teleportation and entanglement swapping with linear optics logic gates
We report on the usage of a linear optics phase gate for distinguishing all four Bell states simultaneously in a quantum teleportation and entanglement swapping protocol. This is demonstrated by full state tomography of the one and two qubit output states of the two protocols, yielding average state fidelities of about 0.83 and 0.77, respectively. In addition, the performance of the teleportati...
متن کاملQuantum entanglement swapping with spontaneous parametric down conversion
Two remote parties that have never interacted each other can be entangled through entanglement swapping operation done by a third party. Currently existing entanglement swapping experiments are done probabilistically by post-selection, i.e., once a successful swapping is verified, the resultant entanglement is destructed. We propose a simple non-post-selection scheme to demonstrate the high qua...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2019
ISSN: 2469-9926,2469-9934
DOI: 10.1103/physreva.100.032322