Secure Controlled Teleportation
نویسندگان
چکیده
Several protocols for controlled teleportation were suggested by Yang, Chu, and Han [PRA 70, 022329 (2004)]. In these protocols, Alice teleports qubits (in an unknown state) to Bob iff a controller allows it. We view this problem in the perspective of secure multi-party quantum computation. We show that the suggested entanglement-efficient protocols for m-qubit controlled teleportation are open to cheating; Alice and Bob may teleport (m − 1)-qubits of quantum information, out of the controllers’ control. We conjecture that the straightforward protocol for controlled teleportation, which requires each controller to hold m entangled qubits, is optimal. We prove this conjecture for a limited, but interesting, subset of protocols.
منابع مشابه
ar X iv : q ua nt - p h / 04 03 15 5 v 1 2 2 M ar 2 00 4 Controlled quantum teleportation and secure direct communication
We present a controlled quantum teleportation protocol. In the protocol, quantum information of an unknown state of a 2-level particle is faithfully transmitted from a sender (Alice) to a remote receiver (Bob) via an initially shared triplet of entangled particles under the control of the supervisor Charlie. The distributed entangled particles shared by Alice, Bob and Charlie function as a quan...
متن کاملMany-agent controlled teleportation of multi-qubit quantum information
We present a general idea to construct methods for multi-qubit quantum teleportation between two remote parties with control of many agents in the network. Our methods seem to be much simpler than the existing method proposed recently (Phys. Rev. A 70, 022329(2004)). We then demonstrate our idea by using several different protocols of quantum key distribution, including Ekert 91 and the determi...
متن کاملNetwork Coding-Based Communications via the Controlled Quantum Teleportation
Inspired by the structure of the network coding over the butterfly network, a framework of quantum network coding scheme is investigated, which transmits two unknown quantum states crossly over the butterfly quantum system with the multi-photon non-maximally entangled GHZ states. In this scheme, it contains certain number of entanglement-qubit source nodes that teleport unknown quantum states t...
متن کاملSupervised secure entanglement sharing for faithful quantum teleportation via tripartite W states
We present a supervised secure entanglement sharing protocol via tripartite W states for faithful quantum teleportation. By guaranteeing a secure entanglement distribution in the charge of a third believed supervisor, quantum information of an unknown state of a 2-level particle can be faithfully teleported from the sender to the remote receiver via the Bell states distilled from the tripartite...
متن کاملQuantum Cryptography Using Various Reversible Quantum Logic Gates in WSNs
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that all...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/quant-ph/0609028 شماره
صفحات -
تاریخ انتشار 2006