Literature DB >> 36010741

Probabilistic Hierarchical Quantum Information Splitting of Arbitrary Multi-Qubit States.

Jie Tang1, Song-Ya Ma1,2,3, Qi Li1.   

Abstract

By utilizing the non-maximally entangled four-qubit cluster states as the quantum channel, we first propose a hierarchical quantum information splitting scheme of arbitrary three-qubit states among three agents with a certain probability. Then we generalize the scheme to arbitrary multi-qubit states. Hierarchy is reflected on the different abilities of agents to restore the target state. The high-grade agent only needs the help of one low-grade agent, while the low-grade agent requires all the other agents' assistance. The designated receiver performs positive operator-valued measurement (POVM) which is elaborately constructed with the aid of Hadamard matrix. It is worth mentioning that a general expression of recovery operation is derived to disclose the relationship with measurement outcomes. Moreover, the scheme is extended to multiple agents by means of the symmetry of cluster states.

Entities:  

Keywords:  POVM; hierarchical quantum information splitting; multi-qubit state; non-maximally entangled cluster state; recovery operation

Year:  2022        PMID: 36010741      PMCID: PMC9407153          DOI: 10.3390/e24081077

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.738


1. Introduction

With the rapid development of computer networks, the demand for information security is sharply increasing. Quantum cryptography has unconditional security, which depends on the internal physical characteristics of quantum mechanics, such as the Heisenberg uncertainty principle and non-cloning theorem [1]. As the counterpart of classical secret sharing [2], quantum secret sharing (QSS) was first introduced by Hillery et al. [3] and has been one of the most significant branches of quantum cryptography. In QSS, the secret is divided into multiple pieces (called shares) and it can be constructed only through the cooperation of the shares. When the shared secret is a quantum state, QSS is termed quantum state sharing (QSTS) or quantum information splitting (QIS). The other agents can be regarded as the controlling party if one agent is identified as the receiver. From this point of view, QIS can be used to complete the task of controlled quantum teleportation (CQT) [4] in which an unknown state is teleported from a sender to a spatially separated receiver under the supervision of one or more controllers. Owing to its potential applications, e.g., creating joint accounts containing quantum money [5] and secure distributed quantum computation [6], QIS has been intensively studied [7,8,9,10,11,12,13,14,15] in the past two decades. For example, Luo et al. [11] investigated the application of state for QIS of an arbitrary three-qubit state. Li et al. [12] proposed a novel class of universal and flexible QIS schemes of arbitrary qubit and qudit states using quantum walks with multiple coins. In the meantime, experimental implementation of QIS has been reported [16,17,18]. The QIS schemes mentioned above mainly focus on the situation in which the authorities of the agents are identical. Considering the actual communication circumstance, Wang et al. [19] first proposed a hierarchical quantum information splitting (HQIS) scheme in the case where the agents are graded according to their abilities to restore the secret state. The high-grade agent requires some of the other agents’ help to complete the task, while the low-grade agent can do it only if all the other agents supply the assistance. Since then, much attention [20,21,22,23,24,25] has been paid to HQIS due to its useful applications in practice. Like many other quantum communication schemes [26,27,28], HQIS prefers using maximal entanglement to achieve perfect transmission. Nevertheless, the maximally entangled states are hard to maintain owing to the decoherence induced by the surrounding environment [29]. Thus, it is of great importance to investigate quantum communication via non-maximally entangled (NME) states [30,31,32,33,34,35,36]. Recently, based on NME four-particle cluster states, Xu et al. [35] and Guo et al. [36] respectively sketched new HQIS protocols to probabilistically realize the QSS of arbitrary unknown single-qubit state and two-qubit state via POVM. To our knowledge, there are no universal HQIS schemes of arbitrary multi-qubit states via POVM. In this paper, we intend to devise a universal scheme to achieve the HQIS of arbitrary multi-qubit states with three agents via the NME resource. The agents lie in two disparate grades of which one agent lies in the high grade and two agents lie in the low grade. With the aid of the Hadamard matrix, we construct the general POVM operators. The recovery operation is derived from a general expression which distinctly discloses the relationship with measurement results. Based on the assistance of one inferior agent, the high-grade agent as the designated receiver can recover the target state with a certain probability by performing POVM rather than the usual projective measurement. While the low-grade agent requires all agents’ help. Then, we generalize the scheme from three agents to multiple agents by means of the symmetry of cluster states. The outline of this paper is organized as follows. In Section 2, we first put forward a probabilistic HQIS scheme of arbitrary three-qubit states with three agents by utilizing the NME four-qubit cluster states as the entangled resource. The above scheme is extended to arbitrary n-qubit states in Section 3. In Section 4, we generalize the universal scheme of multi-qubit states from three agents to multiple agents. Section 5 is the security analysis. Some discussions and conclusions are given in the last section.

2. Probabilistic HQIS of Arbitrary Three-Qubit States with Three Agents

There are four participants, Alice, Bob, Charlie1 and Charlie2. Alice is the sender who wishes to teleport an unknown state to three agents in an asymmetric way such that any one of them can restore the secret state under the cooperation of other agents. The three agents are divided into two grades according to their abilities to recover the target state. High-grade agent Bob can restore the secret state only with the help of one low-grade agent while low-grade agent Charlie1 or Charlie2 needs the assistance of all the other agents. Alice possesses a secret three-qubit state: She knows nothing about the state except that the complex parameters satisfy the normalization condition . Three NME four-qubit cluster states, are selected as entangled resource, where are nonzero real numbers satisfying and . The qubit is held by Alice, qubits , and are distributed to the agents Bob, Charlie1 and Charlie2, respectively. The initial whole system can be expressed as: For convenience, we denote , where p is the decimal form of the binary string . In other words, . To complete the task, the participants need to perform the following operations. Step 1 The sender Alice performs two-qubit projective measurements on her qubits , , under Bell basis, After the measurements, she broadcasts 6 bit classical information corresponding to her measurement outcome , . As a result, the remaining state collapses with equal probability into one of the 64 states : Here and hereafter ⊕ means modulo 2 addition. In order to clearly explain how our protocol implements, suppose Alice’s measurement result is . The three agents’ qubits become At this time, none of the agents can recover the target state privately since their qubits are entangled with each other. Other agents’ cooperation is indispensable for the designated agent to complete his recovery task. Step 2 According to Alice’s classical message, the agents apply the appropriate operations to achieve the goal that any one of agents recovers the secret state. It will be discussed in two cases as far as the agents’ different authorities are concerned. Case 1 The high-grade agent is designated as the receiver. The state in Equation (7) can be decomposed as: where It is clear that Charlie1’s and Charlie2’s qubits are identical. From Equation (8), if one of them carries out single-qubit projective measurements under Z-basis , the qubits of Bob and the other low-grade agent will collapse into a product state. That means only one of the low-grade agents is sufficient to supply assistance. Suppose Charlie1 performs projective measurements and gets result , which is sent to Bob in the form of classical message 010. Then Bob’s qubits collapse into: One can see that Bob’s state mix the information of the secret state and the entangled channel. To reconstruct the secret state, Bob introduces three auxiliary qubits with initial states and executes Controlled-NOT (CNOT) operations with the qubit as the controlled qubit and as the target one, . Thus, Bob’s state transforms into: Denote and where H is the Hadamard matrix . Then Equation (11) can be rephrased as: It shows that can be obtained if performing appropriate measurements on the auxiliary qubits and obtains the measurement result . Unfortunately, are not mutually orthogonal such that they cannot be distinguished deterministically by the usual projective measurement. To differentiate non-orthogonal states, Bob needs to execute POVM on his auxiliary qubits under measurement operators : where is a coefficient related with and Here, . In order to ensure operator is positive, should satisfy . If Bob obtains the measurement result with the probability , he can restore the target state by performing appropriate Pauli operations. For clarity, assume his measurement result is . Then Bob performs operation on his collapsed state and recovers the target state. Bob’s recovery operations conditioned on Charlie1’s (or Charlie2’s) measurement result and his own POVM outcome are summarized in Table 1, where I, X, Y, Z are the Pauli operations. However, Bob may also get with the probability . In this case, he cannot infer the secret state of his qubits. Therefore, the total success probability is:
Table 1

Bob’s recovery operations (BRO) depending on one low-grade agent’s measurement outcome (LAMO) and his own POVM outcome .

LAMO r1r2r3 BRO r1r2r3 BRO
|000 000 YB1XB2ZB3 100 XB1XB2ZB3
001 YB1XB2IB3 101 XB1XB2IB3
010 YB1YB2ZB3 110 XB1YB2ZB3
011 YB1YB2IB3 111 XB1YB2IB3
|001 000 YB1XB2IB3 100 XB1XB2IB3
001 YB1XB2ZB3 101 XB1XB2ZB3
010 YB1YB2IB3 110 XB1YB2IB3
011 YB1YB2ZB3 111 XB1YB2ZB3
|010 000 YB1YB2ZB3 100 XB1YB2ZB3
001 YB1YB2IB3 101 XB1YB2IB3
010 YB1XB2ZB3 110 XB1XB2ZB3
011 YB1XB2IB3 111 XB1XB2IB3
|011 000 YB1YB2IB3 100 XB1YB2IB3
001 YB1YB2ZB3 101 XB1YB2ZB3
010 YB1XB2IB3 110 XB1XB2IB3
011 YB1XB2ZB3 111 XB1XB2ZB3
|100 000 XB1XB2ZB3 100 YB1XB2ZB3
001 XB1XB2IB3 101 YB1XB2IB3
010 XB1YB2ZB3 110 YB1YB2ZB3
011 XB1YB2IB3 111 YB1YB2IB3
|101 000 XB1XB2IB3 100 YB1XB2IB3
001 XB1XB2ZB3 101 YB1XB2ZB3
010 XB1YB2IB3 110 YB1YB2IB3
011 XB1YB2ZB3 111 YB1YB2ZB3
|110 000 XB1YB2ZB3 100 YB1YB2ZB3
001 XB1YB2IB3 101 YB1YB2IB3
010 XB1XB2ZB3 110 YB1XB2ZB3
011 XB1XB2IB3 111 YB1XB2IB3
|111 000 XB1YB2IB3 100 YB1YB2IB3
001 XB1YB2ZB3 101 YB1YB2ZB3
010 XB1XB2IB3 110 YB1XB2IB3
011 XB1XB2ZB3 111 YB1XB2ZB3
Case 2 The low-grade agent is designated as the receiver. Suppose Charlie1 is appointed as the receiver since Charlie1 and Charlie2 have the same authority. Denote and Then the state in Equation (7) can be rewritten as: where To achieve the goal, both Bob and Charlie2 carry out projective measurements under X-basis and inform Charlie1 of the measurement outcomes in forms of classical message. Corresponding to Charlie2’s measurement outcome, Charlie1 first performs the unitary operation listed in Table 2.
Table 2

Charlie1’s operations depending on Charlie2’s measurement outcome (MO).

Charlie2’s MOCharlie1’s Operation
|+++ HC11HC12HC13
|++ HC11HC12(XH)C13
|++ HC11(XH)C12HC13
|+ HC11(XH)C12(XH)C13
|++ (XH)C11HC12HC13
|+ (XH)C11HC12(XH)C13
|+ (XH)C11(XH)C12HC13
| (XH)C11(XH)C12(XH)C13
To be explicit, assume Bob and Charlie2’s measurement outcomes are and , then the remaining qubits collapse into: Charlie1 performs the operation and gets: In the following, Charlie1 employs similar operations to those of the assigned receiver Bob in Case 1. Charlie1 introduces three qubits with initial states and obtains after performing the CNOT operations , . Then he performs POVM defined in Equation (15). If Charlie1 obtains with equal probability , he can execute appropriate Pauli operations listed in Table 3 to recover the secret state. Otherwise, he fails.
Table 3

Charlie1’s recovery operation (CRO) depending on his own POVM measurement outcome when Bob and Charlie2’s outcomes are and .

r1r2r3 CRO r1r2r3 CRO
000 YC11YC12IC13 100 XC11YC12IC13
001 YC11YC12ZC13 101 XC11YC12ZC13
010 YC11XC12IC13 110 XC11XC12IC13
011 YC11XC12ZC13 111 XC11XC12ZC13
Similar discussions can be made for other measurement results of Alice, Bob and Charlie2. Take all the possible measurement results into account, one can find that the success probability of Charlie1 is identical to that in Equation (18).

3. Probabilistic HQIS of Arbitrary -Qubit States with Three Agents

The above scheme for an arbitrary three-qubit state can be generalized to an arbitrary n-qubit state, where the subscript a represents the decimal form of binary string , is a complex number satisfying . n NME four-qubit cluster states defined in Equation (2) are shared as the quantum channel, where the particle is in Alice’s possession, while the agents Bob, Charlie1 and Charlie2 possess particles , , , . The combined state of the total system is: The detailed process is described as follows. Step 1 Alice initially executes joint projective measurements on her qubits   under the Bell basis. Then, she broadcasts cbits to announce her measurement result . Since the state collapses into Step 2 According to Alice’s measurement result, the agents perform the appropriate operations to realize that any one of agents recovers the secret state. Due to the different grades of agents, we still discuss it in two cases. Case 1 The high-grade agent is designated as the receiver. The high-grade agent Bob only requires the help of one low-grade agent as Charlie1 and Charlie2 have exactly the same qubits. If one of the low-grade agents performs n single-qubit projective measurements under the Z-basis and obtains the measurement result which is sent to Bob in the form of classical bits , Bob’s qubits collapse into Bob introduces n auxiliary qubits and performs CNOT operations . Thus, he gets The state in the above equation can be decomposed into: where and Since are not mutually orthogonal in general, Bob had better perform POVM which plays an important role in state discrimination. The measurement operators are: where is related to the coefficient of the quantum channel and Here, and satisfies which is to meet the condition that the elements of POVM must be positive operators. If Bob obtains measurement result with equal probability , his qubits collapse to . Then, Bob performs and recovers the target state. If his measurement outcome is , he fails. Case 2 The low-grade agent is designated as the receiver. Suppose Charlie1 is assigned as the receiver. Bob and Charlie2 need to perform projective measurements under the X-basis and inform him of the measurement outcomes. Since Charlie1’s qubits collapse into: If Bob’s and Charlie2’s measurement outcomes are and , , . Charlie1 performs and gets: Similar to Case 1, Charlie1 carries out POVM in Equation (35) after introducing auxiliary qubits and performing CNOT operations. If his measurement outcome is , Charlie1 can reconstruct the secret state by performing recovery operation While measurement result indicates the task is failed. Regardless of the grade of agents, the total success probability is: Since , the total success probability is

4. Probabilistic HQIS of Arbitrary -Qubit States with Agents

It is necessary to investigate the situation of multiple agents as there are many users in a practical communication network. The hierarchy of agents may be diverse. Here, we consider one simple case in which the N agents are divided into two grades: u agents (Bob1, ⋯, Bob) lie in high grade and v agents (Charlie1, ⋯, Charlie) lie in low grade. The main aim is teleporting an arbitrary n-qubit state shown in Equation (26) from the sender to any one of the N agents in an asymmetrical way. Before the scheme officially begins, Alice prepares n NME four-qubit cluster states , and introduces some qubits . Then she carries out a series of CNOT operations as shown in Figure 1 and gets where
Figure 1

The generation circuit of the state .

Next, Alice distributes the qubits , to Bob1, ⋯, Bob, Charlie1, ⋯, and Charlie, respectively. The distribution of qubits among N agents is shown in Figure 2.
Figure 2

The qubit shared by the sender and N agents. White points represent Alice’s secret particles, black points represent particles in the NME cluster states. The solid lines stand for entanglements.

The initial whole system is: The scheme can be illustrated as follows. Step 1 The sender Alice carries out Bell-basis measurements on her qubits . If the measurement result is , she broadcasts classical bits , , . Since the state in Equation (46) can be rewritten as: the state collapses to: Step 2 According to Alice’s classical message, the agents apply the appropriate operations to achieve the goal that any one of agents recovers the secret state. Since the same-grade agents have the same authority, we assume that the high-grade agent Bob1 or the low-grade agent Charlie1 recovers the secret state. Case 1 The high-grade agent Bob1 is designated as the receiver. The state in Equation (48) can be rewritten as: up to the global phase. Only if the other high-grade agent and one low-grade agent respectively perform projective measurements under the X-basis and Z-basis, can Bob1 restore the target state with a certain probability. Assume the measurement results of Bob2, ⋯, Bob are and the measurement outcomes of Charlie1 are , where , , . At the moment, Bob1’s qubits collapse into: up to the global phase. Bob1 introduces auxiliary qubits and performs CNOT operations . Thus, he gets: Then he performs POVM in Equation (35) on the auxiliary qubits. Analogously, if his POVM outcome is , Bob1 carries out unitary operation and restores the secret state on his own qubits. If he obtains measurement result , the goal cannot be achieved. Case 2 The low-grade agent Charlie1 is designated as the receiver. To assist Charlie1 in recovering the target state, all the other agents perform projective measurements under the X-basis and inform him of the measurement outcomes. Assume the measurement outcomes of Bob1, ⋯, Bob, Charlie2, ⋯ Charlie are , , . Then Charlie1’s qubits collapse into: up to a global phase. Charlie1 performs and gets Similar to Case 1, Charlie1 performs POVM in Equation (35) after introducing auxiliary qubits and executing CNOT operations. If the measurement outcome is , his recovery operation can be summarized as: While measurement result indicates task is failed. The total success probability is the same as the case of three agents.

5. Security Analysis

For simplicity, take the case of three agents as an example. In order to ensure the security, Alice adopts the following strategies to detect eavesdropping. Besides n NME four-qubit cluster states , , Alice generates an ordered sequence using all the first qubits in her possession. Similarly, she forms another three ordered sequences , and . Then she prepares decoy photons chosen from and randomly insert them into the three sequence to yield the larger sequences , , . It should be emphasized that the final order of all sequences is only known by Alice. There are two kinds of eavesdropping. One is that an illegal external eavesdropper Eve manages to steal secret information, the other is that there is a dishonest internal eavesdropper. (I) Outsider attack. It is not determined which agent is the receiver until the entangled channel particles are distributed. In order to obtain the secret state, Eve intercepts all particles distributed from Alice to the three agents and resends the forged one to them. In this case, once Alice conducts eavesdropping inspection, she tells the three agents about the location, state and measurement basis (Z-basis or X-basis). Then she asks each agent to measure the decoy photons under the measurement basis and publish the measurement results. Only if the agents’ measurement results are consistent with Alice’s predicted results, does the protocol continue. In addition, since Eve has no access to the coefficients of the NME channel, he can not carry out correct POVM to restore the secret state even if he intercepts the agents’ particles. (II) Insider attack. The influence of dishonest agents is destructive. Without loss of generality, assume that high-grade agent Bob is the internal eavesdropper. If everyone completely ignores his identity and consents to him as the receiver, he can easily acquire the secret state. In this case, our agreement cannot resist internal attacks. If the low-grade agent is designated as the receiver and Bob wants to steal the confidential state, one way is to intercept the channel particles of the low-grade agents and resend them false particles. However, because the decoy photons of different agents are different, eavesdropping will be found by the eavesdropping inspection. Another way is an entanglement measurement attack. Bob performs the unitary operation to act on Charlie1’s or Charlie2’s particles he has intercepted and the auxiliary particles he has prepared, so that he can measure the auxiliary particles to obtain information about the secret state. This attack will also be detected because of errors caused by decoy particles. The specific process is similar to that in Ref. [37].

6. Discussions and Conclusions

In fact, besides POVM, the designated receiver can adopt the collective unitary operation to restore the secret state. Taking the high-grade agent Bob as the receiver, based on one of the low-grade agent’s help, Bob’s qubits collapse into the state in Equation (30). Similar to Ref. [34], Bob first introduces an auxiliary qubit and performs a collective unitary transformation on his qubits . Then Bob measures the auxiliary qubit under the Z-basis. If the measurement result is , he performs appropriate operations on the collapsed state and recovers the target state. If the measurement result is , the protocol fails. In conclusion, we devise a universal scheme to probabilistically realize the HQIS of arbitrary multi-qubit states among multiple agents by using NME four-qubit cluster states as the quantum resource. Comparing with the HQIS scheme for arbitrary single- and two-qubit states [22,23], our work has the following advantages: (1) Our schemes are applicable for arbitrary multi-qubit states with the aid of elaborately constructed multi-qubit POVM; (2) We derive the general expression of a recovery operation which clearly discloses the relationship with the measurement results; (3) We describe the specific process of HQIS with multiple agents. Our schemes are practical as NME states are easier to generate and maintain than the maximally entangled resources and agents’ unequal authorities are in line with the actual communication. Moreover, the preparation of the NME four-qubit cluster states, Bell-basis measurement, local CNOT and Pauli operations and POVM are required in our schemes. Besides POVM, other operations are easily implemented. Fortunately, POVM can be realized by using measurement assisted programmable quantum processors [38] and the ensemble approach to polarization optics [39]. It means our schemes are achievable since these necessary operations are feasible under the current experimental technologies.
  6 in total

1.  Positive-operator-valued-measure view of the ensemble approach to polarization optics.

Authors:  A V Gopala Rao; A R Usha Devi; A K Rajagopal
Journal:  J Opt Soc Am A Opt Image Sci Vis       Date:  2008-04       Impact factor: 2.129

2.  Scheme for reducing decoherence in quantum computer memory.

Authors: 
Journal:  Phys Rev A       Date:  1995-10       Impact factor: 3.140

3.  Deterministic delivery of remote entanglement on a quantum network.

Authors:  Peter C Humphreys; Norbert Kalb; Jaco P J Morits; Raymond N Schouten; Raymond F L Vermeulen; Daniel J Twitchen; Matthew Markham; Ronald Hanson
Journal:  Nature       Date:  2018-06-13       Impact factor: 49.962

4.  Secret Sharing of a Quantum State.

Authors:  He Lu; Zhen Zhang; Luo-Kan Chen; Zheng-Da Li; Chang Liu; Li Li; Nai-Le Liu; Xiongfeng Ma; Yu-Ao Chen; Jian-Wei Pan
Journal:  Phys Rev Lett       Date:  2016-07-13       Impact factor: 9.161

5.  Quantum Teleportation of Shared Quantum Secret.

Authors:  Sang Min Lee; Seung-Woo Lee; Hyunseok Jeong; Hee Su Park
Journal:  Phys Rev Lett       Date:  2020-02-14       Impact factor: 9.161

6.  Splitting an Arbitrary Three-Qubit State via a Five-Qubit Cluster State and a Bell State.

Authors:  Gang Xu; Tianai Zhou; Xiu-Bo Chen; Xiaojun Wang
Journal:  Entropy (Basel)       Date:  2022-03-08       Impact factor: 2.524

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.