Submit manuscript...
eISSN: 2576-4543

Physics & Astronomy International Journal

Research Article Volume 2 Issue 4

Remote state preparation with quantum remote control

Jia Yin Peng,1,2 Ming Qiang Bai,2 Zhi Wen Mo2

1School of Mathematics and Information Science, Neijiang Normal University, China
2College of Mathematics and Software Science, Sichuan Normal University, China

Correspondence: Jia?Yin Peng, School of Mathematics and Information Science, Neijiang Normal University, Neijiang 641199, China

Received: June 27, 2018 | Published: July 9, 2018

Citation: Jia–Yin P, Ming–Qiang B, Zhi–Wen M. Remote state preparation with quantum remote control. Phys Astron Int J. 2018;2(4):290-295. DOI: 10.15406/paij.2018.02.00101

Download PDF

Abstract

We put forward two novel and perfect protocols for preparing an arbitrary single–particle state and simultaneously implementing a rotation operator or an arbitrary unitary operator on that particle. There are schemes for either only teleporting particles or only remotely controlling quantun particles. If one has to remotely control a prepared quantum, then he/she has to first do remote state preparation and then executes the remote control on the prepared quantum. Both operations ware done separately on two sets of entanglements. However, this intuitive solution is inefficient because many resources are wasted. Thus, we attempt to complete both operations by sharing one three–particle Greenberger–Horne–Zeilinger (GHZ) state. Comparing our two protocols with the corresponding intuitive solutions, respectively, the results show that our protocols are more efficient than the corresponding intuitive solutions. Only Pauli operators, controlled–NOT gate, Bell–state measurement, single–qubit measurement, Einstein–Podolsky–Rosen (EPR) state and GHZ state are used in our schemes, so these schemes are easily realized in physical experiment.

Keywords: remote state preparation, quantum remote control, rotation operator, arbitrary unitary operator, GHZ state, EPR state

PACS

 03.67.Hk, 03.65.BZ

Introduction

In 1993, Bennett et al.1 first presented the quantum teleportation, which is one of the ingenious applications in the quantum information field.2,3 As extensions of the teleportation protocol, two recognized versions are the remote state prepartion (RSP) scheme4–5 and the joint remote state preparation (JRSP) scheme.6 Up to now, related works appeared widely and achieved great advancements in both theoretical7–24 and experimental25–26 aspects. In the above works, the quantum nonlocality of entangled particles contained in quantum states plays a very important role, and information is hidden in these quantum states, so it is called the nonlocality of quantum states.

Another kind of nonlocality comes from the quantum operator described by another kind of information, and it is also very important and useful. For example, in order to realize distributed quantum computation, Grover et al.27 & Cirac et al.28 have efficiently transferred not only quantum data but also quantum operators between the nodes of the network. That is, except for teleporting an arbitrary particle, the entanglement can also be employ to transmit the information of a unitary operator. In 2001, Huelga et al.29 first proposed the concept of quantum operation teleportation, in which a unitary operator is transferred on a qubit, would function in a manner similar to that of a remote control apparatus, and so we shall also refer to it as quantum remote control. Since then, various quantum remote control protocols30–35 have been presented.

To draw forth research questions, let’s consider a scenario: suppose that Alice, Bob, and Charlie are three legitimate participants in spatial separation. Bob intends to help Charlie prepare an arbitrary particle |ξ=x|0+yeiθ|1|ξ=x|0+yeiθ|1 (x,y0,θ[0,2π]x,y0,θ[0,2π] withx2+y2=1x2+y2=1 ), and Alice wants to do a unitary operator on the particle. How |ξ|ξ to accomplish this task? The question looks very simple, but it may be useful in quantum cryptography, such as quantum private comparison, controlled remote state preparation, quantum secret sharing and so on. Specially, in the future quantum network, such an operator can be taken as a control (encryption or decyption) on the quantum information inhabiting the particle, which can be used as a key to activate some important actions such as missile emissions, quantum collective seal or unseam, remote joint destruction of quantum money, etc.
In order to achieve the above task by utilizing the existing protocols, an intuitive solution can be adopted. That is, Bob first makes use of remote state preparation method to prepare the particle|ξ|ξ at Charlie’s site by employing an EPR state as quantum channel, and then Alice employs the quantum remote control with the other EPR state to perform her operator on the particle|ξ|ξ held by Charlie. In this paper, we attempt to provide two more efficient protocols for this question by using two different unitary operators. We aim to carry out the remote state preparation and quantum remote control simultaneously by sharing one three–qubit GHZ state.

The proposed protocols

Let us consider the following situation: there are three legitimate participants Alice, Bob and Charlie in our scheme. Assume that Bob wants to help his coworker, Charlie, prepare an arbitrary single–qubit state taking the general form

|ξb=(x|0+yeiθ|1)b,|ξb=(x|0+yeiθ|1)b,  (1)

where|0|0 and|1|1 are two eigenstates of a single–qubit, the real coefficientsx,y0x,y0 andθ[0,2π]θ[0,2π] with the normalization conditionx2+y2=1x2+y2=1 . Bob knows the information about the qubit|ξb|ξb , whereas it is unknown to his coworkers. At the same time, Alice intends to remotely perform a unitary operatorUU on|ξb|ξb .

In order to complete the above tasks, let Alice, Bob and Charlie pre–share a three–qubit GHZ state of the form

|GABC=12(|000+|111)ABC,        (2)

where Alice, Bob and Charlie have the first, the second and the third qubits, respectively. The proposed protocol is described in the following steps:
Step 1: Bos first takes an ancillary qubitB in initial state|0B , then performs aCNOTBB on qubitsB andB , whereCNOTXY is the Controlled–NOT gate acting on two qubitsX andY asCNOTXY|iX|jY=|iX|ijY with an addition mod2 . After those actions, qubi|B became entangled with those in state (3), i.e.,|GABC|0B|G' :

|G'=12(|0000ABBC+|1111ABBC).  (3)

Note that, though|G' is a 4–qubit entangled state, the actual non–local resource cots just3 qubits because the entanglement of qubitB with those in state (3) is made locally.

Step 2: Bob performs a projective measurement on her qubitB(PMB) with the basis{|ξ1,|ξ2} :

|ξ1=x|0+y|1,|ξ2=x|1y|0.            (4)

According to the measurement postulate of quantum mechanics, the|G' can be rewritten in terms of Bob’s measurement basis as

|G'=12[|ξ1B(x|000+y|111)ABC+|ξ2B(y|000+x|111)ABC].    (5)

From Equation (5) it is easily verified that Bob’sPMB will project the joint state of qubitsA ,B andC onto one of the two possible states

x|000ABC+y|111ABC,y|000ABCx|111ABC  (6)

with equal probability of1/2 . The next stage work is tricky in the sense that the feed–forward measurement strategy will be exploited. Concretely, in this stage Bob’s correct action depends essentially on the measurement outcomes of the preceding stage. Namely, if the result is |ξ1B , his needs to apply to his qubitB the following unitary operator

U1=12(1eiθ1eiθ),  (7)

which is written in the computational basis{|0B,|1B} , whereas the result is|ξ2B , then the correct unitary operator should be

U2=12(eiθ1eiθ1).  (8)

That is, using the basis

|η1=12(|0+eiθ|1),|η2=12(|0eiθ|1)

and the basis

|η1=12(eiθ|0+|1),|η2=12(eiθ|0|1),

expression (6) can be rewritten as

x|000|ABC+y|111ABC=12{|η1B(x|00+yeiθ|11)AC+|η2B(x|00yeiθ|11)AC},y|000ABCx|111ABC=12{|η1B(yeiθ|00x|11)AC+|η2B(yeiθ|00+x|11)AC}.               (9)

After measuring on the ancillary qubitB(PMB) , he broadcasts two bits classical information about his measurement results to Alice and Charlie. What is interesting is that it is not necessary for his to send secret massages. Instead, he just needs to broadcast his outcomes via any public media since these outcomes in fact mean nothing to any outside parties. It is worth noting that in the second step Bob used the forward feedback measurement techniques. Namely, the choice of basis for measuring qubitB depends essentially on the outcomes of the prior measurements on qubitB , respectively.

From Equation (9) we can see that after thePMB andPMB , the qubits held by the Alice and Charlie collapse correspondingly into the following entangled states:

|μ±AC:=x|00AC±yeiθ|11AC,|ν±AC:=x|11AC±yeiθ|00AC.     (10)

To be precise, the complete relation between the outcomes ofPMB andPMB of Bob and the combined state of Alice and Charlie is shown in Table 1.

PMB

PMB

Combined state of alice and charlie

|ξ1B

|η1B

|μ+AC=x|00AC+yeiθ|11AC

|ξ1B

|η2B

|μAC=x|00ACyeiθ|11AC

|ξ2B

|η1B

|νAC=x|11ACyeiθ|00AC

|ξ2B

|η2B

|ν+AC=x|11AC+yeiθ|00AC

Table 1 Relation among bob’s measurement results (PMB &PMB ), the combined states of alice and charlie after the measurement of bob.

The remaining steps are described separately according to different operatorsU , see the subsection 2.1 and 2.2.

The proposed protocol with remote rotatio

In this subsection, consider that Alice wants to remotely perform a rotation operatorU=Rz(ω) (about the Z axis) on|ξb , whereω[0,2π] ,

Rz(ω)eiωz/2=cosω2Iisinω2Z=12(eiω/200eiω/2).  (11)

This will produce a new quantum state:

|φb=Rz(ω)|ξb=xeiω/2|0b+yei(θ+ω/2)|1b.  (12)

Step 3: According to Bob’s measurement outcomesPMB PMB , Alice performs the rotationRz(ω) of an angleω on the first qubitA of GHZ state. IfPMB PMB is|ξ1B|ηjB (j=1,2 ), Alice performsRz(ω) on qubitA . Otherwise, Alice performsRz(ω)  onA . Then, Alice measuresA with X basis{|+=12(|0+|1),|=12(|0|1)} to obtain the measurement outcome,PMA , which will be sent to Charlie via a classical channel.

Step 4: After hearing the messages from Alice and Bob, Charlie can perform a corresponding unitary operation on qubitC to adjust the state to the one given in Equation (12). The one–to–one correspondence between Charlie’s operations and the measurement outcomes of Alice and Bob is shown in Table 2.

PMA

PMB

PMB

Operations of charlie

|+A

|ξ1B

|η1B

I

|A

|ξ1B

|η1B

σz

|+A

|ξ1B

|η2B

σz

|A

|ξ1B

|η2B

I

|+A

|ξ2B

|η1B

iσy

|A

|ξ2B

|η1B

σx

|+A

|ξ2B

|η2B

σx

|A

|ξ2B

|η2B

iσy

Table 2 The one–to–one correspondence between charlie’s unitary operations and the measurement outcomes of alice and bob.

For example, letPMB PMB is|ξ2B|η1B , the the state of the composite quantum system of qubitsA andC is|νAC=x|11ACyeiθ|00AC . Alice needs to performRz(ω) onA , then the state|νAC becomes the following form

[Rz(ω)I]|νAC=xeiω/2|11ACyeiθeiω/2|00AC.

Suppose Alice’s measurement outcome is|+A , then the state of qubitC held by Charlie will be xeiω/2|1Cyeiθeiω/2|0C . Once Charlie performs a unitary operationiσy on qubitC , he will obtain the state in Equation (12), and the quantum task has been completed.

Remark 1: In the intuitive solution corresponding to the 2.1 subsection, Bob first has to help Charlie prepare the state |ξb which requires an EPR state, a Controlled–NOT gate, two sing–qubit projective measurements, a corresponding operator and 2 bits of classical message. After that, Alice employs the quantum remote control to perform her operation on the qubit |ξb  held by Charlie.

In the remote control protocol, Alice and Charlie also have to pre–share a Bell state

|ϕ+AC=12(|00+|11)AC,  (13)

where the subscriptsA andC represent the first and the second qubit of the Bell state belonged to Alice and Charlie, respectively.

Charlie first performs aCNOTCb on qubitsC andb , and measuresb withZ basis. The composite state becomes

|χACb=12[(x|00+yeiθ|11)AC|0b+(x|11+yeiθ|00)AC|1b].  (14)

Then, Charlie sends a one–bit classical message to Alice about his measurement. If the measurement outcome is|0 , Alice and Charlie will do nothing. Otherwise, they both performσx on their qubits. Thus the state they shared becomes

|χAC=(x|00+yeiθ|11)AC.      (15)

Now Alice performsRz(ω) on her qubitA and measures it with X basis. Alice sends a one–bit classical message to Charlie about her measurement outcome. According to Alice’s message, Charlie performs a corresponding unitary operation to complete the remote control process. Hence, the remote control requires an EPR state, a Controlled–NOT gate, two single–qubit projective measurements, 4 unitary operators and 2 bits of classical message in 2 rounds of transmission.

On the other hand, in the proposed protocol, a GHZ state is used to prepare the qubit as well as remotely control the qubit. In total, the proposed protocol requires a three–qubit GHZ state, a Controlled NOT gate, three sing–qubit projective measurement, 2 unitary operators and 3 bits of classical message in 2 rounds of transmission. The contrast between the intuitive solution and the proposed protocol is given in Table 3. From Table 3, we can see that our protocol is more efficient than the intuitive solution.

Intuitive solution

Our protocol

Entanglement state

2 EPR states

1 GHZ state

Unitary operator

5

2

Number of rounds in classical message

3

2

Classical message

4 bits

3 bits

Number of Controlled NOT gate

2

1

Number of single–qubit measurement

4

3

Table 3 The comparison of the intuitive solution to the proposed protocol for the remote rotation.

The proposed protocol with remote arbitrary unitary operator
In the subsection, assume that Alice intends to remotely perform an arbitrary unitary operatorU on|ξb , where

U=(abb*a*),(|a|2+|b|2=1), (16)

which is unknown to three distant parties Alice, Bob and Charlie. Alice possesses a device able to perform the operatorU on her single qubit that is referred to as the control. It will produce a new quantum state:

|φb=U|ξb=xU|0b+yeiθU|1b.  (17)

Step 3’: After hearing Bob’s message, Charlie implement a projective measurement on his qubitC with X basis{|+,|} , and sends the measurement outcome to Alice with 1 bit of classical message. According to Charlie’s message, Alice performs one of the unitary operations{I,σz,σx,iσy} on their qubitA so that the state of qubitA  becomes

|τA=x|0A+yeiθ|1A.  (18)

Step 4’: To complete quantum tasks, an auxiliary maximally entangled state is introduced

|ψAC=12(|00+|11)AC,  (19)

where qubitA is located in Alice’s side, while qubitC is located in Charlie’s side. Alice use the device to implement the operatorU such as in Equation (16) on her qubitA . With this, Equation (19) can be evolved as

U|τA=xU|0A+yeiθU|1A.         (20)

Using the Bell basis{|Φ±=12(|00±|11),|Ψ±=12(|01±|10)} for Alice’s qubitsA andA , the composite quantum system of qubitsA ,A andC can be rewritten as
U|ψA|ψAC=12{|Φ+AA(xU|0C)+yeiθU|1C)+|ΦAA(xU|0CyeiθU|1C)+|Ψ+AA(xU|1C+yeiθU|0C)+|ΨAA(xU|1CyeiθU|0C)}.  (21)

After that, Alice carries out a Bell measurement on her two qubitsA andA , and informs the result to Charlie with 2 bits of classical message. After receiving information from Alice, Charlie always end up holding the following correct transformed state

xU|0C)+yeiθU|1C

by performing one of the unitary operations{I,σz,σx,iσy} on his qubitC . That is, the perfect protocol of remote quantum state preparation with remote arbitrary unitary operatorU on a GHZ state is successfully executed via entanglement swapping.

Remark 2: In the intuitive solution corresponding to the 2.2 subsection, after Bob helps Charlie prepare the quantum state|ξb , Alice needs to employ the quantum remote control to perform her operationU on qubit |ξb  held Charlie.

In this remote control scheme, Alice and Charlie also have to pre–shared two EPR states

|ψ12=12(|00+|11)12,|ψ34=12(|00+|11)34,  (22)

where the qubits 1 and 3 belong to Alice, the qubits 2 and 4 to Charlie, respectively. Charlie implements a Bell measurement on his qubitsb and 2 with basis{|Φ±b2,|Ψ±b2} , and sends a two–bit classical message to Alice about his measurement. After that, Alice makes one of the unitary operations{I,σz,σx,iσy} , so that the state of qubit 1 becomes|τ1=x|01+yeiθ|11 . Then she use the device to perform the operationU such as in Equation (17) on her qubit 1, the state|τ1 transforms into

U|τ1=xU|01+yeiθU|11.           (23)

Subsequently, Alice executes a Bell measurement on her qubits 1 and 3 with basis{|Φ±13,|Ψ±13} , and informs the result to Charlie using a classical channel. According to Alice’s two classical bits, Charlie carries out one of operations{I,σz,σx,iσy} on his qubit 4. As a result of this procedure, Charlie always end up holding the following correct transformed state

xU|04+yeiθU|14=U(x|04+yeiθ|14). (24)

From the above, the remote control requires two EPR states, two Bell measurements, 3 unitary operators and 4 bits of classical message in 2 rounds of transmission. On the other hand, our protocol in subsection 2.2 requires an EPR state, a three–qubit GHZ state, a Controlled–NOT gate, 3 single–qubit projective measurements, a Bell measurement, 3 unitary operators and 5 bits of classical message in 3 rounds of transmission. Comparing the intuitive solution with my scheme, the results are shown in Table 4. As you can see from Table 4, the proposed scheme here is more effective than the intuitive solution.

Intuitive solution

Our protocol

Entanglement state

3 EPR states

1 EPR state and 1 GHZ state

Unitary operator

4

3

Number of rounds in classical message

3

3

Classical message

6 bits

5 bits

Number of Controlled NOT gate

1

1

Number of single–qubit measurement

2 single and 2 Bell

3 single and 1 Bell

Table 4 The comparison of the intuitive solution to our protocol for an arbitrary unitary operator.

Discussion and conclusion

Quantum nonlocality plays a central role in quantum information. Many novel results have been obtained by using quantum nonlocality of entangled particles. Using quantum nonlocality of GHZ state and EPR state, we have proposed two protocols of remote state preparation with remote control in this paper. From the depiction of our schemes, one can readily see that our schemes are deterministic, that is, the remotely controlling a prepared quantum by using two different operators respectively are conclusively fulfilled with unit probability. In addition, the use of forward feedback measurement techniques in the process of Bob’s measurements ensures that the probability of success of our protocols is 1, that is, our protocols are Perfect.

Each of our protocols can be modified to remotely control a joint remote state preparation. In fact, using the four–particle GHZ–type state to replace the three–particle GHZ state in our schemes, we can obtain

|G'=12(|0000ABBC+|1111ABBC),

where, two senders Bob1 and Bob2 own particlesB andB , respectively. And their colleagues, Alice and Charlie, hold particlesA andC respectively. Obviously, the state|G' is exactly the state shown in equation (3). Therefore, in our schemes, we can use Bob1 and Bob2 instead of Bob to do the work of corresponding particlesB andB respectively, then the schemes of joint remote state preparation with remote control on a four–particle GHZ–type state are obtained.

Now let us consider the security issue of the schemes via simple analyses. It depends thoroughly on whether the three legitimate users have securely shared the entanglement/entanglements beforehand. By virtue of the same matured check strategies in treating other similar quantum tasks,36,37 then any potential inside cheating or outside evil attack can be easily detected. For simplicity, here we do not repeat it. This means that our protocols are conclusively secure, too. In addition, as mentioned in our schemes, except the owner of the operatorU or state|ξ . Consequently, the rest of the participants are unknown the information of U and B in advance. neither participant can solely determine in priori to finally accomplish the construction, which can be viewed as a scheme security protection in another manner.

Essentially, our schemes are an ordering hybrid of remote quantum state preparation and the remotely control with demanding operators, in which the remote control is loaded in the remote quantum state preparation process. Their execution procedures seem to be similar to those of operator sharing, but essentially different. For example, their conditions, goals, behavior pattern, characteristics and etc. are different.

In summary, we use quantum nonlocality of a three–particle GHZ state to implement both the remote preparation of an arbitrary single–particle state and the remote rotation on that quantum state simultaneously. Moreover, using quantum nonloclity of EPR state and GHZ state, we can also perform both the preparation of an arbitrary single–particle state and an arbitrary unitary operator on that state at once. These schemes are safe and perfect, and may be useful in quantum cryptography, such as controlled remote state preparation, quantum private comparison, and so on. our protocols can be modified to the protocols of remotely control a joint remote state preparation, respectively, and so it improves the security of the protocols. By comparing our schemes with the intuitive solutions, we find that the proposed protocols are more efficient than the intuitive solutions. One of the reasons for this result is that intuitive solution requires two sets of quantum entanglement to do two operations (remote state preparation and remote control) respectively, resulting in waste of quantum resources, whereas a GHZ state is shared in our schemes (when necessary, an auxiliary EPR state is introduced). In our protocols, it is necessary for single–qubit basis measurement, Bell measurement, controlled–NOT gate, EPR state, GHZ state and simple unitary operations as well as classical communication, therefore our schemes are easy to implement physically.

Acknowledgements

This work is supported by Natural Science Foundation of China (Grant No. 11071178, 11671284) and Sichuan Province Education Department Scientific Research Innovation Team Foundation (NO. 15TD0027).

Conflict of interest

Authors declare there is no conflict of interest.

References

  1. Bennett CH, Brassard G, Crepeau C, et al. Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Physical Review Letters.1993;70(13):1–5.
  2. Nielsen MA, Chuang IL. Quantum computation and quantum information. UK: Cambridge University Press; 2000.
  3. Imre S, Gyongyosi L. Advanced quantum computing and communications–An engineering apporach. USA: John Wiley & Sons; 2012.
  4. Pati AK. Minimum classical bit for remote preparation and measurement of a qubit. Physical Review A. 2000;63(63):94–98.
  5. Bennett CH, DiVincenzo DP, Shor PW, et al. Erratum: Remote State Preparation. Physical Review Letters. 2002;88(9):1.
  6. Xia Y, Song J, Song HS. Multiparty remote state preparation. Journal of Physics B Atomic Molecular & Optical Physics. 2007;40(18).
  7. Peng JY, Mo ZW. Several teleportation schemes of an arbitrary unknown multi–particle state via different quantum channels. Chinese Physics B. 2013;22(5).
  8. Wang XW, Zhang DY, Tang SQ, et al. Multipary hierarchical quantum information splitting. Journal of Physics B Atomic Molecular & Optical Physics. 2011;44(3):35505–35508.
  9. Peng JY, Mo ZW. Quantum sharing an unknown multiparticle state via POVM. International Journal of Theoretical Physics. 2013;52(2):620–633.
  10. Bennett CH, Wiesner SJ. Communication via one– and two–particle operators on Einstein–Podolsky–Rosen states. Physical Review Letters. 1992;69(20).
  11. Peng JY, Luo MX, Mo ZW. Quantum taks with non–maximally quantum channels via positive operator–valued measurement. International Journal of Theoretical Physics. 2013. 52(1):253–263.
  12. Nguyen BA. Quantum dialogue. Physics Letters A. 2004;328(1):6–10.
  13. Peng JY, Bei MQ, Mo ZW. Hierarchical and probabilistic quantum state sharing via non–maximally entangled|χ>state. Chinese Physics B. 2014;23(1).
  14. Yand YG, Wen QY. Circular threshold quantum secret sharing. Chinese Physics B. 2008;17(2):419–423.
  15. Peng JY, Mo ZW. Hierarchical and probabilistic quantum state sharing via non–maximally entangled four–qubit cluster state. International Journal of Quantum Information. 2013;11(01).
  16. Chen XB, Wen QY, Sun ZX, et al. Deterministic and exact entanglement teleportation via the W state∗. Chinese Physics B. 2010;19:1–5.
  17. Peng JY, Bei MQ, Mo ZW. Bidirectional quantum states sharing. International Journal of Theoretical Physics. 2016;55(5):2481–2489.
  18. Chen XB, Ma SY, Su Y, et al. Controlled remote state prepartation of arbitrary two and three–qubit states via the Brown state. Quantum Information Processing. 2012;11(6):1653–1667.
  19. Peng JY, Luo MX, Mo ZW, et al. Flexible deterministic joint remote state preparation of some states. International Journal of Quantum Information. 2013;11(4).
  20. Peng JY, Luo MX, Mo ZW. Joint remote state preparation of arbitrary two–particle states via GHZ–type states. Quantum Information Precessing. 2013;12(7):2325–2342.
  21. Peng JY, Luo MX, Mo ZW, et al. Joint remote prepartion of arbitrary three–qubit states. Modern Physics Letters B. 2013;27(22).
  22. An NB. Joint remote state preparation via W and W–type states. Optics Communications. 2010;283(20):4113–4117.
  23. Peng JY, Bei MQ, Mo ZW. Bidirectional Controlled joint remote state prepartion. Quantum Information Processing. 2015;14(11):4263–4278.
  24. Peng JY, Bei MQ, Mo ZW. Joint remote state preparation of a four–demensional quantum state. Chinese Physics Letters. 2014;31(1).
  25. Bouwmeester D, Pan JW, Mattle K, et al. Experimental quantum teleportation. Nature. 1997;390(390):575–579.
  26. Ma XS, Herbst T, Scheidl T, et al. Quantum teleportation over 143 kilometres using active feed–forward. Nature. 2012;489(7415):269–273.
  27. Grover LK. Quantum Telecomputation. USA: Ads Abstract Service; 1997.
  28. Cirac JI, Ekert A, Huelga SF, et al. Distributed quantum computation over noisy channels. Physical Review A. 1999;59(6):4249–4254.
  29. Huelga SF, Vaccaro A, Chefles A, et al. Quantum remote control: Teleportation of unitary operations. Physical Review A. 2001;63(4).
  30. Chen LB, Lu H, Liu YH. Implementing remotely a single–qubit rotation operation by three–qubit entanglement. Chinese Physics. 2005;14(7).
  31. Yao CM. Quantum remote control of unitary operations on a qubit of pure entangled states. Chinese Physics Letters. 2006;23(3):545–547.
  32. Zheng YZ, Ye P, Guo GC. Probabilistic implementation of non–local CNOT operation and Entanglement purification. Chinese Physics Letters. 2004;21(1):9–11.
  33. Fan QB, Liu DD. Controlled remote implementation of partially unknown quantum operation. Science in China Series G: Physics, Mechanics & Astronomy. 2008;51(11):1661–1667.
  34. Ye BL, Liu YM, Liu XS, et al. Remotely sharing a single–qubit operation with a five–qubit genuine state. Chinese Physics Letters. 2013;30(2).
  35. Peng J. Tripartite operation sharing with five–qubit Brown state. Quantum Information Processing. 2016;15(6):2465–2473.
  36. Yang CP, Guo GC. Disentanglement–free state of two pairs of two–level atoms. Physical Review A. 1999;59(6):4217–4222.
  37. Deng FG, Long GL, Liu XS. Two–step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Physical Review A. 2003;68(4).
Creative Commons Attribution License

©2018 Jia–Yin, et al. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.