Let us consider the following situation: there are three legitimate participants Alice, Bob and Charlie in our scheme. Assume that Bob wants to help his coworker, Charlie, prepare an arbitrary single–qubit state taking the general form
(1)
where
and
are two eigenstates of a single–qubit, the real coefficients
and
with the normalization condition
. Bob knows the information about the qubit
, whereas it is unknown to his coworkers. At the same time, Alice intends to remotely perform a unitary operator
on
.
In order to complete the above tasks, let Alice, Bob and Charlie pre–share a three–qubit GHZ state of the form
(2)
where Alice, Bob and Charlie have the first, the second and the third qubits, respectively. The proposed protocol is described in the following steps:
Step 1: Bos first takes an ancillary qubit
in initial state
, then performs a
on qubits
and
, where
is the Controlled–NOT gate acting on two qubits
and
as
with
an addition mod
. After those actions, qubi
became entangled with those in state (3), i.e.,
:
(3)
Note that, though
is a 4–qubit entangled state, the actual non–local resource cots just
qubits because the entanglement of qubit
with those in state (3) is made locally.
Step 2: Bob performs a projective measurement on her qubit
with the basis
:
(4)
According to the measurement postulate of quantum mechanics, the
can be rewritten in terms of Bob’s measurement basis as
(5)
From Equation (5) it is easily verified that Bob’s
will project the joint state of qubits
,
and
onto one of the two possible states
(6)
with equal probability of
. The next stage work is tricky in the sense that the feed–forward measurement strategy will be exploited. Concretely, in this stage Bob’s correct action depends essentially on the measurement outcomes of the preceding stage. Namely, if the result is
, his needs to apply to his qubit
the following unitary operator
(7)
which is written in the computational basis
, whereas the result is
, then the correct unitary operator should be
(8)
That is, using the basis
and the basis
expression (6) can be rewritten as
(9)
After measuring on the ancillary qubit
, he broadcasts two bits classical information about his measurement results to Alice and Charlie. What is interesting is that it is not necessary for his to send secret massages. Instead, he just needs to broadcast his outcomes via any public media since these outcomes in fact mean nothing to any outside parties. It is worth noting that in the second step Bob used the forward feedback measurement techniques. Namely, the choice of basis for measuring qubit
depends essentially on the outcomes of the prior measurements on qubit
, respectively.
From Equation (9) we can see that after the
and
, the qubits held by the Alice and Charlie collapse correspondingly into the following entangled states:
(10)
To be precise, the complete relation between the outcomes of
and
of Bob and the combined state of Alice and Charlie is shown in Table 1.
|
|
Combined state of alice and charlie |
|
|
|
|
|
|
|
|
|
|
|
|
Table 1 Relation among bob’s measurement results (
&
), the combined states of alice and charlie after the measurement of bob.
The remaining steps are described separately according to different operators
, see the subsection 2.1 and 2.2.
The proposed protocol with remote rotatio
In this subsection, consider that Alice wants to remotely perform a rotation operator
(about the Z axis) on
, where
,
(11)
This will produce a new quantum state:
(12)
Step 3: According to Bob’s measurement outcomes
, Alice performs the rotation
of an angle
on the first qubit
of GHZ state. If
is
(
), Alice performs
on qubit
. Otherwise, Alice performs
on
. Then, Alice measures
with X basis
to obtain the measurement outcome,
, which will be sent to Charlie via a classical channel.
Step 4: After hearing the messages from Alice and Bob, Charlie can perform a corresponding unitary operation on qubit
to adjust the state to the one given in Equation (12). The one–to–one correspondence between Charlie’s operations and the measurement outcomes of Alice and Bob is shown in Table 2.
|
|
|
Operations of charlie |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Table 2 The one–to–one correspondence between charlie’s unitary operations and the measurement outcomes of alice and bob.
For example, let
is
, the the state of the composite quantum system of qubits
and
is
. Alice needs to perform
on
, then the state
becomes the following form
Suppose Alice’s measurement outcome is
, then the state of qubit
held by Charlie will be
. Once Charlie performs a unitary operation
on qubit
, he will obtain the state in Equation (12), and the quantum task has been completed.
Remark 1: In the intuitive solution corresponding to the 2.1 subsection, Bob first has to help Charlie prepare the state
which requires an EPR state, a Controlled–NOT gate, two sing–qubit projective measurements, a corresponding operator and 2 bits of classical message. After that, Alice employs the quantum remote control to perform her operation on the qubit
held by Charlie.
In the remote control protocol, Alice and Charlie also have to pre–share a Bell state
(13)
where the subscripts
and
represent the first and the second qubit of the Bell state belonged to Alice and Charlie, respectively.
Charlie first performs a
on qubits
and
, and measures
with
basis. The composite state becomes
(14)
Then, Charlie sends a one–bit classical message to Alice about his measurement. If the measurement outcome is
, Alice and Charlie will do nothing. Otherwise, they both perform
on their qubits. Thus the state they shared becomes
(15)
Now Alice performs
on her qubit
and measures it with X basis. Alice sends a one–bit classical message to Charlie about her measurement outcome. According to Alice’s message, Charlie performs a corresponding unitary operation to complete the remote control process. Hence, the remote control requires an EPR state, a Controlled–NOT gate, two single–qubit projective measurements, 4 unitary operators and 2 bits of classical message in 2 rounds of transmission.
On the other hand, in the proposed protocol, a GHZ state is used to prepare the qubit as well as remotely control the qubit. In total, the proposed protocol requires a three–qubit GHZ state, a Controlled NOT gate, three sing–qubit projective measurement, 2 unitary operators and 3 bits of classical message in 2 rounds of transmission. The contrast between the intuitive solution and the proposed protocol is given in Table 3. From Table 3, we can see that our protocol is more efficient than the intuitive solution.
|
Intuitive solution |
Our protocol |
Entanglement state |
2 EPR states |
1 GHZ state |
Unitary operator |
5 |
2 |
Number of rounds in classical message |
3 |
2 |
Classical message |
4 bits |
3 bits |
Number of Controlled NOT gate |
2 |
1 |
Number of single–qubit measurement |
4 |
3 |
Table 3 The comparison of the intuitive solution to the proposed protocol for the remote rotation.
The proposed protocol with remote arbitrary unitary operator
In the subsection, assume that Alice intends to remotely perform an arbitrary unitary operator
on
, where
(16)
which is unknown to three distant parties Alice, Bob and Charlie. Alice possesses a device able to perform the operator
on her single qubit that is referred to as the control. It will produce a new quantum state:
(17)
Step 3’: After hearing Bob’s message, Charlie implement a projective measurement on his qubit
with X basis
, and sends the measurement outcome to Alice with 1 bit of classical message. According to Charlie’s message, Alice performs one of the unitary operations
on their qubit
so that the state of qubit
becomes
(18)
Step 4’: To complete quantum tasks, an auxiliary maximally entangled state is introduced
(19)
where qubit
is located in Alice’s side, while qubit
is located in Charlie’s side. Alice use the device to implement the operator
such as in Equation (16) on her qubit
. With this, Equation (19) can be evolved as
(20)
Using the Bell basis
for Alice’s qubits
and
, the composite quantum system of qubits
,
and
can be rewritten as
(21)
After that, Alice carries out a Bell measurement on her two qubits
and
, and informs the result to Charlie with 2 bits of classical message. After receiving information from Alice, Charlie always end up holding the following correct transformed state
by performing one of the unitary operations
on his qubit
. That is, the perfect protocol of remote quantum state preparation with remote arbitrary unitary operator
on a GHZ state is successfully executed via entanglement swapping.
Remark 2: In the intuitive solution corresponding to the 2.2 subsection, after Bob helps Charlie prepare the quantum state
, Alice needs to employ the quantum remote control to perform her operation
on qubit
held Charlie.
In this remote control scheme, Alice and Charlie also have to pre–shared two EPR states
(22)
where the qubits 1 and 3 belong to Alice, the qubits 2 and 4 to Charlie, respectively. Charlie implements a Bell measurement on his qubits
and 2 with basis
, and sends a two–bit classical message to Alice about his measurement. After that, Alice makes one of the unitary operations
, so that the state of qubit 1 becomes
. Then she use the device to perform the operation
such as in Equation (17) on her qubit 1, the state
transforms into
(23)
Subsequently, Alice executes a Bell measurement on her qubits 1 and 3 with basis
, and informs the result to Charlie using a classical channel. According to Alice’s two classical bits, Charlie carries out one of operations
on his qubit 4. As a result of this procedure, Charlie always end up holding the following correct transformed state
(24)
From the above, the remote control requires two EPR states, two Bell measurements, 3 unitary operators and 4 bits of classical message in 2 rounds of transmission. On the other hand, our protocol in subsection 2.2 requires an EPR state, a three–qubit GHZ state, a Controlled–NOT gate, 3 single–qubit projective measurements, a Bell measurement, 3 unitary operators and 5 bits of classical message in 3 rounds of transmission. Comparing the intuitive solution with my scheme, the results are shown in Table 4. As you can see from Table 4, the proposed scheme here is more effective than the intuitive solution.
|
Intuitive solution |
Our protocol |
Entanglement state |
3 EPR states |
1 EPR state and 1 GHZ state |
Unitary operator |
4 |
3 |
Number of rounds in classical message |
3 |
3 |
Classical message |
6 bits |
5 bits |
Number of Controlled NOT gate |
1 |
1 |
Number of single–qubit measurement |
2 single and 2 Bell |
3 single and 1 Bell |
Table 4 The comparison of the intuitive solution to our protocol for an arbitrary unitary operator.
Quantum nonlocality plays a central role in quantum information. Many novel results have been obtained by using quantum nonlocality of entangled particles. Using quantum nonlocality of GHZ state and EPR state, we have proposed two protocols of remote state preparation with remote control in this paper. From the depiction of our schemes, one can readily see that our schemes are deterministic, that is, the remotely controlling a prepared quantum by using two different operators respectively are conclusively fulfilled with unit probability. In addition, the use of forward feedback measurement techniques in the process of Bob’s measurements ensures that the probability of success of our protocols is 1, that is, our protocols are Perfect.
Each of our protocols can be modified to remotely control a joint remote state preparation. In fact, using the four–particle GHZ–type state to replace the three–particle GHZ state in our schemes, we can obtain
where, two senders Bob1 and Bob2 own particles
and
, respectively. And their colleagues, Alice and Charlie, hold particles
and
respectively. Obviously, the state
is exactly the state shown in equation (3). Therefore, in our schemes, we can use Bob1 and Bob2 instead of Bob to do the work of corresponding particles
and
respectively, then the schemes of joint remote state preparation with remote control on a four–particle GHZ–type state are obtained.
Now let us consider the security issue of the schemes via simple analyses. It depends thoroughly on whether the three legitimate users have securely shared the entanglement/entanglements beforehand. By virtue of the same matured check strategies in treating other similar quantum tasks,36,37 then any potential inside cheating or outside evil attack can be easily detected. For simplicity, here we do not repeat it. This means that our protocols are conclusively secure, too. In addition, as mentioned in our schemes, except the owner of the operator
or state
. Consequently, the rest of the participants are unknown the information of U and B in advance. neither participant can solely determine in priori to finally accomplish the construction, which can be viewed as a scheme security protection in another manner.
Essentially, our schemes are an ordering hybrid of remote quantum state preparation and the remotely control with demanding operators, in which the remote control is loaded in the remote quantum state preparation process. Their execution procedures seem to be similar to those of operator sharing, but essentially different. For example, their conditions, goals, behavior pattern, characteristics and etc. are different.
In summary, we use quantum nonlocality of a three–particle GHZ state to implement both the remote preparation of an arbitrary single–particle state and the remote rotation on that quantum state simultaneously. Moreover, using quantum nonloclity of EPR state and GHZ state, we can also perform both the preparation of an arbitrary single–particle state and an arbitrary unitary operator on that state at once. These schemes are safe and perfect, and may be useful in quantum cryptography, such as controlled remote state preparation, quantum private comparison, and so on. our protocols can be modified to the protocols of remotely control a joint remote state preparation, respectively, and so it improves the security of the protocols. By comparing our schemes with the intuitive solutions, we find that the proposed protocols are more efficient than the intuitive solutions. One of the reasons for this result is that intuitive solution requires two sets of quantum entanglement to do two operations (remote state preparation and remote control) respectively, resulting in waste of quantum resources, whereas a GHZ state is shared in our schemes (when necessary, an auxiliary EPR state is introduced). In our protocols, it is necessary for single–qubit basis measurement, Bell measurement, controlled–NOT gate, EPR state, GHZ state and simple unitary operations as well as classical communication, therefore our schemes are easy to implement physically.