,Scheme for splitting quantum information via W states in cavity QED systems

来源 :中国物理B(英文版) | 被引量 : 0次 | 上传用户:icerjack
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Assisted by multipartite entanglement,Quantum information may be split so that the original qubit can be reconstructed if and only if the recipients cooperate.This paper proposes an experimentally feasible scheme for splitting quantum information via W-type entangled states in cavity QED systems,where three-level Rydberg atoms interact with nonresonant cavities.Since W-type states are used as the quantum channel and the cavities are only virtually excited,the scheme is easy to implement and robust against decoherence,and the dependence on the quality factor of the cavities is greatly reduced.
其他文献
Frequency shifts of the acetylene saturated absorption lines at 1.5μm with temperature,gas pressure and laser power have been investigated in detail.The second
The phenomena of super energy flows are studied theoretically and numerically in a parallel-plate waveguide which is filled with two layered equally-thick diffe
Based on the phase state reconstruction of welding current in short-circuiting gas metal arc welding using carbon dioxide as shielding gas, the approximate entr
This paper presents a set of multicomponent matrix Lie algebra,which is used to construct a new loop algebra (A)M.By using the Tu scheme,a Liouville integrable
Taking the intrinsic decoherence effect into account,this paper investigates the entanglement of a two-qubit anisotropic Heisenberg XY Z model in the presence o
Local bifurcation phenomena in a four-dimensional continuous hyperchaotic system, which has rich and complex dynamical behaviours, are analysed. The local bifur
This paper proposes a scheme of parameter perturbation to suppress the stable rotating spiral wave, meandering spiral wave and turbulence in the excitable media
The quantum secure direct communication(QSDC)protocol with a random basis and order is analysed and an effective attack,i.e.teleportation attack,is presented.An