Hierarchical and probabilistic quantum information splitting of an arbitrary two-qubit state via two cluster states
Guo Wen-Ming, Qin Lei-Ru
School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China

 

† Corresponding author. E-mail: guowenming_bupt@163.com

Project supported by the National Natural Science Foundation of China (Grant No. 61671087).

Abstract

Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit state. In this scheme, the sender transmits the two-qubit secret state to three agents who are divided into two grades with two Bell-state measurements, and broadcasts the measurement results via a classical channel. One agent is in the upper grade and two agents are in the lower grade. The agent in the upper grade only needs to cooperate with one of the other two agents to recover the secret state but both of the agents in the lower grade need help from all of the agents. Every agent who wants to recover the secret state needs to introduce two ancillary qubits and performs a positive operator-valued measurement (POVM) instead of the usual projective measurement. Moreover, due to the symmetry of the cluster state, we extend this protocol to multiparty agents.

1. Introduction

Following the development of quantum computing and quantum algorithms,[1] quantum cryptography has gradually become one of the most important research topics. Quantum secret sharing is one of the more significant branches of quantum cryptography. There are two kinds of quantum secret sharing protocols: sharing classic information and sharing quantum information. Sharing quantum information is also called the quantum information splitting (QIS) protocol. Hillery et al.[2] first proposed a quantum information splitting protocol in 1999. The QIS is used to share secret quantum information from one sender to several distant agents through quantum teleportation, via shared entangled states and classical communication channel. Every agent can recover the secret quantum information with the help of other agents. Subsequently, the quantum information splitting protocols of an arbitrary single-particle state,[3,4] two-particle state[5,6] and some other types of protocols[7,8] and applications[9,10] have successfully been developed.

However, all of these protocols have focused on the symmetry scenario; that is, agents in the agreement have the same authority to recover the quantum secret message. Gottesman[11] first pointed out that a more applicable protocol should include an asymmetrical case where the agent authority to recover a secret state is different. In 2010, Wang et al.[12] successfully realized a hierarchical quantum information protocol (HQIS) for distributing an arbitrary qubit to three agents via the four-qubit entangled state proposed by Yeo and Chua.[13] The three agents in that agreement have different authorities on the recovery of the quantum secret message. The agent in the upper grade only needs one of the other two agents to work together, while the agent in the lower grade needs the cooperation with two agents. In 2010, Wang et al.[14] proposed a scheme with six-photon cluster state, where a boss transmits quantum secret to five distant agents who are divided into two grades. In 2011, Wang et al.[15] proposed a multiparty HQIS protocol with a multipartite-entanglement channel and classical communication. In 2014, an HQIS of an arbitrary two-qubit state via two four-qubit cluster states was proposed by Xu et al.[16] Some of these protocols have been implemented by using the maximally entangled state. However, an initially maximally entangled state may easily evolve into a non-maximally entangled or mixed state due to the inevitable environment effect in the actual communication. Therefore, Peng et al.[17,18] proposed a hierarchical and probabilistic information splitting protocol that is based on the non-maximally entangled state and realized the transmission of arbitrary single-qubit. Subsequently, with an unknown eight-qubit cluster state. Bai et al.[19] implemented a hierarchical and probabilistic QIS. In their protocol, the sender can distribute an arbitrary single-qubit state to seven distant agents who are divided into two grades.

According to Xu et al.’s protocol,[16] we propose a hierarchical and probabilistic quantum information splitting protocol via non-maximally entangled states. In our protocol, two four-qubit cluster states are shared by four participants, forming a quantum channel. The sender transmits an arbitrary two-qubit state to three agents with two Bell measurements and broadcasts measurement results via classical channel. Here, we assume that the quantum channel is noiseless and that the classical channel is certified. Bob with high authority can successfully recover the quantum secret message by his cooperation with Charlie or David. Charlie and David have low authorities. Any one of them needs the cooperation with two agents to recover the secret. In addition, the agent needs to introduce two auxiliary particles and performs CNOT operation. Eventually, the positive operator-valued measurement (POVM)[20] operation is performed to distinguish non-orthogonal states to obtain the secret state. Moreover, due to the symmetry of the four-qubit cluster state, we further propose a hierarchical and probabilistic quantum information splitting protocol where there are m agents with high authority and n agents with low authority. If an agent with high authority recovers the secret state, then he or she only needs the help from all the other agents in the upper grade and one of the agents in the lower grade. However, if an agent with low authority recovers the secret state, then he or she needs the cooperation with all agents.

2. Hierarchical and probabilistic QIS of arbitrary two-qubit state via four-qubit cluster states among three agents

Suppose that there are four legitimate participants Alice, Bob, Charlie, and David in the communication. Sender Alice wants to teleport an unknown two-qubit state

where α, β, γ, and δ are arbitrary with |α|2 + |β|2 + |γ|2 + |δ|2 = 1. To share this unknown state, the sender Alice prepares two two-qubit entangled states
and four single qubits whose initial states are all in the state |0⟩. Alice then performs CNOT operations to entangle these single qubits into the entangled states. After that, these two entangled states become
where a, b, c, and d should be nonzero real numbers and satisfy a2 + b2 = 1 / 2 and c2 + d2 = 1/2. Here,

Alice then sends particles 2 and 6 to Bob, particles 3 and 7 to Charlie, and particles 4 and 8 to David. Alice keeps particles 1 and 5 in her hand. Consequently, the four participants share two four-particle cluster states, thereby forming the quantum channel required by the protocol. The state of the whole system is written as

Subsequently, Alice should perform two joint measurements on her pair qubits (x,1) and (y,5) by using the Bell basis {Φ±, Ψ±}, respectively. The four Bell states are given by

It is known that Alice can obtain one of the 16 kinds of measurement results with equal possibility. The 16 kinds of measurement results and the corresponding joint states for the three agents after the measurement are summarized in Table 1. Alice needs to broadcast the measurement results to all her agents through a classical channel. In this way, the quantum information is spilt into the entangled states shared with the three agents. According to the quantum non-cloning theorem, only one agent’s qubits can collapse into the secret state. As a result, all three agents are able to successfully recover the secret quantum message with the cooperation of other agents.

Agent Bob with high authority is assigned to recover Alice’s secret state. Without loss of generality, we assume that Alice’s measurement result is |Ψ+ Φx1y5, the states of the other agents will collapse into the following state:

Table 1.

Relationships between Alice’s measurement results (AR) and the corresponding joint states (JS) shared with the other agents.

.

To recover Alice’s secret state, Charlie and David should make two single-qubit measurements on their particles and transmit the measurement results to Bob via a classical channel. Obviously, if Charlie and David measure their particles by using the basis {|0⟩, |1⟩}, then their results are always correlated with each other. Thus, Bob can deduce the Charlie’s (David’s) results from David’s (Charlie’s) results. This shows that only one of the other two agents is needed to inform Bob of his measurement results. Suppose that Charlie or David’s measurement result is |01⟩, then Bob’s state will collapse into

According to the measurement results of the three participants, Bob performs the corresponding operation on particles 2 and 6 in his hand. In this case, Bob performs the operation shown in Table 2.

Table 2.

Relationships between Charlie or David’s measurement results (CDR) and Bob’s operations (BO).

.

After the above operation, Bob’s state eventually becomes

If Alice’s measurement result is not |Ψ+ Φx1y5, then Bob’s state will eventually transform into one of the following four states with Pauli operations based on the measurement results:

To demonstrate the realization of the protocol in detail, we still make the above assumptions; that is, after a series of operations, Bob’s state is as shown in Eq. (9). It is obvious that Bob’s state is different from the secret qubits sent by Alice. To successfully obtain Alice’s secret state, Bob needs to take the initial state of two auxiliary qubits m and n as initial state |00⟩mn and performs two CNOT operations, with qubits 2 and 6 used as the controlled qubits while the auxiliary qubits m and n as the target qubits. Now, Bob’s state becomes

Equation (11) can be rewritten as
where
From Eq. (12), Bob can obtain the state |Ki⟩(i = 1,2,3,4), provided that the states |Qi⟩(i = 1,2,3,4) are obtained via appropriate measurements on auxiliary particles. Unfortunately, the states |Qi⟩ (i = 1,2,3,4) are nonorthogonal in general. As a result, they cannot be differentiated deterministically. To distinguish the non-orthogonal states, we can only measure with POVM. The form of POVM is
with
where I is an identity operator, and ω is a parameter relating to a, b, c, and d and should be able to insure that O5 is a positive operator; that is, ω satisfies the inequality ω ≥ 16max {(bd)2, (ac)2,(bc)2,(ad)2}. After performing the above POVM operation on his auxiliary qubits m and n, Bob can obtain Oi (i = 1,2,3,4) with equal probability
Subsequently, Bob performs appropriate unitary operations to recover the secret qubits. However, with the probability of 1 − 1/ωε, Bob may obtain the value of O5, which means that Bob cannot infer the state of qubits m and n.

This discussion is based on the assumption that Alice’s measurement result is |Ψ+ Φx1y5 and Charlie or Bob’s measurement result is |01⟩. Taking all of the cases into account, we can work out the success probability of this scheme to be

The agent with low authority is able to recover the secret state. In this protocol, both Charlie and David have low power to recover the secret state. Here, we take Charlie as an example. Equation (7) can now be rewritten as

where
Bob and David perform single-particle measurements on their pair qubits (2,6) and (4,8) by using the basis {|+⟩, |−⟩}, respectively. From Eq. (18), it can be seen that Charlie needs the cooperation of two agents to successfully recover the secret qubits. Without loss of generality, suppose that Bob’s measurement result is |−+⟩ and David’s measurement result is |+ +⟩, then Charlie’s quantum state will collapse into
Charlie performs two Hardamard transformations on pair qubits particles 3 and 7, then Bob’s state is
To recover the secret state, Charlie then performs Z operation on qubits 7 and 3 separately. The state shown in Eq. (21) transforms into

Like Case 1, Charlie needs to introduce two auxiliary particles for CNOT operation in order to successfully obtain the secret state. Charlie also needs to perform a POVM operation with different coefficients. Finally, we can obtain the probability of success in this mode to be

The relationship between the coefficient and the probability is shown with Fig. 1. No matter which kind of four-particle cluster prepared by Alice is set to be a quantum channel, we ultimately hope that the successful probability of splitting quantum information is maximum; that is, from Eqs. (23) and (17) the maximum can be obtained. In Fig. 1, the three curves correspond to different values of a and c; that is, the three curves represent different four-particle cluster states. It can be seen from the figure that no matter what kind the four-particle cluster is, the success probability of the scheme is inversely proportional to the value of ω. As mentioned previously, ω satisfies the inequality ω ≥ 16max {(bd)2,(ac)2,(bc)2,(ad)2}. Thus, the scheme is an optimal strategy if ω = 16max {(bd)2,(ac)2,(bc)2,(ad)2}. In other words, the POVM is determined after the four-particle cluster has been identified. In particular, the probability is a maximum value of 1 when a = c = 1/2 and ω = 16max {(bd)2,(ac)2,(bc)2,(ad)2}. At this time, the four-particle cluster is in the maximally entangled state.

Fig. 1. (color online) Relationships between the value of ω and the total success probability P, which satisfies P = (16a2c2b2d2)/ω × 16 in the three cases, with coefficients satisfying a2 + b2 = 1/2 and c2 + d2 = 1 / 2.
3. Hierarchical and probabilistic QIS of arbitrary two-qubit state via cluster states among multiparty agents

Due to the symmetry of the four-qubit cluster state, our protocol can be extended to multiparty agents. To illustrate this point more clearly, we first consider the case where there are two agents called Bobi (i = 1,2) with high authority and three agents called Charliej (j = 1, 2, 3) with low authority. The sender Alice prepares two two-qubit entangled states in Eq. (2) and eight single qubits whose initial states are all in the state |0⟩. Alice then performs some CNOT operations to entangle these single qubits into cluster states. These two entangled states then become

Subsequently, Alice sends the particles xi + 1 and yi + 1 to Bobi (i = 1, 2), and the particles xj + 3 and yj + 3 to Charliej (j = 1, 2, 3). Alice keeps the particles x1 and y1 in her hand. Consequently, the four participants share two six-qubit clusters, thus forming a quantum channel required by the protocol. The state of the whole system is written as

where

To distribute |δxy in Eq. (1) to five agents, the sender Alice should perform two joint measurements on her pair qubits (x,x1) and (y,y1) by using the Bell basis {Φ±, Ψ±}, respectively. It is clear that Alice can obtain 16 kinds of measurement results. Like the protocol in the three agents, Alice should also broadcast the result to five agents.

The agent with high authority is assigned to recover Alice’s secret state. Here, we take Bob1 as an example. Without loss of generality, we assume that Alice’s measurement result is |Ψ+Ψ+xx1yy1, the states of the other agents will collapse into the state

To recover Alice’s secret state, the agents with low authority should make two single-qubit measurements on their particles by using the basis {|0⟩,|1⟩}. Their measurement results are always correlated with each other. This shows that only one of these agents is needed to inform Bob1 of his measurement results. Bob2 with high authority should measure his particles by using the basis {|+⟩, |−⟩}. Suppose that the measurement result of the agent with low authority is |00⟩ and Bob2’s is |+ −⟩, then the state of Bob1 will be

Bob1 performs Pauli operations on his particles according to other agents’ measurement results. Using the same method, Bob1 introduces two auxiliary qubits and performs a POVM operation with different coefficients according to others’ measurement results. Finally, we can obtain the probability of success in this mode to be

An agent with low authority is to recover the secret state. Here, we take Charlie1 as an example. Equation (27) can now be rewritten as

Bobi (i = 1, 2) and Charliej (j = 2, 3) perform single-particle measurements on their pair particles by using the basis {| + ⟩, | −⟩}, respectively. From Eq. (30), it can be seen that Charlie1 needs the cooperation with all the other agents to successfully recover the secret qubits. Without loss of generality, suppose that the measurement result of the agents with high authority is |+ − + +⟩ and the measurement result of the agents with low authority is |+ − + −⟩, then Charlie1’s quantum state collapses into
Charlie1 performs Hardamard transformations and Pauli operations on his particles according to other agents’ measurement results. Using the same method, Charlie1 introduces two auxiliary qubits and performs a POVM operation with different coefficients. Finally, we can obtain the probability of success in this mode to be

Now we suppose that there are m agents with high authority and n agents with low authority. Given that the protocols in three agents and five agents have been described in detail, we just give this protocol briefly. The sender Alice prepares two two-qubit entangled states in Eq. (2) and some single qubits whose initial states are all in the state |0⟩. Alice then performs some CNOT operations to entangle these single qubits into cluster states

The process of the protocol is similar to that of the protocol with five agents. In this multiparty protocol, let agents Bob1, Bob2, . . ., and Bobm be in high grade, and the agents Charlie1, Charlie2, . . ., and Charlien be in low grade. Alice keeps the particles x1 and y1 in her hand. The whole system is

Alice wants to teleport the state |δxy shown in Eq. (1). The sender Alice performs two Bell measurements on pair particles (x,x1) and (y,y1), respectively. If an agent with high authority recovers the secret state, then all of the other agents with high authority need to make two single-qubit measurements on their particles by using the basis {|+⟩, |−⟩}, and only one of the agents with low authority needs to make two single-qubit measurements on his or her particles by using the basis {|0⟩, |1⟩}. However, if an agent with low authority recovers the secret state, then all of the other agents need to make two single-qubit measurements on their particles by using the basis {|+⟩, |−⟩}. Whether an agent with high authority or an agent with low authority recovers the secret state or not, the probability of success is

4. Security and efficiency

Because of the no-cloning theorem and entanglement monogamy, the only way for an outside eavesdropper[2125] to obtain the secret state is to adopt the intercept-resend attack. In particular, because which one of the agents will possess the secret state is previously undefined in the scheme, it is supposed that the eavesdropper intercepts all of the particles sent to the agents and resends fake particles to the agents. To keep the quantum correlation among the agents, the eavesdropper prepares two cluster states in Eq. (33), such as the sender in the protocol among the multiparty agents.

However, the quantum entanglement between the agents is destroyed. The agents can easily detect such an attack by performing local measurements on their particles. For example, they all perform the measurement by using the basis {|0⟩, |1⟩}. Under the attack by the eavesdropper, there is no correlation between the measurement results of the sender and the agents. However, in a no-eavesdropping case, where the measurement results of the sender and the agent with high authority are always correlated with each other, and the measurement results of the sender and the agents with lower authority are always anti-correlated with each other. Thus, the eavesdropping attack can always be detected in this way and a subset of entanglement channels will be sacrificed. As a matter of fact, most of entanglement-based quantum communication schemas need the users to utilize quantum correlations and sacrifice a subset of entanglement channels to check their security against an eavesdroppers’ interceptions.

We can exploit the definition, and the total efficiency for quantum state sharing can be defined as

where qs represents the number of shared qubits to be achieved by the protocol. In this protocol, an arbitrary two-qubit is transmitted. In addition, qt represents the number of qubits transmitted in the protocol; that is, the number of qubits sent by the sender to the agents at the beginning of the protocol. Meanwhile, bt is the number of classic bits transmitted during the communication. In this protocol, bt is the number of classic bits used for broadcasting the measurement results. Suppose that each agent has the same probability of recovering the secret message, then we will be able to calculate the average communication efficiency of the protocol among m agents with high authority and n agents with low authority from

In our protocol, we need two non-maximally entangled states which can be prepared by some methods.[26,27] According to Ziman et al.’s research,[28] the POVM operation can also be realized. Thus, our protocol is feasible. Moreover, the operations we perform during communication are all the basic operations which are less complex.

5. Conclusions

The proposed protocol uses a non-maximally entangled state to implement a hierarchical and probabilistic quantum information splitting protocol, whereas Xu’s protocol is implemented by using the maximally entangled state. Although the protocol of the maximally entangled state can recover the secret information successfully and deterministically, the maximally entangled state is easily influenced by the environment and becomes a non-maximally entangled state or a mixed state in practice. Compared with Peng et al.’s hierarchical and probabilistic quantum information splitting protocol, our proposed protocol achieves the sharing of an arbitrary two-qubit state. Moreover, our protocol can be extended to multiparty participants.

In general, we use a non-maximally entangled state to implement a hierarchical quantum information splitting protocol that shares arbitrary two qubits among three agents. In addition, different agents have different authorities for restoring the secret state. Bob with high authority only needs the cooperation of Charlie or David, while Charlie or David with low authority need the cooperation of the other two agents. In addition, the agent recovers the secret state by introducing two auxiliary particles through using the POVM operations. Due to the symmetry of the cluster state, we further extend the protocol into a multiparty protocol. When the agent with high authority is designed to recover the secret state, he will need the help of all the agents with high authority and one of the agents with low authority. However, the agent with low authority needs to cooperate with all of the agents to recover the secret state.

Reference
[1] Nielsen M A Chuang I L 2000 Quantum Computation and Quantum Information Cambridge Cambridge University Press 43 46
[2] Hillery M Bužek V Berthiaume A 1999 Phys. Rev. 53 1829
[3] Liu J Liu Y M Zhang Z J 2008 Int. J. Theor. Phys. 47 2353
[4] Xu G Chen X B Dou Z Li J Liu X Li Z P 2016 Entropy 18 267
[5] Wang Z Y Liu Y M Wang D Zhang Z J 2007 Opt. Commun. 276 322
[6] Li J Chen X B Xu G Yang Y X Li Z P 2015 IEEE Commun. Lett. 19 115
[7] Dong H H Zhang Y F Zhang Y F Yin B S 2014 Abstr. Appl. Anal. 2014 738609
[8] Jiang T S Jiang Z W Ling S T 2014 Applied Mathematics and Computation 249 222
[9] Zhang Y L Zhao M X Su J L Lu S Lv K B 2018 Comput. Math. Method. M. 2018 8950794
[10] Pang Z H Liu G P Zhou D H Sun D H 2017 Journal of Systems Science and Complexity 30 1072
[11] Gottesman D 2000 Phys. Rev. 61 042311
[12] Wang X W Xia L X Wang Z Y Zhang D Y 2010 Opt. Commun. 283 1196
[13] Yeo Y Chua W K 2006 Phys. Rev. Lett. 96 060502
[14] Wang X W Zhang D Y Tang S Q Zhan X G You K M 2010 Int. J. Theor. Phys. 49 2691
[15] Wang X W Zhang D Y Tang S Q Xie L J 2011 J. Phys. B: At.Mol. Opt. Phys. 44 035505
[16] Xu G Wang C Yang Y X 2014 Quantum Inf. Process. 13 43
[17] Peng J Y Mo Z W 2013 Int. J. Quantum Inf. 11 1350004
[18] Peng J Y Bai M Q Mo Z W 2014 Chin. Phys. 23 010304
[19] Bai M Q Mo Z W 2013 Quantum Inf. Process. 12 1053
[20] Wang Z Y Wang D Liu J Shi S H 2006 Commun. Theor. Phys. 46 859
[21] Zhou S W Liu X P Chen B Liu H X 2018 Complexity 2018 1586846
[22] Dou Z Xu G Chen X B Liu X Yang Y X 2018 Sci. China-Inf. Sci. 61 022501
[23] Cui Y J Sun J X 2013 Fixed Point Theory and Applications 2013 345
[24] Xu G Chen X B Li J Wang C Yang Y X Li Z P 2015 Quantum Inf. Process. 14 4297
[25] Wei Z H Chen X B Niu X X Yang Y X 2015 Int. J. Theor. Phys. 54 2505
[26] Li Z Z Xu G Chen X B Sun X M Yang Y X 2016 IEEE Commun. Lett. 20 2470
[27] Xu G Chen X B Dou Z Yang Y X Li Z P 2015 Quantum Inf. Process. 14 2959
[28] Ziman M Buzek V 2005 Phys. Rev. 72 039903