† Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant No. 61671087).
Based on non-maximally entangled four-particle cluster states, we propose a new hierarchical information splitting protocol to probabilistically realize the quantum state sharing of an arbitrary unknown two-qubit state. In this scheme, the sender transmits the two-qubit secret state to three agents who are divided into two grades with two Bell-state measurements, and broadcasts the measurement results via a classical channel. One agent is in the upper grade and two agents are in the lower grade. The agent in the upper grade only needs to cooperate with one of the other two agents to recover the secret state but both of the agents in the lower grade need help from all of the agents. Every agent who wants to recover the secret state needs to introduce two ancillary qubits and performs a positive operator-valued measurement (POVM) instead of the usual projective measurement. Moreover, due to the symmetry of the cluster state, we extend this protocol to multiparty agents.
Following the development of quantum computing and quantum algorithms,[1] quantum cryptography has gradually become one of the most important research topics. Quantum secret sharing is one of the more significant branches of quantum cryptography. There are two kinds of quantum secret sharing protocols: sharing classic information and sharing quantum information. Sharing quantum information is also called the quantum information splitting (QIS) protocol. Hillery et al.[2] first proposed a quantum information splitting protocol in 1999. The QIS is used to share secret quantum information from one sender to several distant agents through quantum teleportation, via shared entangled states and classical communication channel. Every agent can recover the secret quantum information with the help of other agents. Subsequently, the quantum information splitting protocols of an arbitrary single-particle state,[3,4] two-particle state[5,6] and some other types of protocols[7,8] and applications[9,10] have successfully been developed.
However, all of these protocols have focused on the symmetry scenario; that is, agents in the agreement have the same authority to recover the quantum secret message. Gottesman[11] first pointed out that a more applicable protocol should include an asymmetrical case where the agent authority to recover a secret state is different. In 2010, Wang et al.[12] successfully realized a hierarchical quantum information protocol (HQIS) for distributing an arbitrary qubit to three agents via the four-qubit entangled state proposed by Yeo and Chua.[13] The three agents in that agreement have different authorities on the recovery of the quantum secret message. The agent in the upper grade only needs one of the other two agents to work together, while the agent in the lower grade needs the cooperation with two agents. In 2010, Wang et al.[14] proposed a scheme with six-photon cluster state, where a boss transmits quantum secret to five distant agents who are divided into two grades. In 2011, Wang et al.[15] proposed a multiparty HQIS protocol with a multipartite-entanglement channel and classical communication. In 2014, an HQIS of an arbitrary two-qubit state via two four-qubit cluster states was proposed by Xu et al.[16] Some of these protocols have been implemented by using the maximally entangled state. However, an initially maximally entangled state may easily evolve into a non-maximally entangled or mixed state due to the inevitable environment effect in the actual communication. Therefore, Peng et al.[17,18] proposed a hierarchical and probabilistic information splitting protocol that is based on the non-maximally entangled state and realized the transmission of arbitrary single-qubit. Subsequently, with an unknown eight-qubit cluster state. Bai et al.[19] implemented a hierarchical and probabilistic QIS. In their protocol, the sender can distribute an arbitrary single-qubit state to seven distant agents who are divided into two grades.
According to Xu et al.’s protocol,[16] we propose a hierarchical and probabilistic quantum information splitting protocol via non-maximally entangled states. In our protocol, two four-qubit cluster states are shared by four participants, forming a quantum channel. The sender transmits an arbitrary two-qubit state to three agents with two Bell measurements and broadcasts measurement results via classical channel. Here, we assume that the quantum channel is noiseless and that the classical channel is certified. Bob with high authority can successfully recover the quantum secret message by his cooperation with Charlie or David. Charlie and David have low authorities. Any one of them needs the cooperation with two agents to recover the secret. In addition, the agent needs to introduce two auxiliary particles and performs CNOT operation. Eventually, the positive operator-valued measurement (POVM)[20] operation is performed to distinguish non-orthogonal states to obtain the secret state. Moreover, due to the symmetry of the four-qubit cluster state, we further propose a hierarchical and probabilistic quantum information splitting protocol where there are m agents with high authority and n agents with low authority. If an agent with high authority recovers the secret state, then he or she only needs the help from all the other agents in the upper grade and one of the agents in the lower grade. However, if an agent with low authority recovers the secret state, then he or she needs the cooperation with all agents.
Suppose that there are four legitimate participants Alice, Bob, Charlie, and David in the communication. Sender Alice wants to teleport an unknown two-qubit state
Alice then sends particles 2 and 6 to Bob, particles 3 and 7 to Charlie, and particles 4 and 8 to David. Alice keeps particles 1 and 5 in her hand. Consequently, the four participants share two four-particle cluster states, thereby forming the quantum channel required by the protocol. The state of the whole system is written as
Subsequently, Alice should perform two joint measurements on her pair qubits (x,1) and (y,5) by using the Bell basis {Φ±, Ψ±}, respectively. The four Bell states are given by
It is known that Alice can obtain one of the 16 kinds of measurement results with equal possibility. The 16 kinds of measurement results and the corresponding joint states for the three agents after the measurement are summarized in Table Agent Bob with high authority is assigned to recover Alice’s secret state. Without loss of generality, we assume that Alice’s measurement result is |Ψ+
Φ−⟩x1y5, the states of the other agents will collapse into the following state:
To recover Alice’s secret state, Charlie and David should make two single-qubit measurements on their particles and transmit the measurement results to Bob via a classical channel. Obviously, if Charlie and David measure their particles by using the basis {|0⟩, |1⟩}, then their results are always correlated with each other. Thus, Bob can deduce the Charlie’s (David’s) results from David’s (Charlie’s) results. This shows that only one of the other two agents is needed to inform Bob of his measurement results. Suppose that Charlie or David’s measurement result is |01⟩, then Bob’s state will collapse into
After the above operation, Bob’s state eventually becomes
To demonstrate the realization of the protocol in detail, we still make the above assumptions; that is, after a series of operations, Bob’s state is as shown in Eq. (
This discussion is based on the assumption that Alice’s measurement result is |Ψ+ Φ−⟩x1y5 and Charlie or Bob’s measurement result is |01⟩. Taking all of the cases into account, we can work out the success probability of this scheme to be
The agent with low authority is able to recover the secret state. In this protocol, both Charlie and David have low power to recover the secret state. Here, we take Charlie as an example. Equation (
Like Case
The relationship between the coefficient and the probability is shown with Fig.
Due to the symmetry of the four-qubit cluster state, our protocol can be extended to multiparty agents. To illustrate this point more clearly, we first consider the case where there are two agents called Bobi (i = 1,2) with high authority and three agents called Charliej (j = 1, 2, 3) with low authority. The sender Alice prepares two two-qubit entangled states in Eq. (
Subsequently, Alice sends the particles xi + 1 and yi + 1 to Bobi (i = 1, 2), and the particles xj + 3 and yj + 3 to Charliej (j = 1, 2, 3). Alice keeps the particles x1 and y1 in her hand. Consequently, the four participants share two six-qubit clusters, thus forming a quantum channel required by the protocol. The state of the whole system is written as
To distribute |δ⟩xy in Eq. ( The agent with high authority is assigned to recover Alice’s secret state. Here, we take Bob1 as an example. Without loss of generality, we assume that Alice’s measurement result is |Ψ+Ψ+⟩xx1yy1, the states of the other agents will collapse into the state
To recover Alice’s secret state, the agents with low authority should make two single-qubit measurements on their particles by using the basis {|0⟩,|1⟩}. Their measurement results are always correlated with each other. This shows that only one of these agents is needed to inform Bob1 of his measurement results. Bob2 with high authority should measure his particles by using the basis {|+⟩, |−⟩}. Suppose that the measurement result of the agent with low authority is |00⟩ and Bob2’s is |+ −⟩, then the state of Bob1 will be
An agent with low authority is to recover the secret state. Here, we take Charlie1 as an example. Equation (
The process of the protocol is similar to that of the protocol with five agents. In this multiparty protocol, let agents Bob1, Bob2, . . ., and Bobm be in high grade, and the agents Charlie1, Charlie2, . . ., and Charlien be in low grade. Alice keeps the particles x1 and y1 in her hand. The whole system is
Alice wants to teleport the state |δ⟩xy shown in Eq. (
Because of the no-cloning theorem and entanglement monogamy, the only way for an outside eavesdropper[21–25] to obtain the secret state is to adopt the intercept-resend attack. In particular, because which one of the agents will possess the secret state is previously undefined in the scheme, it is supposed that the eavesdropper intercepts all of the particles sent to the agents and resends fake particles to the agents. To keep the quantum correlation among the agents, the eavesdropper prepares two cluster states in Eq. (
However, the quantum entanglement between the agents is destroyed. The agents can easily detect such an attack by performing local measurements on their particles. For example, they all perform the measurement by using the basis {|0⟩, |1⟩}. Under the attack by the eavesdropper, there is no correlation between the measurement results of the sender and the agents. However, in a no-eavesdropping case, where the measurement results of the sender and the agent with high authority are always correlated with each other, and the measurement results of the sender and the agents with lower authority are always anti-correlated with each other. Thus, the eavesdropping attack can always be detected in this way and a subset of entanglement channels will be sacrificed. As a matter of fact, most of entanglement-based quantum communication schemas need the users to utilize quantum correlations and sacrifice a subset of entanglement channels to check their security against an eavesdroppers’ interceptions.
We can exploit the definition, and the total efficiency for quantum state sharing can be defined as
In our protocol, we need two non-maximally entangled states which can be prepared by some methods.[26,27] According to Ziman et al.’s research,[28] the POVM operation can also be realized. Thus, our protocol is feasible. Moreover, the operations we perform during communication are all the basic operations which are less complex.
The proposed protocol uses a non-maximally entangled state to implement a hierarchical and probabilistic quantum information splitting protocol, whereas Xu’s protocol is implemented by using the maximally entangled state. Although the protocol of the maximally entangled state can recover the secret information successfully and deterministically, the maximally entangled state is easily influenced by the environment and becomes a non-maximally entangled state or a mixed state in practice. Compared with Peng et al.’s hierarchical and probabilistic quantum information splitting protocol, our proposed protocol achieves the sharing of an arbitrary two-qubit state. Moreover, our protocol can be extended to multiparty participants.
In general, we use a non-maximally entangled state to implement a hierarchical quantum information splitting protocol that shares arbitrary two qubits among three agents. In addition, different agents have different authorities for restoring the secret state. Bob with high authority only needs the cooperation of Charlie or David, while Charlie or David with low authority need the cooperation of the other two agents. In addition, the agent recovers the secret state by introducing two auxiliary particles through using the POVM operations. Due to the symmetry of the cluster state, we further extend the protocol into a multiparty protocol. When the agent with high authority is designed to recover the secret state, he will need the help of all the agents with high authority and one of the agents with low authority. However, the agent with low authority needs to cooperate with all of the agents to recover the secret state.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] |