Next Article in Journal
Information Theoretic Methods for Variable Selection—A Review
Next Article in Special Issue
Implementation of Fault-Tolerant Encoding Circuit Based on Stabilizer Implementation and “Flag” Bits in Steane Code
Previous Article in Journal
Testing for Serial Correlation in Autoregressive Exogenous Models with Possible GARCH Errors
Previous Article in Special Issue
Quantum Information of the Aharanov–Bohm Ring with Yukawa Interaction in the Presence of Disclination
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Probabilistic Hierarchical Quantum Information Splitting of Arbitrary Multi-Qubit States

1
School of Mathematics and Statistics, Henan University, Kaifeng 475004, China
2
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
3
Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(8), 1077; https://doi.org/10.3390/e24081077
Submission received: 29 June 2022 / Revised: 30 July 2022 / Accepted: 31 July 2022 / Published: 4 August 2022
(This article belongs to the Special Issue Quantum Computation and Quantum Information)

Abstract

:
By utilizing the non-maximally entangled four-qubit cluster states as the quantum channel, we first propose a hierarchical quantum information splitting scheme of arbitrary three-qubit states among three agents with a certain probability. Then we generalize the scheme to arbitrary multi-qubit states. Hierarchy is reflected on the different abilities of agents to restore the target state. The high-grade agent only needs the help of one low-grade agent, while the low-grade agent requires all the other agents’ assistance. The designated receiver performs positive operator-valued measurement (POVM) which is elaborately constructed with the aid of Hadamard matrix. It is worth mentioning that a general expression of recovery operation is derived to disclose the relationship with measurement outcomes. Moreover, the scheme is extended to multiple agents by means of the symmetry of cluster states.

1. Introduction

With the rapid development of computer networks, the demand for information security is sharply increasing. Quantum cryptography has unconditional security, which depends on the internal physical characteristics of quantum mechanics, such as the Heisenberg uncertainty principle and non-cloning theorem [1]. As the counterpart of classical secret sharing [2], quantum secret sharing (QSS) was first introduced by Hillery et al. [3] and has been one of the most significant branches of quantum cryptography. In QSS, the secret is divided into multiple pieces (called shares) and it can be constructed only through the cooperation of the shares. When the shared secret is a quantum state, QSS is termed quantum state sharing (QSTS) or quantum information splitting (QIS). The other agents can be regarded as the controlling party if one agent is identified as the receiver. From this point of view, QIS can be used to complete the task of controlled quantum teleportation (CQT) [4] in which an unknown state is teleported from a sender to a spatially separated receiver under the supervision of one or more controllers. Owing to its potential applications, e.g., creating joint accounts containing quantum money [5] and secure distributed quantum computation [6], QIS has been intensively studied [7,8,9,10,11,12,13,14,15] in the past two decades. For example, Luo et al. [11] investigated the application of χ state for QIS of an arbitrary three-qubit state. Li et al. [12] proposed a novel class of universal and flexible QIS schemes of arbitrary qubit and qudit states using quantum walks with multiple coins. In the meantime, experimental implementation of QIS has been reported [16,17,18].
The QIS schemes mentioned above mainly focus on the situation in which the authorities of the agents are identical. Considering the actual communication circumstance, Wang et al. [19] first proposed a hierarchical quantum information splitting (HQIS) scheme in the case where the agents are graded according to their abilities to restore the secret state. The high-grade agent requires some of the other agents’ help to complete the task, while the low-grade agent can do it only if all the other agents supply the assistance. Since then, much attention [20,21,22,23,24,25] has been paid to HQIS due to its useful applications in practice. Like many other quantum communication schemes [26,27,28], HQIS prefers using maximal entanglement to achieve perfect transmission. Nevertheless, the maximally entangled states are hard to maintain owing to the decoherence induced by the surrounding environment [29]. Thus, it is of great importance to investigate quantum communication via non-maximally entangled (NME) states [30,31,32,33,34,35,36]. Recently, based on NME four-particle cluster states, Xu et al. [35] and Guo et al. [36] respectively sketched new HQIS protocols to probabilistically realize the QSS of arbitrary unknown single-qubit state and two-qubit state via POVM. To our knowledge, there are no universal HQIS schemes of arbitrary multi-qubit states via POVM.
In this paper, we intend to devise a universal scheme to achieve the HQIS of arbitrary multi-qubit states with three agents via the NME resource. The agents lie in two disparate grades of which one agent lies in the high grade and two agents lie in the low grade. With the aid of the Hadamard matrix, we construct the general POVM operators. The recovery operation is derived from a general expression which distinctly discloses the relationship with measurement results. Based on the assistance of one inferior agent, the high-grade agent as the designated receiver can recover the target state with a certain probability by performing POVM rather than the usual projective measurement. While the low-grade agent requires all agents’ help. Then, we generalize the scheme from three agents to multiple agents by means of the symmetry of cluster states.
The outline of this paper is organized as follows. In Section 2, we first put forward a probabilistic HQIS scheme of arbitrary three-qubit states with three agents by utilizing the NME four-qubit cluster states as the entangled resource. The above scheme is extended to arbitrary n-qubit states in Section 3. In Section 4, we generalize the universal scheme of multi-qubit states from three agents to multiple agents. Section 5 is the security analysis. Some discussions and conclusions are given in the last section.

2. Probabilistic HQIS of Arbitrary Three-Qubit States with Three Agents

There are four participants, Alice, Bob, Charlie1 and Charlie2. Alice is the sender who wishes to teleport an unknown state to three agents in an asymmetric way such that any one of them can restore the secret state under the cooperation of other agents. The three agents are divided into two grades according to their abilities to recover the target state. High-grade agent Bob can restore the secret state only with the help of one low-grade agent while low-grade agent Charlie1 or Charlie2 needs the assistance of all the other agents.
Alice possesses a secret three-qubit state:
| φ 123 = ( α 0 | 000 + α 1 | 001 + α 2 | 010 + α 3 | 011 + α 4 | 100 + α 5 | 101 + α 6 | 110 + α 7 | 111 ) 123 .
She knows nothing about the state except that the complex parameters α 0 , , α 7 satisfy the normalization condition j = 0 7 | α j | 2 = 1 .
Three NME four-qubit cluster states,
| Ψ j A j B j C 1 j C 2 j = ( β j 0 | 0 | ψ 0 + β j 1 | 1 | ψ 1 ) A j B j C 1 j C 2 j , j = 1 , 2 , 3
are selected as entangled resource, where
| ψ 0 = | 000 + | 011 , | ψ 1 = | 100 | 111 ,
β j 0 , β j 1 are nonzero real numbers satisfying β j 0 2 + β j 1 2 = 1 2 and | β j 0 | < | β j 1 | . The qubit A j is held by Alice, qubits B j , C 1 j and C 2 j are distributed to the agents Bob, Charlie1 and Charlie2, respectively.
The initial whole system can be expressed as:
| φ 123 | Ψ 1 A 1 B 1 C 11 C 21 | Ψ 2 A 2 B 2 C 12 C 22 | Ψ 3 A 3 B 3 C 13 C 23 = ( α 0 | 000 + α 1 | 001 + α 2 | 010 + α 3 | 011 + α 4 | 100 + α 5 | 101 + α 6 | 110 + α 7 | 111 ) 123 ( p 1 , p 2 , p 3 = 0 1 β p | p 1 p 2 p 3 | ψ p 1 ψ p 2 ψ p 3 ) A 1 A 2 A 3 B 1 C 11 C 21 B 2 C 12 C 22 B 3 C 13 C 23 .
For convenience, we denote β 1 p 1 β 2 p 2 β 3 p 3 = β p , where p is the decimal form of the binary string p 1 p 2 p 3 . In other words, p = p 1 2 2 + p 2 2 1 + p 3 2 0 .
To complete the task, the participants need to perform the following operations.
Step 1 The sender Alice performs two-qubit projective measurements on her qubits ( 1 , A 1 ) , ( 2 , A 2 ) , ( 3 , A 3 ) under Bell basis,
| ξ 00 = | 00 + | 11 2 , | ξ 01 = | 01 + | 10 2 , | ξ 10 = | 00 | 11 2 , | ξ 11 = | 01 | 10 2 .
After the measurements, she broadcasts 6 bit classical information s 1 t 1 s 2 t 2 s 3 t 3 corresponding to her measurement outcome | ξ s 1 t 1 1 A 1 | ξ s 2 t 2 2 A 2 | ξ s 3 t 3 3 A 3 , s j , t j = 0 , 1 , j = 1 , 2 , 3 .
As a result, the remaining state collapses with equal probability into one of the 64 states | g s 1 t 1 s 2 t 2 s 3 t 3 :
1 2 2 { j = 0 1 ( 1 ) j s 1 β 1 , t 1 j | ψ t 1 j [ α 4 j β 2 , t 2 β 3 , t 3 | ψ t 2 ψ t 3 + ( 1 ) s 3 α 4 j + 1 β 2 , t 2 β 3 , t 3 1 | ψ t 2 ψ t 3 1 + ( 1 ) s 2 α 4 j + 2 β 2 , t 2 1 β 3 , t 3 | ψ t 2 1 ψ t 3 + ( 1 ) s 2 s 3 α 4 j + 3 β 2 , t 2 1 β 3 , t 3 1 | ψ t 2 1 ψ t 3 1 ] } .
Here and hereafter ⊕ means modulo 2 addition.
In order to clearly explain how our protocol implements, suppose Alice’s measurement result is | ξ 11 1 A 1 | ξ 01 2 A 2 | ξ 10 3 A 3 . The three agents’ qubits ( B 1 , C 11 , C 21 , B 2 , C 12 , C 22 , B 3 , C 13 , C 23 ) become
| g 110110 = 1 2 2 ( α 0 β 3 | ψ 0 ψ 1 ψ 1 + α 1 β 2 | ψ 0 ψ 1 ψ 0 α 2 β 1 | ψ 0 ψ 0 ψ 1 α 3 β 0 | ψ 0 ψ 0 ψ 0 + α 4 β 7 | ψ 1 ψ 1 ψ 1 + α 5 β 6 | ψ 1 ψ 1 ψ 0 α 6 β 5 | ψ 1 ψ 0 ψ 1 α 7 β 4 | ψ 1 ψ 0 ψ 0 ) .
At this time, none of the agents can recover the target state privately since their qubits are entangled with each other. Other agents’ cooperation is indispensable for the designated agent to complete his recovery task.
Step 2 According to Alice’s classical message, the agents apply the appropriate operations to achieve the goal that any one of agents recovers the secret state.
It will be discussed in two cases as far as the agents’ different authorities are concerned.
Case 1 The high-grade agent is designated as the receiver.
The state in Equation (7) can be decomposed as:
| g 110110 = 1 2 2 [ | 000 2 f ( α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 ) + | 001 2 f ( α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 ) + | 010 2 f ( α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 ) + | 011 2 f ( α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 ) + | 100 2 f ( α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 ) + | 101 2 f ( α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 ) + | 110 2 f ( α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 ) + | 111 2 f ( α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 ) ] C 11 C 12 C 13 C 21 C 22 C 23 B 1 B 2 B 3 ,
where
f ( u 0 , , u 7 ) = u 0 β 0 | 000 + u 1 β 1 | 001 + u 2 β 2 | 010 + u 3 β 3 | 011 + u 4 β 4 | 100 + u 5 β 5 | 101 + u 6 β 6 | 110 + u 7 β 7 | 111 .
It is clear that Charlie1’s and Charlie2’s qubits are identical. From Equation (8), if one of them carries out single-qubit projective measurements under Z-basis { | 0 , | 1 } , the qubits of Bob and the other low-grade agent will collapse into a product state. That means only one of the low-grade agents is sufficient to supply assistance. Suppose Charlie1 performs projective measurements and gets result | 0 C 11 | 1 C 12 | 0 C 13 , which is sent to Bob in the form of classical message 010. Then Bob’s qubits collapse into:
1 2 2 ( α 0 β 6 | 110 + α 1 β 7 | 111 + α 2 β 4 | 100 α 3 β 5 | 101 + α 4 β 2 | 010 α 5 β 3 | 011 α 6 β 0 | 000 + α 7 β 1 | 001 ) B 1 B 2 B 3 .
One can see that Bob’s state mix the information of the secret state and the entangled channel. To reconstruct the secret state, Bob introduces three auxiliary qubits with initial states | 000 e 1 e 2 e 3 and executes Controlled-NOT (CNOT) operations C B j e j with the qubit B j as the controlled qubit and e j as the target one, j = 1 , 2 , 3 . Thus, Bob’s state transforms into:
| Γ = 1 2 2 ( α 0 β 6 | 110 2 + α 1 β 7 | 111 2 + α 2 β 4 | 100 2 α 3 β 5 | 101 2 + α 4 β 2 | 010 2 α 5 β 3 | 011 2 α 6 β 0 | 000 2 + α 7 β 1 | 001 2 ) B 1 B 2 B 3 e 1 e 2 e 3 .
Denote
| K 000 | K 001 | K 010 | K 011 | K 100 | K 101 | K 110 | K 111 = H 3 · diag { α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 } | 000 | 001 | 010 | 011 | 100 | 101 | 110 | 111
and
| Q 000 | Q 001 | Q 010 | Q 011 | Q 100 | Q 101 | Q 110 | Q 111 = H 3 · diag { β 0 , β 1 , β 2 , β 3 , β 4 , β 5 , β 6 , β 7 } | 000 | 001 | 010 | 011 | 100 | 101 | 110 | 111 ,
where H is the Hadamard matrix 1 1 1 1 . Then Equation (11) can be rephrased as:
| Γ = 1 16 2 r 1 , r 2 , r 3 = 0 1 | K r 1 r 2 r 3 B 1 B 2 B 3 | Q r 1 r 2 r 3 e 1 e 2 e 3 .
It shows that | K r 1 r 2 r 3 can be obtained if performing appropriate measurements on the auxiliary qubits and obtains the measurement result | Q r 1 r 2 r 3 . Unfortunately, | Q 000 , , | Q 111 are not mutually orthogonal such that they cannot be distinguished deterministically by the usual projective measurement. To differentiate non-orthogonal states, Bob needs to execute POVM on his auxiliary qubits under measurement operators { O 000 , , O 111 , O 8 } :
O r 1 r 2 r 3 = 1 ω | M r 1 r 2 r 3 M r 1 r 2 r 3 | , O 8 = I r 1 , r 2 , r 3 = 0 1 O r 1 r 2 r 3 ,
where ω is a coefficient related with β 0 , , β 7 and
| M 000 | M 001 | M 010 | M 011 | M 100 | M 101 | M 110 | M 111 = 1 ε H 3 · diag { 1 β 0 , 1 β 1 , 1 β 2 , 1 β 3 , 1 β 4 , 1 β 5 , 1 β 6 , 1 β 7 } | 000 | 001 | 010 | 011 | 100 | 101 | 110 | 111 .
Here, ε = j = 0 7 1 β j 2 = 1 8 β 10 2 β 11 2 β 20 2 β 21 2 β 30 2 β 31 2 . In order to ensure operator O 8 is positive, ω should satisfy ω 64 max { β 0 2 , , β 7 2 } .
If Bob obtains the measurement result O r 1 r 2 r 3 with the probability Γ | O r 1 r 2 r 3 | Γ = 1 8 ω ε , he can restore the target state by performing appropriate Pauli operations. For clarity, assume his measurement result is O 011 . Then Bob performs operation Y B 1 X B 2 I B 3 on his collapsed state
| K 011 = ( α 0 | 110 + α 1 | 111 + α 2 | 100 + α 3 | 101 α 4 | 010 α 5 | 011 α 6 | 000 α 7 | 001 ) B 1 B 2 B 3
and recovers the target state. Bob’s recovery operations conditioned on Charlie1’s (or Charlie2’s) measurement result and his own POVM outcome O r 1 r 2 r 3 are summarized in Table 1, where I, X, Y, Z are the Pauli operations. However, Bob may also get O 8 with the probability 1 1 ω ε . In this case, he cannot infer the secret state of his qubits. Therefore, the total success probability is:
P = 1 8 ω ε × 8 × 8 × 64 = ( 64 β 10 β 11 β 20 β 21 β 30 β 31 ) 2 ω .
Case 2 The low-grade agent is designated as the receiver.
Suppose Charlie1 is appointed as the receiver since Charlie1 and Charlie2 have the same authority.
Denote
| 0 ˜ = | = | 0 + | 1 2 , | 1 ˜ = | = | 0 | 1 2
and
f ˜ ( u 0 , , u 7 ) = u 0 | + + + + u 1 | + + + u 2 | + + + u 3 | + + u 4 | + + + u 5 | + + u 6 | + + u 7 | .
Then the state in Equation (7) can be rewritten as:
| g 110110 = 1 8 b 1 , b 2 , b 3 = 0 1 | b 1 ˜ b 2 ˜ b 3 ˜ B 1 B 2 B 3 [ | + + + f ˜ ( α ^ 6 , α ^ 7 , α ^ 4 , α ^ 5 , α ^ 2 , α ^ 3 , α ^ 0 , α ^ 1 ) + | + + f ˜ ( α ^ 7 , α ^ 6 , α ^ 5 , α ^ 4 , α ^ 3 , α ^ 2 , α ^ 1 , α ^ 0 ) | + + f ˜ ( α ^ 4 , α ^ 5 , α ^ 6 , α ^ 7 , α ^ 0 , α ^ 1 , α ^ 2 , α ^ 3 ) | + f ˜ ( α ^ 5 , α ^ 4 , α ^ 7 , α ^ 6 , α ^ 1 , α ^ 0 , α ^ 3 , α ^ 2 ) | + + f ˜ ( α ^ 2 , α ^ 3 , α ^ 0 , α ^ 1 , α ^ 6 , α ^ 7 , α ^ 4 , α ^ 5 ) | + f ˜ ( α ^ 3 , α ^ 2 , α ^ 1 , α ^ 0 , α ^ 7 , α ^ 6 , α ^ 5 , α ^ 4 ) + | + f ˜ ( α ^ 0 , α ^ 1 , α ^ 2 , α ^ 3 , α ^ 4 , α ^ 5 , α ^ 6 , α ^ 7 ) + | f ˜ ( α ^ 1 , α ^ 0 , α ^ 3 , α ^ 2 , α ^ 5 , α ^ 4 , α ^ 7 , α ^ 6 ) ] C 21 C 22 C 23 C 11 C 12 C 13 ,
where
α ^ 0 = α 0 β 6 , α ^ 1 = ( 1 ) b 3 α 1 β 7 , α ^ 2 = ( 1 ) b 2 α 2 β 4 , α ^ 3 = ( 1 ) b 2 b 3 α 3 β 5 , α ^ 4 = ( 1 ) b 1 α 4 β 2 , α ^ 5 = ( 1 ) b 1 b 3 α 5 β 3 , α ^ 6 = ( 1 ) b 1 b 2 α 6 β 0 , α ^ 7 = ( 1 ) b 1 b 2 b 3 α 7 β 1 .
To achieve the goal, both Bob and Charlie2 carry out projective measurements under X-basis { | + , | } and inform Charlie1 of the measurement outcomes in forms of classical message. Corresponding to Charlie2’s measurement outcome, Charlie1 first performs the unitary operation listed in Table 2.
To be explicit, assume Bob and Charlie2’s measurement outcomes are | + B 1 B 2 B 3 and | + + C 21 C 22 C 23 , then the remaining qubits collapse into:
1 8 ( α 0 β 6 | + + + α 1 β 7 | + α 2 β 4 | + α 3 β 5 | α 4 β 2 | + + + α 5 β 3 | + + + α 6 β 0 | + + + α 7 β 1 | + ) C 11 C 12 C 13 .
Charlie1 performs the operation H C 11 ( X H ) C 12 H C 13 and gets:
1 8 f ( α 6 , α 7 , α 4 , α 5 , α 2 , α 3 , α 0 , α 1 ) .
In the following, Charlie1 employs similar operations to those of the assigned receiver Bob in Case 1. Charlie1 introduces three qubits with initial states | 000 e 1 e 2 e 3 and obtains
| Γ = 1 8 ( α 0 β 6 | 110 2 + α 1 β 7 | 111 2 α 2 β 4 | 100 2 α 3 β 5 | 101 2 α 4 β 2 | 010 2 α 5 β 3 | 011 2 + α 6 β 0 | 000 2 + α 7 β 1 | 001 2 ) C 11 C 12 C 13 e 1 e 2 e 3
after performing the CNOT operations C C 1 j e j , j = 1 , 2 , 3 . Then he performs POVM defined in Equation (15). If Charlie1 obtains O r 1 r 2 r 3 with equal probability Γ | O r 1 r 2 r 3 | Γ = 1 64 ω ε , he can execute appropriate Pauli operations listed in Table 3 to recover the secret state. Otherwise, he fails.
Similar discussions can be made for other measurement results of Alice, Bob and Charlie2. Take all the possible measurement results into account, one can find that the success probability of Charlie1 is identical to that in Equation (18).

3. Probabilistic HQIS of Arbitrary n -Qubit States with Three Agents

The above scheme for an arbitrary three-qubit state can be generalized to an arbitrary n-qubit state,
| φ 1 n = a 1 , , a n = 0 1 α a | a 1 a n 1 n ,
where the subscript a represents the decimal form of binary string a 1 a n , α a is a complex number satisfying a = 0 2 n 1 | α a | 2 = 1 .
n NME four-qubit cluster states | Ψ j A j B j C 1 j C 2 j defined in Equation (2) are shared as the quantum channel, where the particle A j is in Alice’s possession, while the agents Bob, Charlie1 and Charlie2 possess particles B j , C 1 j , C 2 j , j = 1 , , n .
The combined state of the total system is:
| φ 1 n | Ψ 1 A 1 B 1 C 11 C 21 | Ψ n A n B n C 1 n C 2 n = a 1 , , a n = 0 1 α a j = 1 n ( p j , q j = 0 1 ( 1 ) p j q j β j p j | a j p j p j q j q j ) j A j B j C 1 j C 2 j .
The detailed process is described as follows.
Step 1 Alice initially executes joint projective measurements on her qubits ( 1 , A 1 ) , ,   ( n , A n ) under the Bell basis. Then, she broadcasts 2 n cbits s 1 t 1 s n t n to announce her measurement result | ξ s 1 t 1 1 A 1 | ξ s n t n n A n .
Since
| k h = 1 2 n = 0 1 ( 1 ) k n | ξ n , k h ,
the state collapses into
| g s 1 t 1 s n t n = 1 2 n / 2 a 1 , , a n = 0 1 α a j = 1 n ( q j = 0 1 ( 1 ) a j ( s j q j ) t j q j β j , a j t j | a j t j | q j | q j ) B j C 1 j C 2 j .
Step 2 According to Alice’s measurement result, the agents perform the appropriate operations to realize that any one of agents recovers the secret state.
Due to the different grades of agents, we still discuss it in two cases.
Case 1 The high-grade agent is designated as the receiver.
The high-grade agent Bob only requires the help of one low-grade agent as Charlie1 and Charlie2 have exactly the same qubits. If one of the low-grade agents performs n single-qubit projective measurements under the Z-basis and obtains the measurement result | c 1 | c n which is sent to Bob in the form of classical bits c 1 c n , Bob’s qubits collapse into
1 2 n / 2 a 1 , , a n = 0 1 α a j = 1 n ( 1 ) a j ( s j c j ) β j , a j t j | a j t j .
Bob introduces n auxiliary qubits | 0 0 e 1 e n and performs CNOT operations C B j e j . Thus, he gets
| Γ = 1 2 n / 2 a 1 , , a n = 0 1 α a j = 1 n ( 1 ) a j ( s j c j ) β j , a j t j | a j t j B j | a j t j e j .
The state in the above equation can be decomposed into:
| Γ = 1 2 3 n / 2 r 1 , , r n = 0 1 | K r 1 r n B 1 B n | Q r 1 r n e 1 e n ,
where
| K r 1 r n = a 1 , , a n = 0 1 α a j = 1 n ( 1 ) a j ( s j c j r j ) t j r j | a j t j B j
and
| Q r 1 r n = a 1 , , a n = 0 1 j = 1 n ( 1 ) a j r j β j a j | a j e j .
Since | Q r 1 r n , r 1 , , r n = 0 , 1 are not mutually orthogonal in general, Bob had better perform POVM which plays an important role in state discrimination. The measurement operators are:
O r 1 r n = 1 ω | M r 1 r n M r 1 r n | , O 2 n = I r 1 r n = 0 1 O r 1 r n ,
where ω is related to the coefficient of the quantum channel and
| M r 1 r n = 1 ε a 1 , , a n = 0 1 j = 1 n ( 1 ) a j r j 1 β j a j | a j .
Here, ε = a 1 , , a n = 0 1 1 β 1 a 1 2 β n a n 2 and ω satisfies ω 4 n max { β 0 2 , , β 2 n 1 2 } which is to meet the condition that the elements of POVM must be positive operators. If Bob obtains measurement result O r 1 r n with equal probability Γ | O r 1 r n | Γ = 1 2 n ω ε , his qubits ( B 1 , , B n ) collapse to | K r 1 r n . Then, Bob performs
R B = ( Z s 1 c 1 r 1 X t 1 ) B 1 ( Z s n c n r n X t n ) B n
and recovers the target state. If his measurement outcome is O 2 n , he fails.
Case 2 The low-grade agent is designated as the receiver.
Suppose Charlie1 is assigned as the receiver. Bob and Charlie2 need to perform projective measurements under the X-basis and inform him of the measurement outcomes. Since
| h = l = 0 1 ( 1 ) l h | l ˜ , h = 0 , 1 ,
Charlie1’s qubits collapse into:
( 1 ) j = 1 n t j b j 1 2 n a 1 , , a n = 0 1 α a j = 1 n ( 1 ) a j ( s j b j ) β j , a j t j | a j t j c j ˜ C 1 j .
If Bob’s and Charlie2’s measurement outcomes are | b j ˜ and | c j ˜ , b j , c j { 0 , 1 } , j = 1 , , n . Charlie1 performs ( X c 1 H ) C 11 ( X c n H ) C 1 n and gets:
( 1 ) j = 1 n t j b j 1 2 n a 1 , , a n = 0 1 α a j = 1 n ( 1 ) a j ( s j b j ) β j , a j t j | a j t j C 1 j .
Similar to Case 1, Charlie1 carries out POVM in Equation (35) after introducing auxiliary qubits and performing CNOT operations. If his measurement outcome is O r 1 r n , Charlie1 can reconstruct the secret state by performing recovery operation
R C = ( Z s 1 b 1 r 1 X t 1 ) C 11 ( Z s n b n r n X t n ) C 1 n .
While measurement result O 2 n indicates the task is failed.
Regardless of the grade of agents, the total success probability is:
P = 2 n × 4 n ω ε = 2 3 n ( β 10 β 11 β n 0 β n 1 ) 2 ω .
Since | β j 0 | | β j 1 | , the total success probability is
P 4 n β 10 2 β n 0 2 .

4. Probabilistic HQIS of Arbitrary n -Qubit States with N Agents

It is necessary to investigate the situation of multiple agents as there are many users in a practical communication network. The hierarchy of agents may be diverse. Here, we consider one simple case in which the N agents are divided into two grades: u agents (Bob1, ⋯, Bobu) lie in high grade and v agents (Charlie1, ⋯, Charliev) lie in low grade.
The main aim is teleporting an arbitrary n-qubit state | φ 1 n shown in Equation (26) from the sender to any one of the N agents in an asymmetrical way.
Before the scheme officially begins, Alice prepares n NME four-qubit cluster states | Ψ j A j B 1 j C 1 j C 2 j , j = 1 , , n and introduces some qubits | 0 0 B 2 j B u j C 3 j C v j . Then she carries out a series of CNOT operations as shown in Figure 1 and gets
| Ψ j = ( β j 0 | 0 | ψ 0 + β j 1 | 1 | ψ 1 ) A j B 1 j B u j C 1 j C v j , j = 1 , , n ,
where
| ψ 0 = | 0 0 u 0 0 v + | 0 0 u 1 1 v , | ψ 1 = | 1 1 u 0 0 v | 1 1 u 1 1 v .
Next, Alice distributes the qubits B 1 j , , B u j , C 1 j , , C v j to Bob1, ⋯, Bobu, Charlie1, ⋯, and Charliev, respectively. The distribution of qubits among N agents is shown in Figure 2.
The initial whole system is:
| φ 12 n | Ψ 1 A 1 B 11 B u 1 C 11 C v 1 | Ψ n A n B 1 n B u n C 1 n C v n = a 1 , , a n = 0 1 α a j = 1 n ( p j , q j = 0 1 ( 1 ) p j q j β j p j | a j p j p j q j q j ) j A j B 1 j B u j C 1 j C v j .
The scheme can be illustrated as follows.
Step 1 The sender Alice carries out Bell-basis measurements on her qubits ( 1 , A 1 ) , , ( n , A n ) . If the measurement result is | ξ s 1 t 1 , , | ξ s n t n , she broadcasts classical bits s 1 t 1 s n t n , s j , t j { 0 , 1 } , j = 1 , , n .
Since the state in Equation (46) can be rewritten as:
1 2 n / 2 a 1 , , a n = 0 1 α a j = 1 n ( q j , s j , t j = 0 1 ( 1 ) a j ( s j q j ) t j q j β j , a j t j | ξ s j t j | a j t j u | q j v ) ,
the state collapses to:
| g s 1 t 1 s n t n = 1 2 n / 2 a 1 , , a n = 0 1 α a j = 1 n ( q j = 0 1 ( 1 ) a j ( s j q j ) t j q j β j , a j t j | a j t j u | q j v ) .
Step 2 According to Alice’s classical message, the agents apply the appropriate operations to achieve the goal that any one of agents recovers the secret state.
Since the same-grade agents have the same authority, we assume that the high-grade agent Bob1 or the low-grade agent Charlie1 recovers the secret state.
Case 1 The high-grade agent Bob1 is designated as the receiver.
The state in Equation (48) can be rewritten as:
a 1 , , a n = 0 1 α a j = 1 n { q j = 0 1 ( 1 ) a j ( s j q j ) t j q j | a j t j t = 2 u ( k l j = 0 1 ( 1 ) ( a j t j ) l t j β j , a j t j | k l j ˜ ) | q j v }
up to the global phase.
Only if the other high-grade agent and one low-grade agent respectively perform projective measurements under the X-basis and Z-basis, can Bob1 restore the target state with a certain probability. Assume the measurement results of Bob2, ⋯, Bobu are | b 2 j ˜ , , | b u j ˜ and the measurement outcomes of Charlie1 are | c j , where b 2 j , , b u j , c j { 0 , 1 } , j = 1 , , n . At the moment, Bob1’s qubits collapse into:
a 1 , , a n = 0 1 α a j = 1 n ( 1 ) a j ( s j c j b 2 j b u j ) β j , a j t j | a j t j
up to the global phase.
Bob1 introduces auxiliary qubits | 0 0 e 1 e n and performs CNOT operations C B j e j . Thus, he gets:
a 1 , , a n = 0 1 α a j = 1 n ( 1 ) a j ( s j c j b 2 j b u j ) β j , a j t j | a j t j B j | a j t j e j .
Then he performs POVM in Equation (35) on the auxiliary qubits. Analogously, if his POVM outcome is O r 1 r n , Bob1 carries out unitary operation
R B = ( Z c 1 s 1 b 21 b u 1 r 1 X t 1 ) B 11 ( Z c n s n b 2 n b u n r n X t n ) B 1 n
and restores the secret state on his own qubits. If he obtains measurement result O 2 n , the goal cannot be achieved.
Case 2 The low-grade agent Charlie1 is designated as the receiver.
To assist Charlie1 in recovering the target state, all the other agents perform projective measurements under the X-basis and inform him of the measurement outcomes. Assume the measurement outcomes of Bob1, ⋯, Bobu, Charlie2, ⋯ Charliev are | b 1 j ˜ , , | b u j ˜ , | c 2 j ˜ , , | c v j ˜ , j = 1 , , n . Then Charlie1’s qubits collapse into:
a 1 , , a n = 0 1 α a j = 1 n ( 1 ) a j ( s j b 1 j b u j ) β j , a j t j | a j t j c 2 j c v j ˜ C 1 j
up to a global phase.
Charlie1 performs ( X c 21 c v 1 H ) C 11 ( X c 2 n c v n H ) C 1 n and gets
a 1 , , a n = 0 1 α a j = 1 n ( 1 ) a j ( s j b 1 j b u j ) β j , a j t j | a j t j C 1 j .
Similar to Case 1, Charlie1 performs POVM in Equation (35) after introducing auxiliary qubits and executing CNOT operations. If the measurement outcome is O r 1 r n , his recovery operation can be summarized as:
R C = ( Z s 1 b 11 b u 1 r 1 X t 1 c 21 c v 1 H ) C 11 ( Z s n b 1 n b u n r n X t 1 c 2 n c v n H ) C 1 n .
While measurement result O 2 n indicates task is failed.
The total success probability is the same as the case of three agents.

5. Security Analysis

For simplicity, take the case of three agents as an example. In order to ensure the security, Alice adopts the following strategies to detect eavesdropping. Besides n NME four-qubit cluster states | Ψ j A j B j C 1 j C 2 j , j = 1 , , n , Alice generates an ordered sequence P A = { A 1 , , A n } using all the first qubits in her possession. Similarly, she forms another three ordered sequences P B = { B 1 , , B n } , P C 1 = { C 11 , , C 1 n } and P C 2 = { C 21 , , C 2 n } . Then she prepares 3 n decoy photons { d 1 , , d 3 n } chosen from { | 0 , | 1 , | + , | } and randomly insert them into the three sequence to yield the larger sequences P B , P C 1 , P C 2 . It should be emphasized that the final order of all sequences is only known by Alice.
There are two kinds of eavesdropping. One is that an illegal external eavesdropper Eve manages to steal secret information, the other is that there is a dishonest internal eavesdropper.
(I) Outsider attack.
It is not determined which agent is the receiver until the entangled channel particles are distributed. In order to obtain the secret state, Eve intercepts all particles distributed from Alice to the three agents and resends the forged one to them. In this case, once Alice conducts eavesdropping inspection, she tells the three agents about the location, state and measurement basis (Z-basis or X-basis). Then she asks each agent to measure the decoy photons under the measurement basis and publish the measurement results. Only if the agents’ measurement results are consistent with Alice’s predicted results, does the protocol continue. In addition, since Eve has no access to the coefficients of the NME channel, he can not carry out correct POVM to restore the secret state even if he intercepts the agents’ particles.
(II) Insider attack.
The influence of dishonest agents is destructive. Without loss of generality, assume that high-grade agent Bob is the internal eavesdropper. If everyone completely ignores his identity and consents to him as the receiver, he can easily acquire the secret state. In this case, our agreement cannot resist internal attacks. If the low-grade agent is designated as the receiver and Bob wants to steal the confidential state, one way is to intercept the channel particles of the low-grade agents and resend them false particles. However, because the decoy photons of different agents are different, eavesdropping will be found by the eavesdropping inspection. Another way is an entanglement measurement attack. Bob performs the unitary operation to act on Charlie1’s or Charlie2’s particles he has intercepted and the auxiliary particles he has prepared, so that he can measure the auxiliary particles to obtain information about the secret state. This attack will also be detected because of errors caused by decoy particles. The specific process is similar to that in Ref. [37].

6. Discussions and Conclusions

In fact, besides POVM, the designated receiver can adopt the collective unitary operation to restore the secret state. Taking the high-grade agent Bob as the receiver, based on one of the low-grade agent’s help, Bob’s qubits collapse into the state in Equation (30). Similar to Ref. [34], Bob first introduces an auxiliary qubit | 0 e and performs a collective unitary transformation diag ( U 0 , , U 2 n 1 ) on his qubits ( B 1 , , B n , e ) . Then Bob measures the auxiliary qubit under the Z-basis. If the measurement result is | 0 e , he performs appropriate operations on the collapsed state and recovers the target state. If the measurement result is | 1 e , the protocol fails.
In conclusion, we devise a universal scheme to probabilistically realize the HQIS of arbitrary multi-qubit states among multiple agents by using NME four-qubit cluster states as the quantum resource. Comparing with the HQIS scheme for arbitrary single- and two-qubit states [22,23], our work has the following advantages: (1) Our schemes are applicable for arbitrary multi-qubit states with the aid of elaborately constructed multi-qubit POVM; (2) We derive the general expression of a recovery operation which clearly discloses the relationship with the measurement results; (3) We describe the specific process of HQIS with multiple agents. Our schemes are practical as NME states are easier to generate and maintain than the maximally entangled resources and agents’ unequal authorities are in line with the actual communication. Moreover, the preparation of the NME four-qubit cluster states, Bell-basis measurement, local CNOT and Pauli operations and POVM are required in our schemes. Besides POVM, other operations are easily implemented. Fortunately, POVM can be realized by using measurement assisted programmable quantum processors [38] and the ensemble approach to polarization optics [39]. It means our schemes are achievable since these necessary operations are feasible under the current experimental technologies.

Author Contributions

Writing—original draft, J.T.; writing—review and editing, S.-Y.M. and Q.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (Grant Nos. 62172341, 62172196, 61572246, 61201253), the Open Foundation of State Key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) (Grant No. SKLNST-2020-2-02), the Open Foundation of Guangxi Key Laboratory of Trusted Software (Grant No. KX202040).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wotters, W.K.; Zurek, W.H. A single quantum cannot be clone. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
  2. Ahlswede, R.; Csiszar, I. Common randomness in information theory and cryptography. IEEE Trans. Inf. Theor. 1993, 39, 1121–1132. [Google Scholar] [CrossRef]
  3. Hillery, M.; Buzek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829–1834. [Google Scholar] [CrossRef] [Green Version]
  4. He, M.Y.; Ma, S.Y.; Kang, K.P. A universal protocol for bidirectional controlled teleportation with network coding. Commun. Theor. Phys. 2021, 73, 105104. [Google Scholar] [CrossRef]
  5. Wiesner, S. Conjugate coding. ACM Sigact News 1983, 15, 78–88. [Google Scholar] [CrossRef]
  6. Humphreys, P.C.; Kalb, N.; Morits, J.P.J.; Schouten, R.N.; Vermenulen, R.F.L.; Twitchen, D.J.; Markham, M.; Hanson, R. Deterministic delivery of remote entanglement on a quantum network. Nature 2018, 558, 268–273. [Google Scholar] [CrossRef] [Green Version]
  7. Gottesman, D. Theory of quantum secret sharing. Phys. Rev. A 2000, 61, 042311. [Google Scholar] [CrossRef] [Green Version]
  8. Wen, Z.; Liu, Y.M.; Zhang, Z.J. Splitting a qudit state via Greenberger-Horne-Zeilinger states of qubits. Opt. Commun. 2010, 28, 628–632. [Google Scholar]
  9. Hou, K.; Liu, G.H.; Zhang, X.Y.; Sheng, S.Q. An efficient scheme for five-party quantum state sharing of an arbitrary m-qubit state using multiqubit cluster states. Quantum Inf. Process. 2011, 10, 463–473. [Google Scholar] [CrossRef]
  10. Chen, X.; Jiang, M.; Chen, X.P.; Li, H. Quantum state sharing of an arbitrary three-qubit state by using three sets of W-class states. Quantum Inf. Process. 2013, 12, 2405–2416. [Google Scholar] [CrossRef]
  11. Luo, M.X.; Deng, Y. Quantum splitting an arbitrary three-qubit state with χ-state. Quantum Inf. Process. 2013, 12, 773–784. [Google Scholar] [CrossRef]
  12. Li, H.J.; Li, J.; Xiang, N.; Zheng, Y.; Yang, Y.G.; Naseri, M. A new kind of universal and flexible quantum information splitting scheme with multi-coin quantum walks. Quantum Inf. Process. 2019, 18, 316. [Google Scholar] [CrossRef]
  13. Ma, L.Y. Two-qubit quantum state sharing protocol based on Bell state. Int. J. Theor. Phys. 2020, 59, 1844. [Google Scholar] [CrossRef]
  14. Xu, G.; Zhou, T.A.; Chen, X.B.; Wang, X.J. Splitting an arbitrary three-qubit state via a five-qubit cluster state and a Bell state. Entropy 2022, 24, 381. [Google Scholar] [CrossRef]
  15. Ma, X.J.; Zhou, R.G.; Hu, W.W. Improved two-qubit quantum state sharing protocol based on entanglement swapping of bell states. Quantum Inf. Process. 2022, 21, 100. [Google Scholar] [CrossRef]
  16. Xia, Y.; Jie, S.; Song, H.S. Quantum state sharing using linear optical elements. Opt. Commun. 2008, 281, 4946–4950. [Google Scholar] [CrossRef]
  17. Lu, H.; Zhang, Z.; Chen, L.K.; Li, Z.D.; Liu, C.; Li, L.; Liu, N.L.; Ma, X.F.; Chen, Y.A.; Pan, J.W. Secret sharing of a quantum state. Phys. Rev. Lett. 2016, 117, 030501. [Google Scholar] [CrossRef] [Green Version]
  18. Lee, S.M.; Lee, S.W.; Jeong, H.; Park, H.S. Quantum teleportation of shared quantum secret. Phys. Rev. Lett. 2020, 124, 060501. [Google Scholar] [CrossRef] [Green Version]
  19. Wang, X.W.; Xia, L.X.; Wang, Z.Y.; Zhang, D.Y. Hierarchical quantum information splitting. Opt. Commun. 2010, 283, 1196–1199. [Google Scholar] [CrossRef] [Green Version]
  20. Wang, X.W.; Zhang, D.Y.; Tang, S.Q. Hierarchical quantum information splitting with six-photon cluster states. Int. J. Theor. Phys. 2010, 48, 2691–2697. [Google Scholar] [CrossRef]
  21. Wang, X.W.; Zhang, D.Y.; Tang, S.Q. Multiparty hierarchical quantum-information splitting. J. Phys. B-At. Mol. Opt. 2011, 44, 035505. [Google Scholar] [CrossRef] [Green Version]
  22. Li, D.F.; Zheng, Y.D.; Liu, X.F. Hierarchical quantum teleportation of arbitrary single-qubit state by using four-qubit cluster state. Int. J. Theor. Phys. 2021, 60, 1911–1919. [Google Scholar] [CrossRef]
  23. Xu, G.; Wang, C.; Yang, Y.X. Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state. Quantum Inf. Process. 2014, 13, 43–57. [Google Scholar] [CrossRef]
  24. Zha, X.W.; Miao, N.; Wang, H.F. Hierarchical quantum information splitting of an arbitrary two-qubit using a single quantum resource. Int. J. Theor. Phys. 2019, 58, 2428–2434. [Google Scholar] [CrossRef]
  25. Wang, N.N.; Ma, S.Y.; Li, X. Hierarchical controlled quantum communication via the χ-state under noisy environment. Mod. Phys. Lett. A 2020, 35, 2050306. [Google Scholar] [CrossRef]
  26. Zhou, N.R.; Zhu, K.N.; Zou, X.F. Multi-party semi-quantum key distribution protocol with four-particle cluster states. Ann. Phys. 2019, 531, 1800520. [Google Scholar] [CrossRef]
  27. Wang, N.N.; Ma, S.Y. Hierarchical controlled remote preparation via Brown state under noisy environment. Int. J. Theor. Phys. 2020, 59, 2816–2829. [Google Scholar] [CrossRef]
  28. Ma, S.Y.; Wang, N.N. Hierarchical remote preparation of an arbitrary two-qubit state with multiparty. Quantum Inf. Process. 2021, 20, 276. [Google Scholar] [CrossRef]
  29. Shor, P.W. Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A 1995, 52, R2493–R2496. [Google Scholar] [CrossRef]
  30. Javed, S.; Prakash, R.; Prakash, H. High success perfect transmission of 1-qubit information using purposefully delayed sharing of non-maximally entangled 2-qubit resource and repeated generalized Bell-state measurements. Int. J. Quantum Inf. 2021, 19, 2150015. [Google Scholar] [CrossRef]
  31. Chen, W.L.; Ma, S.Y.; Qu, Z.G. Controlled remote preparation of an arbitrary four-qubit cluster-type state. Chin. Phys. B. 2016, 25, 100304. [Google Scholar] [CrossRef]
  32. Ma, S.Y.; Chen, X.B.; Luo, M.X. Probabilistic quantum network coding of M-qudit states over the butterfly network. Opt. Commun. 2010, 283, 497–501. [Google Scholar] [CrossRef]
  33. Pan, X.B.; Chen, X.B.; Xu, G.; Ahmad, H.; Shang, T.; Li, Z.P.; Yang, Y.X. Quantum network coding without loss of information. Quantum Inf. Process. 2021, 20, 65. [Google Scholar] [CrossRef]
  34. Feng, K.H.; Lu, X.Q.; Ping, Z. Probabilistic hierarchically controlled teleportation of an arbitrary m-qudit state with a pure entangled quantum channel. Sci. Sin.-Phys. Mech. Astron. 2022, 52, 230311. (In Chinese) [Google Scholar] [CrossRef]
  35. Xu, G.; Shan, R.T.; Chen, X.B. Probabilistic and hierarchical quantum information splitting based on the non-maximally entangled cluster state. CMC-Comput. Mater. Con. 2021, 69, 339–349. [Google Scholar] [CrossRef]
  36. Guo, W.M.; Qin, L.R. Hierarchical and probabilistic quantum information splitting of an arbitrary two-qubit state via two cluster states. Chin. Phys. B 2018, 27, 110302. [Google Scholar] [CrossRef]
  37. Li, F.; Yan, J.; Zhu, S. General quantum secret sharing scheme based on two qudit. Quantum Inf. Process. 2021, 20, 328. [Google Scholar] [CrossRef]
  38. Ziman, M.; Bužek, V. Realization of positive-operator-valued measures using measurement-assisted programmable quantum processors. Phys. Rev. A 2005, 72, 022343. [Google Scholar] [CrossRef] [Green Version]
  39. Rao, A.V.G.; Devi, A.R.U.; Rajagopal, A.K. Positive-operator-valued-measure view of the ensemble approach to polarization optics. J. Opt. Soc. Am. A 2008, 25, 874–880. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The generation circuit of the state | Ψ j .
Figure 1. The generation circuit of the state | Ψ j .
Entropy 24 01077 g001
Figure 2. The qubit shared by the sender and N agents. White points represent Alice’s secret particles, black points represent particles in the NME cluster states. The solid lines stand for entanglements.
Figure 2. The qubit shared by the sender and N agents. White points represent Alice’s secret particles, black points represent particles in the NME cluster states. The solid lines stand for entanglements.
Entropy 24 01077 g002
Table 1. Bob’s recovery operations (BRO) depending on one low-grade agent’s measurement outcome (LAMO) and his own POVM outcome O r 1 r 2 r 3 .
Table 1. Bob’s recovery operations (BRO) depending on one low-grade agent’s measurement outcome (LAMO) and his own POVM outcome O r 1 r 2 r 3 .
LAMO r 1 r 2 r 3 BRO r 1 r 2 r 3 BRO
| 000 000 Y B 1 X B 2 Z B 3 100 X B 1 X B 2 Z B 3
001 Y B 1 X B 2 I B 3 101 X B 1 X B 2 I B 3
010 Y B 1 Y B 2 Z B 3 110 X B 1 Y B 2 Z B 3
011 Y B 1 Y B 2 I B 3 111 X B 1 Y B 2 I B 3
| 001 000 Y B 1 X B 2 I B 3 100 X B 1 X B 2 I B 3
001 Y B 1 X B 2 Z B 3 101 X B 1 X B 2 Z B 3
010 Y B 1 Y B 2 I B 3 110 X B 1 Y B 2 I B 3
011 Y B 1 Y B 2 Z B 3 111 X B 1 Y B 2 Z B 3
| 010 000 Y B 1 Y B 2 Z B 3 100 X B 1 Y B 2 Z B 3
001 Y B 1 Y B 2 I B 3 101 X B 1 Y B 2 I B 3
010 Y B 1 X B 2 Z B 3 110 X B 1 X B 2 Z B 3
011 Y B 1 X B 2 I B 3 111 X B 1 X B 2 I B 3
| 011 000 Y B 1 Y B 2 I B 3 100 X B 1 Y B 2 I B 3
001 Y B 1 Y B 2 Z B 3 101 X B 1 Y B 2 Z B 3
010 Y B 1 X B 2 I B 3 110 X B 1 X B 2 I B 3
011 Y B 1 X B 2 Z B 3 111 X B 1 X B 2 Z B 3
| 100 000 X B 1 X B 2 Z B 3 100 Y B 1 X B 2 Z B 3
001 X B 1 X B 2 I B 3 101 Y B 1 X B 2 I B 3
010 X B 1 Y B 2 Z B 3 110 Y B 1 Y B 2 Z B 3
011 X B 1 Y B 2 I B 3 111 Y B 1 Y B 2 I B 3
| 101 000 X B 1 X B 2 I B 3 100 Y B 1 X B 2 I B 3
001 X B 1 X B 2 Z B 3 101 Y B 1 X B 2 Z B 3
010 X B 1 Y B 2 I B 3 110 Y B 1 Y B 2 I B 3
011 X B 1 Y B 2 Z B 3 111 Y B 1 Y B 2 Z B 3
| 110 000 X B 1 Y B 2 Z B 3 100 Y B 1 Y B 2 Z B 3
001 X B 1 Y B 2 I B 3 101 Y B 1 Y B 2 I B 3
010 X B 1 X B 2 Z B 3 110 Y B 1 X B 2 Z B 3
011 X B 1 X B 2 I B 3 111 Y B 1 X B 2 I B 3
| 111 000 X B 1 Y B 2 I B 3 100 Y B 1 Y B 2 I B 3
001 X B 1 Y B 2 Z B 3 101 Y B 1 Y B 2 Z B 3
010 X B 1 X B 2 I B 3 110 Y B 1 X B 2 I B 3
011 X B 1 X B 2 Z B 3 111 Y B 1 X B 2 Z B 3
Table 2. Charlie1’s operations depending on Charlie2’s measurement outcome (MO).
Table 2. Charlie1’s operations depending on Charlie2’s measurement outcome (MO).
Charlie2’s MOCharlie1’s Operation
| + + + H C 11 H C 12 H C 13
| + + H C 11 H C 12 ( X H ) C 13
| + + H C 11 ( X H ) C 12 H C 13
| + H C 11 ( X H ) C 12 ( X H ) C 13
| + + ( X H ) C 11 H C 12 H C 13
| + ( X H ) C 11 H C 12 ( X H ) C 13
| + ( X H ) C 11 ( X H ) C 12 H C 13
| ( X H ) C 11 ( X H ) C 12 ( X H ) C 13
Table 3. Charlie1’s recovery operation (CRO) depending on his own POVM measurement outcome O r 1 r 2 r 3 when Bob and Charlie2’s outcomes are | + B 1 B 2 B 3 and | + + C 21 C 22 C 23 .
Table 3. Charlie1’s recovery operation (CRO) depending on his own POVM measurement outcome O r 1 r 2 r 3 when Bob and Charlie2’s outcomes are | + B 1 B 2 B 3 and | + + C 21 C 22 C 23 .
r 1 r 2 r 3 CRO r 1 r 2 r 3 CRO
000 Y C 11 Y C 12 I C 13 100 X C 11 Y C 12 I C 13
001 Y C 11 Y C 12 Z C 13 101 X C 11 Y C 12 Z C 13
010 Y C 11 X C 12 I C 13 110 X C 11 X C 12 I C 13
011 Y C 11 X C 12 Z C 13 111 X C 11 X C 12 Z C 13
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Tang, J.; Ma, S.-Y.; Li, Q. Probabilistic Hierarchical Quantum Information Splitting of Arbitrary Multi-Qubit States. Entropy 2022, 24, 1077. https://doi.org/10.3390/e24081077

AMA Style

Tang J, Ma S-Y, Li Q. Probabilistic Hierarchical Quantum Information Splitting of Arbitrary Multi-Qubit States. Entropy. 2022; 24(8):1077. https://doi.org/10.3390/e24081077

Chicago/Turabian Style

Tang, Jie, Song-Ya Ma, and Qi Li. 2022. "Probabilistic Hierarchical Quantum Information Splitting of Arbitrary Multi-Qubit States" Entropy 24, no. 8: 1077. https://doi.org/10.3390/e24081077

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop