删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

A universal protocol for bidirectional controlled teleportation with network coding

本站小编 Free考研考试/2022-01-02

Meng-Yao He1, Song-Ya Ma,1,2,3, Kun-Peng Kang11School of Mathematics and Statistics, Henan University, Kaifeng 475004, China
2Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
3Henan Engineering Research Center for Artificial Intelligence Theory and Algorithms, Henan University, Kaifeng 475004, China

Received:2021-04-16Revised:2021-07-6Accepted:2021-07-6Online:2021-09-03


Abstract
We investigate bidirectional teleportation that works in a fair and efficient manner. Two explicit protocols are proposed to realize bidirectional teleportation with a controller. One is a symmetric protocol for two-qubit states. The other is an asymmetric protocol for single- and two-qubit states. We then devise a universal protocol for arbitrary n1- and n2-qubit states via a (2n1 + 2n2 + 1)-qubit entangled state, where n1n2. The receiver only needs to perform the single-qubit recovery operation, which is derived by a general expression. Moreover, a (2n1 + 1)-bit classical communication cost can be saved within the controller's broadcast channel by the use of network coding technology.
Keywords: bidirectional controlled teleportation;network coding;projective measurement;recovery operation


PDF (338KB)MetadataMetricsRelated articlesExportEndNote|Ris|BibtexFavorite
Cite this article
Meng-Yao He, Song-Ya Ma, Kun-Peng Kang. A universal protocol for bidirectional controlled teleportation with network coding. Communications in Theoretical Physics, 2021, 73(10): 105104- doi:10.1088/1572-9494/ac1168

1. Introduction

Quantum entanglement has been exploited as a fundamental resource for the implementation of quantum information-processing tasks. For example, Gong et al [1] proposed a quantum network dialogue protocol based on continuous-variable Greenberger-Home-Zeilinger (GHZ) states. Zhou et al [2] proposed a semi-quantum key distribution protocol with four-particle cluster states. Ma et al [3] investigated probabilistic quantum network coding over a butterfly network via non-maximal entanglement. In 1993, Bennett et al [4] first presented a remarkable protocol called quantum teleportation (QT) that securely transmits an unknown qubit state based on the dual use of classical and quantum channels. A different kind of QT scheme, controlled quantum teleportation (CQT) was introduced by Karlsson et al [5] to realize teleportation under the supervision of a controller. Although the controlling party does not own the teleported state, he decides whether the state can be recovered by the receiver. In addition, theoretical generalizations have been proposed, such as probabilistic QT, [6] hierarchical QT, [7] QT in noisy environments, [8, 9] etc. Meanwhile, experimental implementations of QT have also been reported [10, 11].

In addition to one-way QT, for a practical quantum network that contains many processors working far apart, an exchange of information states between two parties may be required. This is possible simply by switching on two sets of independent QT equipment in opposite directions. Since standard QT needs to send a classical message about the measurement result from the sender to the receiver, a situation may arise in which Alice's state has been teleported to Bob, but Bob decides not to tell Alice about his measurement result. This leads to an insecure or dishonest quantum communication. Therefore, it is necessary to investigate bidirectional quantum teleportation that works in a fair manner. Mishra et al [12] presented a controlled communication scheme which can simultaneously exchange two unknown single-qubit states via a six-qubit entangled channel. Nevertheless, Alice and Bob cannot recover the target states in a deterministic way. Zha et al [13] investigated the bidirectional controlled quantum teleportation (BCQT) of arbitrary single-qubit states using a five-qubit cluster state as the entangled resource with unit success probability. Because of its potential application in quantum network communication, BCQT has recently acquired a lot of attention. [1427] Jiang et al [14] developed a deterministic BCQT scheme for single-qubit states utilizing a five-qubit non-maximally entangled channel. [1719] accomplished the BCQT of two-qubit states via different entangled resources. Apart from the symmetric protocols, [1419] there are many asymmetric BCQT protocols [2025]. For example, [2024] describe the BCQT of arbitrary single- and two-qubit states. Thapliya et al [26] gave a general method for selecting a quantum channel for BCQT. To our knowledge, few universal protocols have been described for arbitrary qubit states. Savaghad-Moghaddam et al [27] attempted to investigate the BCQT of m- and n-qubit states. Regretfully, they did not explicitly give the relationship between the recovery operations, the collapsed states, and the measurement results. A question may be naturally raised: is it possible to devise a universal and efficient BCQT protocol for arbitrary qubit states and give a general formula for the recovery operations?

In this paper, under the assumption that classical communication is not allowed between senders and that the controller has a broadcast channel, we propose a universal protocol to realize the two-way teleportation of arbitrary n1- and n2-qubit states with the help of the controller via a (2n1 + 2n2 + 1)-qubit maximally entangled state. Without loss of generality, we assume n1n2. After the the sender's projective measurement using the Bell basis and the controller's single-qubit measurement using the Z basis, the receiver performs single-qubit Pauli operations and gets the target state deterministically. Through rigorous deduction, we give the general expression for the recovery operators. Network coding, a new paradigm that allows information to be duplicated and mixed in the intermediate nodes, has demonstrated a significant throughput advantage over traditional routing algorithms in classical networks [28]. It is found that if network coding is applied at the controller's site, a (2n1 + 1)-bit classical communication cost (CCC) will be saved in the broadcast channel. This means that our protocol is more efficient than without network coding.

The remaining parts of this paper are arranged as follows. In section 2, an explicit symmetric BCQT protocol is proposed to realize the two-way teleportation of two-qubit states. In section 3, an asymmetric BCQT protocol is described for single- and two-qubit states. In section 4, we further extend our discussion to a universal BCQT protocol for arbitrary n1- and n2-qubit states by using a (2n1 + 2n2 + 1)-qubit state as the entangled channel. Some discussions and comparisons are given in section 5. The last section offers the conclusions.

2. The symmetric BCQT protocol for two-qubit states

In this section, we construct a controlled protocol that leads to the simultaneous exchange of arbitrary two-qubit states. There are three participants: Alice, Bob, and Charlie. Alice and Bob are not only senders but also receivers, while Charlie is the controller.

Suppose Alice intends to teleport an arbitrary two-qubit state $| \varphi {\rangle }_{{{\rm{A}}}_{1}{{\rm{A}}}_{2}}$ to Bob. At the same time, Bob wishes to teleport an unknown two-qubit state $| \psi {\rangle }_{{{\rm{B}}}_{1}{{\rm{B}}}_{2}}$ to Alice's site.$\begin{eqnarray}\begin{array}{rcl}| \varphi {\rangle }_{{{\rm{A}}}_{1}{{\rm{A}}}_{2}} & = & \left({\alpha }_{0}| 00\rangle +{\alpha }_{1}| 01\rangle \right.\\ & & {\left.+{\alpha }_{2}| 10\rangle +{\alpha }_{3}| 11\rangle \right)}_{{{\rm{A}}}_{1}{{\rm{A}}}_{2}},\\ | \psi {\rangle }_{{{\rm{B}}}_{1}{{\rm{B}}}_{2}} & = & \left({\beta }_{0}| 00\rangle +{\beta }_{1}| 01\rangle \right.\\ & & {\left.+{\beta }_{2}| 10\rangle +{\beta }_{3}| 11\rangle \right)}_{{{\rm{B}}}_{1}{{\rm{B}}}_{2}}.\end{array}\end{eqnarray}$Alice has the teleported state $| \varphi {\rangle }_{{{\rm{A}}}_{1}{{\rm{A}}}_{2}}$ and Bob owns $| \psi {\rangle }_{{{\rm{B}}}_{1}{{\rm{B}}}_{2}}$. Nothing is known about the complex coefficients, except that they satisfy the normalization condition ${\sum }_{j=0}^{3}| {\alpha }_{j}{| }^{2}={\sum }_{j=0}^{3}| {\beta }_{j}{| }^{2}=1$.

The quantum channel shared amongst the three participants is the nine-qubit entangled state$\begin{eqnarray}\begin{array}{l}| C{\rangle }_{123456789}=\displaystyle \frac{1}{\sqrt{2}}(| {{\rm{\Phi }}}_{0}{\rangle }_{12}| {{\rm{\Phi }}}_{0}{\rangle }_{34}| {{\rm{\Phi }}}_{0}{\rangle }_{56}| {{\rm{\Phi }}}_{0}{\rangle }_{78}| 0{\rangle }_{9}\\ \quad +| {{\rm{\Phi }}}_{1}{\rangle }_{12}| {{\rm{\Phi }}}_{1}{\rangle }_{34}| {{\rm{\Phi }}}_{1}{\rangle }_{56}| {{\rm{\Phi }}}_{1}{\rangle }_{78}| 1{\rangle }_{9}),\end{array}\end{eqnarray}$where$\begin{eqnarray}\begin{array}{rcl}| {{\rm{\Phi }}}_{0}\rangle & = & \displaystyle \frac{1}{\sqrt{2}}(| 00\rangle +| 11\rangle ),\\ | {{\rm{\Phi }}}_{1}\rangle & = & \displaystyle \frac{1}{\sqrt{2}}(| 00\rangle -| 11\rangle ).\end{array}\end{eqnarray}$Qubits (1, 3, 5, 7) belong to Alice, qubits (2, 4, 6, 8) belong to Bob, and qubit 9 is held by Charlie.

Hence, the initial state of the whole system can be written as$\begin{eqnarray}| \varphi {\rangle }_{{{\rm{A}}}_{1}{{\rm{A}}}_{2}}\otimes | \psi {\rangle }_{{{\rm{B}}}_{1}{{\rm{B}}}_{2}}\otimes | C{\rangle }_{123456789}.\end{eqnarray}$

The complete process of the symmetric protocol is described as follows.

Step 1. Alice (Bob) performs joint projective measurements on her (his) qubits (A1, 1) and (A2, 3), ((B1, 6) and (B2, 8)) using the Bell basis$\begin{eqnarray}\begin{array}{rcl}| {\xi }_{00}\rangle & = & \displaystyle \frac{| 00\rangle +| 11\rangle }{\sqrt{2}},| {\xi }_{01}\rangle =\displaystyle \frac{| 01\rangle +| 10\rangle }{\sqrt{2}},\\ | {\xi }_{10}\rangle & = & \displaystyle \frac{| 00\rangle -| 11\rangle }{\sqrt{2}},| {\xi }_{11}\rangle =\displaystyle \frac{| 01\rangle -| 10\rangle }{\sqrt{2}}.\end{array}\end{eqnarray}$After the measurements, Alice announces her measurement results $| {\xi }_{{p}_{j}{q}_{j}}\rangle $ to Charlie in the form of classical messages pjqj. Similarly, Bob sends four-bit classical information sjtj to Charlie corresponding to his measurement outcomes $| {\xi }_{{s}_{j}{t}_{j}}\rangle $. Here, pj, qj, sj, tj = 0, 1, j = 1, 2.

Based on the measurement bases, the joint system in equation (4) can be expressed as$\begin{eqnarray}\begin{array}{l}\prod _{j=1}^{2}\left(\sum _{{p}_{j},{q}_{j},{s}_{j},{t}_{j}=0}^{1}| {\xi }_{{p}_{j}{q}_{j}}{\rangle }_{{{\rm{A}}}_{j,2j-1}}| {\xi }_{{s}_{j}{t}_{j}}{\rangle }_{{{\rm{B}}}_{j,2j+4}}\right)\\ \left(\sum _{l=0}^{1}| {f}_{{p}_{1}{q}_{1}{p}_{2}{q}_{2}}^{l}{\rangle }_{24}| {g}_{{s}_{1}{t}_{1}{s}_{2}{t}_{2}}^{l}{\rangle }_{57}| l{\rangle }_{9}\right),\end{array}\end{eqnarray}$where ${\sum }_{l=0}^{1}| {f}_{{p}_{1}{q}_{1}{p}_{2}{q}_{2}}^{l}{\rangle }_{24}| {g}_{{s}_{1}{t}_{2}{s}_{2}{t}_{2}}^{l}{\rangle }_{57}| l{\rangle }_{9}$ is the collapsed state of qubits (2, 4, 5, 7, 9) if the measurement result is $| {\xi }_{{p}_{1}{q}_{1}}{\rangle }_{{{\rm{A}}}_{1}1}| {\xi }_{{p}_{2}{q}_{2}}{\rangle }_{{{\rm{A}}}_{2}3}| {\xi }_{{s}_{1}{t}_{1}}{\rangle }_{{{\rm{B}}}_{1}6}| {\xi }_{{s}_{2}{t}_{2}}{\rangle }_{{{\rm{B}}}_{2}8}$. The expressions for $| {f}_{{p}_{1}{q}_{1}{p}_{2}{q}_{2}}^{l}{\rangle }_{24}$ are listed in table 1. The expressions for $| {g}_{{s}_{1}{t}_{1}{s}_{2}{t}_{2}}^{l}{\rangle }_{57}$ can easily be obtained if α is replaced by β in table 1.


Table 1.
Table 1.The expressions for $| {f}_{{p}_{1}{q}_{1}{p}_{2}{q}_{2}}^{l}\rangle $ and the recovery operations (RO).
p1q1, p2q2lp1q1, p2q2l$| {f}_{{p}_{1}{q}_{1}{p}_{2}{q}_{2}}^{l}\rangle $RO
00,00010,101α0∣00⟩ + α1∣01⟩ + α2∣10⟩ + α3∣11⟩II
00,01010,111α0∣01⟩ + α1∣00⟩ + α2∣11⟩ + α3∣10⟩IX
00,10010,001α0∣00⟩ − α1∣01⟩ + α2∣10⟩ − α3∣11⟩IZ
00,11010,011α0∣01⟩ − α1∣00⟩ + α2∣11⟩ − α3∣10⟩I ⨂ (ZX)
01,00011,101α0∣10⟩ + α1∣11⟩ + α2∣00⟩ + α3∣01⟩XI
01,01011,111α0∣11⟩ + α1∣10⟩ + α2∣01⟩ + α3∣00⟩XX
01,10011,001α0∣10⟩ − α1∣11⟩ + α2∣00⟩ − α3∣01⟩XZ
01,11011,011α0∣11⟩ − α1∣10⟩ + α2∣01⟩ − α3∣00⟩X ⨂ (ZX)
10,00000,101α0∣00⟩ + α1∣01⟩ − α2∣10⟩ − α3∣11⟩ZI
10,01000,111α0∣01⟩ + α1∣00⟩ − α2∣11⟩ − α3∣10⟩ZX
10,10000,001α0∣00⟩ − α1∣01⟩ − α2∣10⟩ + α3∣11⟩ZZ
10,11000,011α0∣01⟩ − α1∣00⟩ − α2∣11⟩ + α3∣10⟩Z ⨂ (ZX)
11,00001,101α0∣10⟩ + α1∣11⟩ − α2∣00⟩ − α3∣01⟩(ZX) ⨂ I
11,01001,111α0∣11⟩ + α1∣10⟩ − α2∣01⟩ − α3∣00⟩(ZX) ⨂ X
11,10001,001α0∣10⟩ − α1∣11⟩ − α2∣00⟩ + α3∣01⟩(ZX) ⨂ Z
11,11001,011α0∣11⟩ − α1∣10⟩ − α2∣01⟩ + α3∣00⟩(ZX) ⨂ (ZX)

New window|CSV

At this moment, Alice and Bob cannot obtain the original states without the controller's (Charlie's) help.

Step 2. If Charlie would like to provide assistance, he makes a single-qubit measurement of his qubit 9 using the Z basis {∣0⟩, ∣1⟩} and broadcasts a classical message to Alice and Bob.

It seems that Alice and Bob need to obtain the measurement results s1t1s2t2l and p1q1p2q2l to recover the teleported states, respectively. This means that Charlie has to broadcast nine-bit classical messages. Using the technology of network coding, Charlie just broadcasts the four-bit classical information (pjsjl, qjtj) to Alice and Bob (j = 1, 2). Here ⊕ means plus mod 2.

Step 3. According to the received classical messages and her (his) own measurement results pjqj (sjtj), Alice calculates [pj ⊕ (pjsjl), qj ⊕ (qjtj)] and gets [sjl, tj]. Bob computes [sj ⊕ (pjsjl), tj ⊕ (qjtj)] and obtains [pjl, qj]. Then Alice performs the recovery operation,$\begin{eqnarray}{R}_{{\rm{A}}}={Z}_{5}^{{s}_{1}\oplus l}{X}_{5}^{{t}_{1}}{Z}_{7}^{{s}_{2}\oplus l}{X}_{7}^{{t}_{2}},\end{eqnarray}$on her qubits (5, 7) and gets ∣ψ⟩. Similarly, Bob carries out the appropriate operation,$\begin{eqnarray}{R}_{{\rm{B}}}={Z}_{2}^{{p}_{1}\oplus l}{X}_{2}^{{q}_{1}}{Z}_{4}^{{p}_{2}\oplus l}{X}_{4}^{{q}_{2}},\end{eqnarray}$on his qubits (2, 4) and recovers the two-qubit state ∣φ⟩. Here X, Z are Pauli operations and X0, Z0 denote identity operations. In detail, Alice's and Bob's recovery operations conditioned on the measurement results are listed in table 1.

To illustrate the protocol more clearly, we assume that Alice's measurement results are ∣ξ01⟩∣ξ10⟩ (p1q1 = 01, p2q2 = 10) and Bob's measurement results are ∣ξ00⟩∣ξ11⟩ (s1t1 = 00, s2t2 = 11). If Charlie's measurement result is ∣1⟩, then the qubits (5, 7, 2, 4) collapse into:$\begin{eqnarray}\begin{array}{l}| {g}_{0110}^{1}{\rangle }_{57}| {f}_{0011}^{1}{\rangle }_{24}={\left({\beta }_{0}| 01\rangle +{\beta }_{1}| 00\rangle -{\beta }_{2}| 11\rangle -{\beta }_{3}| 10\rangle \right)}_{57}\\ \otimes {\left({\alpha }_{0}| 10\rangle +{\alpha }_{1}| 11\rangle -{\alpha }_{2}| 00\rangle -{\alpha }_{3}| 01\rangle \right)}_{24}.\end{array}\end{eqnarray}$Charlie broadcasts the four-bit classical information (p1s1l, p2s2l, q1t1, q2t2) = 1111. Together with their own measurement results, Alice and Bob can obtain (s1l, s2l, t1, t2) = 1001 and (p1l, p2l, q1, q2) = 1010, respectively. Alice performs a Z5X7 operation on her collapsed qubits ${\left({\beta }_{0}| 01\rangle +{\beta }_{1}| 00\rangle -{\beta }_{2}| 11\rangle -{\beta }_{3}| 10\rangle \right)}_{57}$ and Bob carries out (ZX)2I4 on his collapsed qubits ${\left({\alpha }_{0}| 10\rangle +{\alpha }_{1}| 11\rangle -{\alpha }_{2}| 00\rangle -{\alpha }_{3}| 01\rangle \right)}_{24}$. As a result, the desired states ∣φ⟩, ∣ψ⟩ are simultaneously teleported.

3. The asymmetric BCQT protocol for single- and two-qubit states

In this section, we demonstrate an asymmetric BCQT protocol. Alice wants to teleport an arbitrary single-qubit state ∣φA to Bob, while Bob hopes to transmit an arbitrary two-qubit state $| \psi {\rangle }_{{{\rm{B}}}_{1}{{\rm{B}}}_{2}}$ to Alice.$\begin{eqnarray}\begin{array}{rcl}| \varphi {\rangle }_{{\rm{A}}} & = & {\left({\alpha }_{0}| 0\rangle +{\alpha }_{1}| 1\rangle \right)}_{{\rm{A}}},\\ | \psi {\rangle }_{{{\rm{B}}}_{1}{{\rm{B}}}_{2}} & = & {\left({\beta }_{0}| 00\rangle +{\beta }_{1}| 01\rangle +{\beta }_{2}| 10\rangle +{\beta }_{3}| 11\rangle \right)}_{{{\rm{B}}}_{1}{{\rm{B}}}_{2}}.\end{array}\end{eqnarray}$The coefficients of the teleported states are all complex numbers, and satisfy the normalization condition ${\sum }_{j=0}^{1}| {\alpha }_{j}{| }^{2}=1$, ${\sum }_{j=0}^{3}| {\beta }_{j}{| }^{2}=1$.

A seven-qubit entangled state,$\begin{eqnarray}\begin{array}{rcl}| C{ \rangle }_{1234567} & = & \frac{1}{\sqrt{2}}(| {{\rm{\Phi }}}_{0}{ \rangle }_{12}| {{\rm{\Phi }}}_{0}{ \rangle }_{34}| {{\rm{\Phi }}}_{0}{ \rangle }_{56}| 0{ \rangle }_{7}\\ & & +| {{\rm{\Phi }}}_{1}{ \rangle }_{12}| {{\rm{\Phi }}}_{1}{ \rangle }_{34}| {{\rm{\Phi }}}_{1}{ \rangle }_{56}| 1{ \rangle }_{7}),\end{array}\end{eqnarray}$serves as the quantum channel. Alice has qubits (1, 3, 5) and Bob processes qubits (2, 4, 6), while qubit 7 is possessed by Charlie.

The compound state is$\begin{eqnarray}| \varphi {\rangle }_{{\rm{A}}}\otimes | \psi {\rangle }_{{{\rm{B}}}_{1}{{\rm{B}}}_{2}}\otimes | C{\rangle }_{1234567}.\end{eqnarray}$

The detailed process of the asymmetric protocol is shown below.

Step 1. Alice (Bob) carries out a Bell basis measurement on her (his) qubits (A, 1) ((B1, 4) and (B2, 6)). If Alice's (Bob's) measurement result is $| {\xi }_{{p}_{1}{q}_{1}}\rangle $ $(| {\xi }_{{s}_{j}{t}_{j}}\rangle ,j=1,2)$, she (he) sends the classical bits p1q1 (sjtj) to Charlie through the classical channel.

The whole system in equation (12) can be rewritten as$\begin{eqnarray}\begin{array}{l}\displaystyle \sum _{{p}_{1},{q}_{1}=0}^{1}| {\xi }_{{p}_{1}{q}_{1}}{ \rangle }_{{\rm{A}}1}\displaystyle \prod _{j=1}^{2}\left(\displaystyle \sum _{{s}_{j},{t}_{j}=0}^{1}| {\xi }_{{s}_{j}{t}_{j}}{ \rangle }_{{{\rm{B}}}_{j,2j+2}}\right)\\ \otimes \left(\displaystyle \sum _{l=0}^{1}| {f}_{{p}_{1}{q}_{1}}^{l}{ \rangle }_{2}| {g}_{{s}_{1}{t}_{1}{s}_{2}{t}_{2}}^{l}{ \rangle }_{35}| l{ \rangle }_{7}\right).\end{array}\end{eqnarray}$After the measurements, qubits (2, 3, 5, 7) collapse into ${\sum }_{l=0}^{1}| {f}_{{p}_{1}{q}_{1}}^{l}{\rangle }_{2}| {g}_{{s}_{1}{t}_{1}{s}_{2}{t}_{2}}^{l}{\rangle }_{35}| l{\rangle }_{7}$. The detailed expression for $| {f}_{{p}_{1}{q}_{1}}^{l}{\rangle }_{2}$ is given in table 2, while $| {g}_{{s}_{1}{t}_{1}{s}_{2}{t}_{2}}^{l}\rangle $ is same as that in section 2.


Table 2.
Table 2.Expressions for $| {f}_{{p}_{1}{q}_{1}}^{l}\rangle $ and the RO.
p1q1lp1q1l$| {f}_{{p}_{1}{q}_{1}}^{l}\rangle $RO
000101α0∣0⟩ + α1∣1⟩I
010111α0∣1⟩ + α1∣0⟩X
100001α0∣0⟩ − α1∣1⟩Z
110011α0∣1⟩ − α1∣0⟩ZX

New window|CSV

Step 2. Charlie measures his qubit 7 in the Z basis. In order to recover the teleported state, Alice and Bob need to obtain the measurement results s1t1s2t2l and p1q1l, respectively. With the aid of network coding, Charlie broadcasts the four-bit classical information (s1p1l, t1q1, s2l, t2).

Step 3. According to the received classical messages and her (his) own measurement result p1q1 (s1t1, s2t2), Alice gets [s1l, t1, s2l, t2] by calculating [p1 ⊕ (s1p1l), q1 ⊕ (t1q1)]. Similarly, Bob computes [s1 ⊕ (s1p1l), t1 ⊕ (t1q1)] and acquires [p1l, q1]. Alice applies the recovery operation,$\begin{eqnarray}{R}_{{\rm{A}}}={Z}_{3}^{{s}_{1}\oplus l}{X}_{3}^{{t}_{1}}{Z}_{5}^{{s}_{2}\oplus l}{X}_{5}^{{t}_{2}.},\end{eqnarray}$on her qubits (3, 5) and gets ∣ψ⟩ in equation (10). Bob can recover the teleported state ∣φ⟩ by performing the unitary operation,$\begin{eqnarray}{R}_{{\rm{B}}}={Z}_{2}^{{p}_{1}\oplus l}{X}_{2}^{{q}_{1}},\end{eqnarray}$on his collapsed particle 2.

An example is given below to clarify the protocol. Suppose that Alice's measurement outcome is ∣ξ01⟩ (p1q1 = 01) and Bob's measurement outcomes are ∣ξ01⟩∣ξ10⟩ (s1t1 = 01, s2t2 = 10). If Charlie's measurement result is ∣0⟩, he broadcasts the four-bit classical information (s1p1l, t1q1, s2l, t2) = 0010. Alice and Bob can then get (s1l, t1, s2l, t2) = 0110 and (p1l, q1) = 01, respectively. Alice and Bob separately perform the recovery operations X3Z5 and X2 on the collapsed state:$\begin{eqnarray}\begin{array}{l}| {g}_{0110}^{1}{\rangle }_{35}| {f}_{01}^{1}{\rangle }_{2}=\left({\beta }_{0}| 10\rangle -{\beta }_{1}| 11\rangle \right.\\ {\left.+{\beta }_{2}| 00\rangle -{\beta }_{3}| 01\rangle \right)}_{35}\otimes {\left({\alpha }_{0}| 1\rangle +{\alpha }_{1}| 0\rangle \right)}_{2}.\end{array}\end{eqnarray}$In the end, the desired states are two-way teleported with unit success probability.

4. The universal BCQT protocol

In this section, we generalize the two explicit protocols given above to a universal BCQT protocol that can realize the simultaneous teleportation of arbitrary n1- and n2-qubit states.

Alice (Bob) has an unknown n1(n2)-qubit state in this form:$\begin{eqnarray}\begin{array}{rcl}| \varphi {\rangle }_{{{\rm{A}}}_{1}\cdots {{\rm{A}}}_{{n}_{1}}} & = & \displaystyle \sum _{{a}_{1},\cdots ,{a}_{{n}_{1}}=0}^{1}{\alpha }_{a}| {a}_{1}\cdots {a}_{{n}_{1}}{\rangle }_{{{\rm{A}}}_{1}\cdots {{\rm{A}}}_{{n}_{1}}},\\ (| \psi {\rangle }_{{{\rm{B}}}_{1}\cdots {{\rm{B}}}_{{n}_{2}}} & = & \displaystyle \sum _{{b}_{1},\cdots ,{b}_{{n}_{2}}=0}^{1}{\beta }_{b}| {b}_{1}\cdots {b}_{{n}_{2}}{\rangle }_{{{\rm{B}}}_{1}\cdots {{\rm{B}}}_{{n}_{2}}}),\end{array}\end{eqnarray}$and wants to transmit it to Bob (Alice). The subscripts a and b individually represent the decimal forms of binary strings ${a}_{1}\cdots {a}_{{n}_{1}}$ and ${b}_{1}\cdots {b}_{{n}_{2}}$; αa and βb are complex numbers that satisfy ${\sum }_{a=0}^{{2}^{{n}_{1}}-1}| {\alpha }_{a}{| }^{2}=1$, ${\sum }_{b=0}^{{2}^{{n}_{2}}-1}| {\beta }_{b}{| }^{2}=1$.

We take a (2n1 + 2n2 + 1)-qubit entangled state,$\begin{eqnarray}\begin{array}{l}| C{ \rangle }_{1\cdots 2{n}_{1}+2{n}_{2}+1}=\frac{1}{\sqrt{2}}\displaystyle \sum _{l=0}^{1}| {{\rm{\Phi }}}_{l}{ \rangle }_{12}\\ \cdots | {{\rm{\Phi }}}_{l}{ \rangle }_{2{n}_{1}+2{n}_{2}-1,2{n}_{1}+2{n}_{2}}| l{ \rangle }_{2{n}_{1}+2{n}_{2}+1,}\end{array}\end{eqnarray}$as the quantum channel. The construction process of the channel is similar to that given in [29]. The qubits (1, ⋯ ,2n1 − 1, 2n1 + 1, ⋯ ,2n1 + 2n2 − 1) belong to Alice, the qubits (2, ⋯ ,2n1, 2n1 + 2, ⋯ ,2n1 + 2n2) belong to Bob, and the controller Charlie possesses the qubit 2n1 + 2n2 + 1.

The initial state of the whole system is given by$\begin{eqnarray}| \varphi {\rangle }_{{{\rm{A}}}_{1}\cdots {{\rm{A}}}_{{n}_{1}}}\otimes | \psi {\rangle }_{{{\rm{B}}}_{1}\cdots {{\rm{B}}}_{{n}_{2}}}\otimes | C{\rangle }_{1\cdots 2{n}_{1}+2{n}_{2}+1}.\end{eqnarray}$

In order to complete the task, the three participants are required to perform appropriate measurements and corresponding recovery operations. The process of our universal BCQT protocol is shown in figure 1.

Figure 1.

New window|Download| PPT slide
Figure 1.Process of our universal BCQT protocol. Black solid points represent Alice's particles, white points represent Bob's particles, and the gray point represents Charlie's particle. The dotted ellipses indicate Bell-state measurements, and the solid circle is a single-qubit measurement. The solid rectangle indicates the recovery operation.


Thesender'soperation. Alice (Bob) carries out projective measurements on her (his) qubits (A1, 1),⋯, $({{\rm{A}}}_{{n}_{1}},2{n}_{1}-1)$ ((B1, 2n1 + 2), ⋯, $({{\rm{B}}}_{{n}_{2}},2{n}_{1}+2{n}_{2}))$ using the Bell basis and gets the measurement results $| {\xi }_{{p}_{i}{q}_{i}}\rangle ,i=1,\cdots {n}_{1}$ $(| {\xi }_{{s}_{j}{t}_{j}}\rangle ,j=1,\cdots {n}_{2})$.

Then, Alice (Bob) sends the classical bits piqi (sjtj) to Charlie, representing the Bell-state measurement outcomes.

The compound system in equation (19) can be rewritten as$\begin{eqnarray}\begin{array}{l}\displaystyle \prod _{i=1}^{{n}_{1}}(\displaystyle \sum _{{p}_{i},{q}_{i}=0}^{1}| {\xi }_{{p}_{i}{q}_{i}}\rangle )\prod _{j=1}^{{n}_{2}}(\displaystyle \sum _{{s}_{j},{t}_{j}=0}^{1}| {\xi }_{{s}_{j}{t}_{j}}\rangle )\\ \displaystyle \sum _{l=0}^{1}| {f}_{{p}_{1}{q}_{1}\cdots {p}_{{n}_{1}}{q}_{{n}_{1}}}^{l}\rangle | {g}_{{s}_{1}{t}_{1}\cdots {s}_{{n}_{2}}{t}_{{n}_{2}}}^{l}\rangle | l\rangle .\end{array}\end{eqnarray}$${\sum }_{l=0}^{1}| {f}_{{p}_{1}{q}_{1}\cdots {p}_{{n}_{1}}{q}_{{n}_{1}}}^{l}\rangle | {g}_{{s}_{1}{t}_{1}\cdots {s}_{{n}_{2}}{t}_{{n}_{2}}}^{l}\rangle | l\rangle $ is the collapsed state if Alice's and Bob's measurement results are $| {\xi }_{{p}_{1}{q}_{1}}\rangle $, ⋯, $| {\xi }_{{p}_{{n}_{1}}{q}_{{n}_{1}}}\rangle $ and $| {\xi }_{{s}_{1}{t}_{1}}\rangle $, ⋯, $| {\xi }_{{s}_{{n}_{2}}{t}_{{n}_{2}}}\rangle $, respectively.

Since$\begin{eqnarray}| {kh}\rangle =\displaystyle \frac{1}{\sqrt{2}}\sum _{n=0}^{1}{\left(-1\right)}^{{kn}}| {\xi }_{n,k\oplus h}\rangle ,\end{eqnarray}$one can get$\begin{eqnarray}\begin{array}{l}| {f}_{{p}_{1}{q}_{1}\cdots {p}_{{n}_{1}}{q}_{{n}_{1}}}^{l}\rangle ={\left(-1\right)}^{({q}_{1}\oplus \cdots \oplus {q}_{{n}_{1}})l}\\ \displaystyle \sum _{{a}_{1},\cdots ,{a}_{{n}_{1}}=0}^{1}{\alpha }_{a}\prod _{j=1}^{{n}_{1}}{\left(-1\right)}^{{a}_{j}({p}_{j}\oplus l)}| {a}_{j}\oplus {q}_{j}\rangle ,\end{array}\end{eqnarray}$and$\begin{eqnarray}\begin{array}{l}| {g}_{{s}_{1}{t}_{1}\cdots {s}_{{n}_{2}}{t}_{{n}_{2}}}^{l}\rangle ={\left(-1\right)}^{({t}_{1}\oplus \cdots \oplus {t}_{{n}_{2}})l}\\ \displaystyle \sum _{{b}_{1},\cdots ,{b}_{{n}_{2}}=0}^{1}{\beta }_{b}\prod _{j=1}^{{n}_{2}}{\left(-1\right)}^{{b}_{j}({s}_{j}\oplus l)}| {b}_{j}\oplus {t}_{j}\rangle .\end{array}\end{eqnarray}$

At this time, Alice and Bob are still unable to complete the task without Charlie's assistance, since their qubits are entangled with Charlie's qubit 2n1 + 2n2 + 1.

Thecontroller's operation. If Charlie consents to help them, he executes a single-qubit projective measurement using the Z basis.

If Charlie's measurement result is ∣l⟩ (l = 0, 1), Alice's qubits (2n1 + 1, 2n1 + 3, ⋯ ,2n1 + 2n2 − 1) and Bob's qubits (2, 4, ⋯ ,2n1) collapse into a product state $| {f}_{{p}_{1}{q}_{1}\cdots {p}_{{n}_{1}}{q}_{{n}_{1}}}^{l}\rangle | {g}_{{s}_{1}{t}_{1}\cdots {s}_{{n}_{2}}{t}_{{n}_{2}}}^{l}\rangle $. In order to recover the teleported states, Alice and Bob need to know the measurement results ${s}_{1}{t}_{1}\cdots {s}_{{n}_{2}}{t}_{{n}_{2}}l$ and ${p}_{1}{q}_{1}\cdots {p}_{{n}_{1}}{q}_{{n}_{1}}l$, respectively. It seems that Charlie needs to broadcast (2n1 + 2n2 + 1)-bit classical information, including ${p}_{1}{q}_{1}\cdots {p}_{{n}_{1}}{q}_{{n}_{1}}$, ${s}_{1}{t}_{1}\cdots {s}_{{n}_{2}}{t}_{{n}_{2}}$ he received and l corresponding to his own measurement result. Instead, with the aid of network coding, Charlie just broadcasts 2n2 bits, as follows:$\begin{eqnarray}{s}_{1}\oplus {p}_{1}\oplus l,\cdots ,{s}_{{n}_{1}}\oplus {p}_{{n}_{1}}\oplus l,{s}_{{n}_{1}+1}\oplus l,\cdots ,{s}_{{n}_{2}}\oplus l,\end{eqnarray}$$\begin{eqnarray}{t}_{1}\oplus {q}_{1},\cdots ,{t}_{{n}_{1}}\oplus {q}_{{n}_{1}},{t}_{{n}_{1}+1},\cdots ,{t}_{{n}_{2}}.\end{eqnarray}$This means that a (2n1 + 1)-bit CCC is saved.

Thereceiver's operation. According to the classical messages received from Charlie and her (his) own measurement results, Alice calculates$\begin{eqnarray}{p}_{i}\oplus ({s}_{i}\oplus {p}_{i}\oplus l),{q}_{i}\oplus ({q}_{i}\oplus {t}_{i}),\quad i=1\cdots {n}_{1}.\end{eqnarray}$Together with ${s}_{{n}_{1}+1}\oplus l,\cdots ,{s}_{{n}_{2}}\oplus l,{t}_{{n}_{1}+1},\cdots ,{t}_{{n}_{2}}$, Alice gets [sjl, tj], j = 1,..., n2. Bob computes$\begin{eqnarray}{s}_{i}\oplus ({p}_{i}\oplus {s}_{i}\oplus l),{t}_{i}\oplus ({q}_{i}\oplus {t}_{i}),\end{eqnarray}$and gains [pil, qi], i = 1 ⋯ n1. Using equations (22) and (23), Alice and Bob perform the recovery operations RA and RB on their qubits, which can be summarized as$\begin{eqnarray}{R}_{{\rm{A}}}={Z}_{2{n}_{1}+1}^{{s}_{1}\oplus l}{X}_{2{n}_{1}+1}^{{t}_{1}}\cdots {Z}_{2{n}_{1}+2{n}_{2}-1}^{{s}_{{n}_{2}}\oplus l}{X}_{2{n}_{1}+2{n}_{2}-1}^{{t}_{{n}_{2}}},\end{eqnarray}$$\begin{eqnarray}{R}_{{\rm{B}}}={Z}_{2}^{{p}_{1}\oplus l}{X}_{2}^{{q}_{1}}\cdots {Z}_{2{n}_{1}}^{{p}_{{n}_{1}}\oplus l}{X}_{2{n}_{1}}^{{q}_{{n}_{1}}}.\end{eqnarray}$Accordingly, the BCQT is achieved with a success probability of 100%.

5. Discussion and comparisons

In this section, we first discuss the intrinsic efficiency [18] and the necessary operations of our universal protocol. Then, some comparisons with other protocols are given.

The intrinsic efficiency is an important factor for evaluating the performance of a protocol, which is defined by$\begin{eqnarray}\eta =\displaystyle \frac{{q}_{s}}{{q}_{u}+{b}_{t}},\end{eqnarray}$where qs represents the number of qubits to be transmitted, qu is the number of particles used in the quantum channel, and bt represents the classical bits that need to be transmitted.

As mentioned above, we propose a universal BCQT protocol for arbitrary n1- and n2- qubit states, which can be realized deterministically. The (2n1 + 2n2 + 1)-qubit entangled state is chosen as the quantum channel. Alice and Bob respectively transmit 2n1 and 2n2 bits to the controller Charlie. Charlie encodes his classical information corresponding to his measurement result with the classical messages he received, and then broadcasts the encoded result to Alice and Bob. The CCC in the controller's broadcast channel is 2n2 bits. The total CCC is 2n1 + 4n2 bits. Therefore, the intrinsic efficiency of our universal protocol is$\begin{eqnarray}\begin{array}{rcl}\eta & = & \displaystyle \frac{{n}_{1}+{n}_{2}}{(2{n}_{1}+2{n}_{2}+1)+(2{n}_{1}+4{n}_{2})}\\ & = & \displaystyle \frac{{n}_{1}+{n}_{2}}{4{n}_{1}+6{n}_{2}+1}.\end{array}\end{eqnarray}$In our symmetric BCQT protocol for arbitrary two-qubit states (n1 = n2 = 2), the intrinsic efficiency is $\eta =\tfrac{4}{21}\approx 19.05 \% $. In our asymmetric BCQT protocol for arbitrary single- and two-qubit states (n1 = 1, n2 = 2), the intrinsic efficiency is $\eta =\tfrac{3}{17}\approx 17.65 \% $.

If network coding is not applied, the total CCC is 4n1 + 4n2 + 1 bits. The intrinsic efficiency of the universal protocol will be$\begin{eqnarray}\begin{array}{rcl}\eta & = & \displaystyle \frac{{n}_{1}+{n}_{2}}{(2{n}_{1}+2{n}_{2}+1)+(4{n}_{1}+4{n}_{2}+1)}\\ & = & \displaystyle \frac{{n}_{1}+{n}_{2}}{6{n}_{1}+6{n}_{2}+2},\end{array}\end{eqnarray}$which is smaller than the intrinsic efficiency in equation (31). In this case, the intrinsic efficiency of the symmetric BCQT protocol is $\eta =\tfrac{4}{26}\approx 15.39 \% $. When n1 = 1 and n2 = 2, the intrinsic efficiency is $\eta =\tfrac{3}{20}\approx 15 \% $. This reveals that the use of network coding technology can reduce the CCC and improve the intrinsic efficiency.

In the following, we give some comparisons with other BCQT protocols. To make the comparison convictive, we only choose some specific values of n1, n2. The results of comparisons with previous symmetric and asymmetric protocols are given in tables 3 and 4, respectively. A detailed explanation of the abbreviations is as follows: QC (quantum channel), ES (entangled state), BO (basic operation), UO (unitary operation), RUO (recovery unitary operation), BSM (Bell-state measurement), SQM (single-qubit measurement), TQM (two-qubit measurement), FQM (four-qubit measurement), CNOT (controlled-NOT), NQT (number of the teleported qubits).


Table 3.
Table 3.Comparison of the symmetric protocol for two-qubit states (n1 = n2 = 2).
ProtocolQCBOCCCNQTη
[17]10-ESBSM, SQM, RUO104$\tfrac{1}{5}=20 \% $
[18]9-ESBSM, SQM, RUO94$\tfrac{2}{9}\approx 22.22 \% $
[19]9-ESBSM, SQM, RUO94$\tfrac{2}{9}\approx 22.22 \% $
Ours9-ESBSM, SQM, RUO124$\tfrac{4}{21}\approx 19.05 \% $

New window|CSV


Table 4.
Table 4.Comparison of the asymmetric BCQT protocol for single- and two-qubit states (n1 = 1, n2 = 2).
ProtocolQCBOCCCNQTη
[20]8-ESUO, BSM, FQM, TQM, RUO83$\tfrac{3}{16}=18.75 \% $
[21]7-ESBSM, SQM, CNOT, RUO73$\tfrac{3}{14}\approx 21.43 \% $
[22]7-ESBSM, SQM, RUO73$\tfrac{3}{14}\approx 21.43 \% $
[23]7-ESBSM, SQM, RUO73$\tfrac{3}{14}\approx 21.43 \% $
[24]7-ESBSM, SQM, RUO73$\tfrac{3}{14}\approx 21.43 \% $
Ours7-ESBSM, SQM, RUO103$\tfrac{3}{17}\approx 17.65 \% $

New window|CSV

From tables 3 and 4, one can see that the intrinsic efficiencies of [1724] are all greater than ours. The reason for this is that the classical channel model they use is different from ours. Classical channel models are clearly shown in figure 2, where (a) represents the model of [1724], and (b) represents our model. As well as the unfavorable aspects, our scheme also has favorable aspects. The classical channel models in [1724] assume that each sender broadcasts her measurement result. In other words, everyone has a broadcast channel. This may reduce the CCC and improve the intrinsic efficiency; however, the establishment of a broadcast channel is much more difficult than that of a one-way classical channel. For an actual communication network with multiple users and a control center, it is not realistic to set up a broadcast channel for each user. In our model, each sender only has one classical channel with the controller, which greatly reduces the requirement for classical channels. Moreover, our model may be more applicable and safer in the case that direct classical communication is not allowed between different users, and the role of the controller is to be a transmission relay or trusted third party.

Figure 2.

New window|Download| PPT slide
Figure 2.Classical channel models. (a) The usual model; (b) our model. A solid line with one arrow denotes a one-way broadcast channel, while a dotted line with one arrow denotes a one-way classical channel.


6. Conclusions

Assuming that the two senders cannot transmit classical messages to each other and that the controller has a broadcast channel, we have devised a universal protocol for the two-way teleportation of arbitrary n1- and n2-qubit states. The proposed scheme has the following advantages. (i) Through strict derivation, the recovery operator is given by a general formula which clearly reveals the relationship with the measurement results. (ii) Network coding is performed at the site of the controller. It is easy to see if the network coding is not applied; a (2n1 + 2n2 + 1)-bit CCC is required for Charlie's broadcast channel. Therefore, a (2n1 + 1)-bit CCC is saved. It may be helpful to realize secure quantum distributed transmission tasks with a reduced CCC. We also believe that network coding may be useful for saving resources in various quantum network information-processing tasks.

The construction of the quantum channel only needs H and CNOT gate operations on the auxiliary particles with an initial state of $| 00\cdots 0{\rangle }_{1\cdots 2{n}_{1}+2{n}_{2}+1}$. The process of the universal protocol requires Bell-basis measurement, Z-basis measurement, and single-qubit local Pauli operations. These are feasible with the current experimental technology. It should be noted that quantum entanglement is indispensable in most existing BCQT schemes. However, from a practical point of view, entanglements are often very vulnerable and may suffer from destructive influences, or even disappear completely. Therefore, the effects of noise should be taken into account. Similarly to [8, 9], we can envisage the proposed scheme in a noisy environment. Fortunately, some mature anti-noise techniques, such as entanglement purification and entanglement concentration, can be employed to improve the fidelity of the transmitted quantum signals and reduce the effects of noise.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61 201 253, 61 572 246), the Open Foundation of State Key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) (Grant No. SKLNST-2020-2-02), and the Open Foundation of Guangxi Key Laboratory of Trusted Software (Grant No. KX202040).


Reference By original order
By published year
By cited within times
By Impact factor

Gong L H Tian C Li J F Zou X F 2018 Quantum Inf. Process. 17 331
DOI:10.1007/s11128-018-2103-7 [Cited within: 1]

Zhou N R Zhu K N Zou X F 2019 Ann. Phys. 531 1970031
DOI:10.1002/andp.201970031 [Cited within: 1]

Ma S Y Chen X B Luo M X Niu X X Yang Y X 2010 Opt. Commun. 283 497
DOI:10.1016/j.optcom.2009.09.065 [Cited within: 1]

Bennett C H Brassard G Crepeau C Jozsa R Peres A Wootters W K 1993 Phys. Rev. Lett. 70 1895
DOI:10.1103/PhysRevLett.70.1895 [Cited within: 1]

Karlsson A Bourennane M 1998 Phys. Rev. A 58 4394
DOI:10.1103/PhysRevA.58.4394 [Cited within: 1]

Shi L Wei J H Li Y X Ma L H Xue Y Luo J W 2017 Commun. Theor. Phys. 67 377
DOI:10.1088/0253-6102/67/4/377 [Cited within: 1]

Peng J Y Bai M Q Mo Z W 2014 Chin. Phys. B 23 010304
[Cited within: 1]

Hou K Bao D Q Zhu C J Yang Y P 2019 Quantum Inf. Process. 18 104
DOI:10.1007/s11128-019-2218-5 [Cited within: 2]

Jiang S X Zhao B Liang X Z 2021 Chin. Phys. B 30 060303
DOI:10.1088/1674-1056/abea95 [Cited within: 2]

Zhang Q Goebel A Wagenknecht C Chen Y A Zhao B Yang T Mair A Schmiedmayer J Pan J W 2006 Nat. Phys. 2 678
DOI:10.1038/nphys417 [Cited within: 1]

Rajiuddin S Baishya A Behera B K Panigrahi P K 2020 Quantum Inf. Process. 19 87
DOI:10.1007/s11128-020-2586-x [Cited within: 1]

Mishra M K Maurya A K Prakash H 2011 J. Phys. B: At. Mol. Opt. Phys. 44 115504
DOI:10.1088/0953-4075/44/11/115504 [Cited within: 1]

Zha X W Zou Z C Qi J X Song H Y 2013 Int. J. Theor. Phys. 52 1740
DOI:10.1007/s10773-012-1208-5 [Cited within: 1]

Jiang S X Zhou R G Luo G F Liang X Fan P 2020 Int. J. Theor. Phys. 59 2966
DOI:10.1007/s10773-020-04557-3 [Cited within: 3]

Duan Y J Zha X W 2014 Int. J. Theor. Phys. 53 3780
DOI:10.1007/s10773-014-2131-8

Yuan H Pan G Z 2020 Mod. Phys. Lett. A 35 2050192
DOI:10.1142/S0217732320501928

Choudhury B S Dhara A 2016 Int. J. Theor. Phys. 55 2275
DOI:10.1007/s10773-015-2865-y [Cited within: 5]

Li Y H Jin X M 2016 Quantum Inf. Process. 15 929
DOI:10.1007/s11128-015-1194-7 [Cited within: 2]

Wang S M Zhang W Cong L 2018 Acta Photonica Sin. 47 927002
DOI:10.3788/gzxb20184709.0927002 [Cited within: 3]

Zhang D Zha X W Li W Yu Y 2015 Quantum Inf. Process. 14 3835
DOI:10.1007/s11128-015-1067-0 [Cited within: 3]

Sang M H 2016 Int. J. Theor. Phys. 55 380
DOI:10.1007/s10773-015-2670-7 [Cited within: 1]

Hong W Q 2016 Int. J. Theor. Phys. 55 384
DOI:10.1007/s10773-015-2671-6 [Cited within: 1]

Yang Y Q Zha X W Yan Y 2016 Int. J. Theor. Phys. 55 4197
[Cited within: 1]

Nie Y Y Sang M H 2017 Int. J. Theor. Phys. 56 3452
DOI:10.1007/s10773-017-3510-8 [Cited within: 5]

Huo G W Zhang T Y Zha X W Zhang X X Zhang M Z 2021 Quantum Inf. Process. 20 24
DOI:10.1007/s11128-020-02956-3 [Cited within: 1]

Thapliyal K Verma A Pathak A 2015 Quantum Inf. Process. 14 4601
DOI:10.1007/s11128-015-1124-8 [Cited within: 1]

Sarvaghad-Moghaddam M Atahi N 2018 arXiv: 1804.09074v1
[Cited within: 2]

Ahlswede R Cai N Li S Y R Yeung R W 2000 IEEE Trans. Inf. Theor 46 1204
DOI:10.1109/18.850663 [Cited within: 1]

Sun Y R Xiang N Dou Z Xu G Chen X B Yang Y X 2019 Quantum Inf. Process. 18 281
DOI:10.1007/s11128-019-2390-7 [Cited within: 1]

相关话题/universal protocol bidirectional