A number of schemes that use quantum mechanics to preserve privacy
are presented. In particular, anonymous broadcast channels, voting,
and secure function evaluation are discussed. It is found that entangled quantum states can be useful in maintaining privacy.
We consider a quantum system of two nonorthogonal bipartite quantum
states. We distribute the qubits between two parties, Alice and Bob. They each measure their qubits and then compare their measurement results to determine which state they were sent. This procedure is error-free, which implies that it must sometimes fail. In addition, no quantum memory is required; it is not necessary for one of the qubits to be stored until the result of the measurement on the other is known. We consider the cases in which, should a failure occur, both parties receive a failure signal or only one does. In the latter case, if the two states share the same Schmidt basis, the states can be discriminated with the same failure probability as would be obtained if the qubits were measured together. This scheme is sufficiently simple that it can be generalized to multipartite qubit and qudit states. Applications to quantum secret sharing are discussed.
We design a universal quantum homogenizer, which is a quantum machine that takes as an input a system qubit initially in the state ? and a set of N reservoir qubits initially prepared in the same state ?. In the homogenizer the system qubit sequentially interacts with the reservoir qubits via the partial swap transformation. The homogenizer realizes, in the limit sense, the transformation such that at the output each qubit is in an arbitratily small neighbourhood of the state ? irrespective of the initial states of the system and the reservoir qubits. This means that the system qubit undergoes an evolution that has a fixed point, which is the reservoir state ?. We also study approximate homogenization when the reservoir is composed of a finite set of identically prepared qubits. The homogenizer allows us to understand various aspects of the dynamics of open systems interacting with environments in non-equilibrium states. In particular, the reversibility vs or irreversibility of the dynamics of the open system is directly linked to specific (classical) information about the order in which the reservoir qubits interacted with the system qubit. This aspect of the homogenizer leads to a model of a quantum safe with a classical combination.We analyze in detail how entanglement between the reservoir and the system is created during the process of quantum homogenization. We show that the information about the initial state of the system qubit is stored in the entanglement between the homogenized qubits.
We analyze how information encoded in quantum systems can be optimally processed. In particular, we investigate copying (cloning) of quantum information (represented as states of 2-level quantum systems--qubits). We present unitary transformations which describe the optimal universal cloning of a qubit. Universality of the transformation guarantees that the fidelity of the cloning does not depend on the input state of the qubit, i.e. all states are cloned equally well. We present network for the optimal universal quantum cloning `machine' (transformation) which produces N + 1 copies from the original qubit. Here again the quality (fidelity) of the copies does not depend on the state of the original and is only a function of the number of copes, N. We also present the `machine' which universally and optimally clones states of quantum objects in arbitrary- dimensional Hilbert spaces. In particular, we discuss universal cloning of quantum registers. In addition to cloning of qubits we analyzed another universal operation-- the Universal NOT. We present the optimal transformation and the corresponding logical network which optimally complements an arbitrary input state of a qubit. We show that the fidelity of the performance of the Universal NOT operation increases as a function of the number of input qubits prepared in the same state.
Proceedings Volume Editor (1)
This will count as one of your downloads.
You will have access to both the presentation and article (if available).
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.