Controlled cyclic remote state preparation of arbitrary qubit states

Journal article


Wang, M., Yang, C. and Mousoli, R. 2018. Controlled cyclic remote state preparation of arbitrary qubit states. CMC: Computers, Materials & Continua. 55 (2), pp. 321-329. https://doi.org/10.3970/cmc.2018.02064
AuthorsWang, M., Yang, C. and Mousoli, R.
Abstract

Quantum secure communications could securely transmit quantum information by using quantum resource. Recently, novel applications such as bidirectional and asymmetric quantum protocols have been developed.

In this paper, we propose a new method for generating entanglement which is highly useful for multiparty quantum communications such as teleportation and Remote State Preparation (RSP). As one of its applications, we propose a new type of quantum secure communications, i.e. cyclic RSP protocols. Starting from a four-party controlled cyclic RSP protocol of one-qubit states, we show that this cyclic protocol can be generalized to a multiparty controlled cyclic RSP protocol for preparation of arbitrary qubit states. We point out that previous bidirectional and asymmetric protocols can be regarded as a simpler form of our cyclic RSP protocols.

KeywordsQuantum secure communications; remote state preparation; cyclic communications; asymmetric communications; bidirectional communications, quantum control.
Year2018
JournalCMC: Computers, Materials & Continua
Journal citation55 (2), pp. 321-329
PublisherTech Science Press
ISSN1546-2218
Digital Object Identifier (DOI)https://doi.org/10.3970/cmc.2018.02064
Publication dates
Print01 Jul 2018
Publication process dates
Deposited27 Nov 2018
Output statusPublished
Additional information

Open access journal.

Publisher's version
Permalink -

https://repository.canterbury.ac.uk/item/88xw3/controlled-cyclic-remote-state-preparation-of-arbitrary-qubit-states

Download files

Publisher's version
  • 3
    total views
  • 1
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

The social effects of spam
Mousoli, R., Qi, M. and Edgar-Nevill, D. 2008. The social effects of spam. in: Edgar-Nevill, D. (ed.) Proceedings of CFET 2008 – 2nd Annual International Conference on Cybercrime Forensics Education and Training Canterbury Canterbury Christ Church University. pp. 71-78
Drupal and Joomla security
Mousoli, R. 2008. Drupal and Joomla security.
Spam and social effects
Qi, M., Edgar-Nevill, D. and Mousoli, R. 2009. Spam and social effects.
Human trust and e-trust
Mousoli, R. 2007. Human trust and e-trust.
Traffic analysis, anonymity, ethics and digital 'cat and mouse' in cyberspace: a case study of China vs Iran
Mousoli, R. and Shahabi, J. 2010. Traffic analysis, anonymity, ethics and digital 'cat and mouse' in cyberspace: a case study of China vs Iran. Canterbury Canterbury Christ Church University.
Social networking sites, privacy and digital security: a case study of Facebook and Bebo
Mousoli, R. and Andrade, K. 2010. Social networking sites, privacy and digital security: a case study of Facebook and Bebo. Canterbury Canterbury Christ Church University.
Semantic analysis for spam filtering
Qi, M. and Mousoli, R. 2010. Semantic analysis for spam filtering.