Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Superdense coding

From Wikipedia, the free encyclopedia
Two-bit quantum communication protocol
This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages)
This article includes a list ofgeneral references, butit lacks sufficient correspondinginline citations. Please help toimprove this article byintroducing more precise citations.(August 2013) (Learn how and when to remove this message)
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Superdense coding" – news ·newspapers ·books ·scholar ·JSTOR
(August 2013) (Learn how and when to remove this message)
(Learn how and when to remove this message)

Schematic video demonstrating individual steps of superdense coding. A message consisting of two bits (in video these are (1, 0)) is sent from station A to station B using only a single particle. This particle is a member of an entangled pair created by source S. Station A at first applies a properly chosen operation to its particle and then sends it to station B, which measures both particles in the Bell basis. The measurement result retrieves the two bits sent by station A.

Inquantum information theory,superdense coding (also referred to asdense coding) is aquantum communication protocol to communicate a number of classical bits of information by only transmitting a smaller number of qubits, under the assumption of sender and receiver pre-sharing an entangled resource. In its simplest form, the protocol involves two parties, often referred to asAlice and Bob in this context, which share a pair of maximally entangled qubits, and allows Alice to transmit two bits (i.e., one of 00, 01, 10 or 11) to Bob by sending only onequbit.[1][2] This protocol was first proposed byCharles H. Bennett andStephen Wiesner in 1970[3] (though not published by them until 1992) and experimentally actualized in 1996 by Klaus Mattle, Harald Weinfurter, Paul G. Kwiat andAnton Zeilinger using entangled photon pairs.[2] Superdense coding can be thought of as the opposite ofquantum teleportation, in which one transfers one qubit from Alice to Bob by communicating two classical bits, as long as Alice and Bob have a pre-shared Bell pair.[2]

The transmission of two bits via a single qubit is made possible by the fact that Alice can choose amongfourquantum gate operations to perform on her share of the entangled state. Alice determines which operation to perform accordingly to the pair of bits she wants to transmit. She then sends Bob the qubit stateevolved through the chosen gate. Said qubit thus encodes information about the two bits Alice used to select the operation, and this information can be retrieved by Bob thanks to pre-shared entanglement between them. After receiving Alice's qubit, operating on the pair and measuring both, Bob obtains two classical bits of information. It is worth stressing that if Alice and Bob do not pre-share entanglement, then the superdense protocol is impossible, as this would violateHolevo's theorem.

Superdense coding is the underlying principle of secure quantum secret coding. The necessity of having both qubits to decode the information being sent eliminates the risk of eavesdroppers intercepting messages.[4]

Overview

[edit]
When the sender and receiver share a Bell state, two classical bits can be packed into one qubit. In the diagram, lines carryqubits, while the doubled lines carry classicbits. The variables b1 and b2 are classic Boolean, and the zeroes at the left-hand side represent the purequantum state|0{\displaystyle |0\rangle }. See the section named "The protocol" below for more details regarding this picture.

SupposeAlice wants to send two classical bits of information (00, 01, 10, or 11) to Bob usingqubits (instead of classicalbits). To do this, an entangled state (e.g. a Bell state) is prepared using a Bell circuit or gate by Charlie, a third person. Charlie then sends one of these qubits (in the Bell state) to Alice and the other to Bob. Once Alice obtains her qubit in the entangled state, she applies a certain quantum gate to her qubit depending on which two-bit message (00, 01, 10 or 11) she wants to send to Bob. Her entangled qubit is then sent to Bob who, after applying the appropriate quantum gate and making ameasurement, can retrieve the classical two-bit message. Observe that Alice does not need to communicate to Bob which gate to apply in order to obtain the correct classical bits from his projective measurement.

The protocol

[edit]

The protocol can be split into five different steps: preparation, sharing, encoding, sending, and decoding.

Preparation

[edit]

The protocol starts with the preparation of an entangled state, which is later shared between Alice and Bob. For example, the followingBell state

|Φ+=12(|0A|0B+|1A|1B){\displaystyle |\Phi ^{+}\rangle ={\frac {1}{\sqrt {2}}}(|0\rangle _{A}\otimes |0\rangle _{B}+|1\rangle _{A}\otimes |1\rangle _{B})}

is prepared, where{\displaystyle \otimes } denotes thetensor product. In common usage the tensor product symbol{\displaystyle \otimes } may be omitted:

|Φ+=12(|0A0B+|1A1B){\displaystyle |\Phi ^{+}\rangle ={\frac {1}{\sqrt {2}}}(|0_{A}0_{B}\rangle +|1_{A}1_{B}\rangle )}.

Sharing

[edit]

After the preparation of the Bell state|Φ+{\displaystyle |\Phi ^{+}\rangle }, the qubit denoted by subscriptA is sent to Alice and the qubit denoted by subscriptB is sent to Bob. Alice and Bob may be in different locations, an unlimited distance from each other.

There may be an arbitrary period between the preparation and sharing of the entangled state|Φ+{\displaystyle |\Phi ^{+}\rangle } and the rest of the steps in the procedure.

Encoding

[edit]

By applying aquantum gate to her qubit locally, Alice can transform the entangled state|Φ+{\displaystyle |\Phi ^{+}\rangle } into any of the fourBell states (including, of course,|Φ+{\displaystyle |\Phi ^{+}\rangle }). Note that this process cannot "break" the entanglement between the two qubits.

Let's now describe which operations Alice needs to perform on her entangled qubit, depending on which classical two-bit message she wants to send to Bob. We'll later see why these specific operations are performed. There are four cases, which correspond to the four possible two-bit strings that Alice may want to send.

1. If Alice wants to send the classical two-bit string 00 to Bob, then she applies the identity quantum gate,I=[1001]{\displaystyle \mathbb {I} ={\begin{bmatrix}1&0\\0&1\end{bmatrix}}}, to her qubit, so that it remains unchanged. The resultant entangled state is then

|B00=12(|0A0B+|1A1B){\displaystyle |B_{00}\rangle ={\frac {1}{\sqrt {2}}}(|0_{A}0_{B}\rangle +|1_{A}1_{B}\rangle )}

In other words, the entangled state shared between Alice and Bob has not changed, i.e. it is still|Φ+{\displaystyle |\Phi ^{+}\rangle }. The notation|B00{\displaystyle |B_{00}\rangle } indicates that Alice wants to send the two-bit string 00.

2. If Alice wants to send the classical two-bit string 01 to Bob, then she applies thequantumNOT (orbit-flip) gate,X=[0110]{\displaystyle X={\begin{bmatrix}0&1\\1&0\end{bmatrix}}}, to her qubit, so that the resultant entangled quantum state becomes

|B01=12(|1A0B+|0A1B){\displaystyle |B_{01}\rangle ={\frac {1}{\sqrt {2}}}(|1_{A}0_{B}\rangle +|0_{A}1_{B}\rangle )}

3. If Alice wants to send the classical two-bit string 10 to Bob, then she applies thequantumphase-flip gateZ=[1001]{\displaystyle Z={\begin{bmatrix}1&0\\0&-1\end{bmatrix}}} to her qubit, so the resultant entangled state becomes

|B10=12(|0A0B|1A1B){\displaystyle |B_{10}\rangle ={\frac {1}{\sqrt {2}}}(|0_{A}0_{B}\rangle -|1_{A}1_{B}\rangle )}

4. If, instead, Alice wants to send the classical two-bit string 11 to Bob, then she applies the quantum gateZX=iY=[0110]{\displaystyle Z*X=iY={\begin{bmatrix}0&1\\-1&0\end{bmatrix}}} to her qubit, so that the resultant entangled state becomes

|B11=12(|0A1B|1A0B){\displaystyle |B_{11}\rangle ={\frac {1}{\sqrt {2}}}(|0_{A}1_{B}\rangle -|1_{A}0_{B}\rangle )}

The matricesX{\displaystyle X},Z{\displaystyle Z}, andY{\displaystyle Y} are known asPauli matrices.

Sending

[edit]

After having performed one of the operations described above, Alice can send her entangled qubit to Bob using aquantum network through some conventional physical medium.

Decoding

[edit]

In order for Bob to find out which classical bits Alice sent he will perform theCNOT unitary operation, with A as control qubit and B as target qubit. Then, he will performHI{\displaystyle H\otimes I} unitary operation on the entangled qubit A. In other words, the Hadamard quantum gate H is only applied to A (see the figure above).

These operations performed by Bob can be seen as a measurement which projects the entangled state onto one of the four two-qubit basis vectors|00,|01,|10{\displaystyle |00\rangle ,|01\rangle ,|10\rangle } or|11{\displaystyle |11\rangle } (as you can see from the outcomes and the example below).

Example

[edit]

For example, if the resultant entangled state (after the operations performed by Alice) wasB01=12(|1A0B+|0A1B){\displaystyle B_{01}={\tfrac {1}{\sqrt {2}}}(|1_{A}0_{B}\rangle +|0_{A}1_{B}\rangle )}, then a CNOT with A as control bit and B as target bit will changeB01{\displaystyle B_{01}} to becomeB01=12(|1A1B+|0A1B){\displaystyle B_{01}'={\tfrac {1}{\sqrt {2}}}(|1_{A}1_{B}\rangle +|0_{A}1_{B}\rangle )}. Now, the Hadamard gate is applied only to A, to obtain

B01=12[(12(|0|1))A|1B+(12(|0+|1))A|1B].{\displaystyle B_{01}''={\tfrac {1}{\sqrt {2}}}\left[{\left({\tfrac {1}{\sqrt {2}}}(|0\rangle -|1\rangle )\right)}_{A}\otimes |1_{B}\rangle +{\left({\tfrac {1}{\sqrt {2}}}(|0\rangle +|1\rangle )\right)}_{A}\otimes |1_{B}\rangle \right].}

For simplicity, subscripts may be removed:

B01=12(12(|0|1)|1+12(|0+|1)|1)=12(12(|01|11)+12(|01+|11))=12|0112|11+12|01+12|11=|01.{\displaystyle {\begin{aligned}B_{01}''&={\tfrac {1}{\sqrt {2}}}\left({\tfrac {1}{\sqrt {2}}}(|0\rangle -|1\rangle )\otimes |1\rangle +{\tfrac {1}{\sqrt {2}}}(|0\rangle +|1\rangle )\otimes |1\rangle \right)\\&={\tfrac {1}{\sqrt {2}}}\left({\tfrac {1}{\sqrt {2}}}(|01\rangle -|11\rangle )+{\tfrac {1}{\sqrt {2}}}(|01\rangle +|11\rangle )\right)={\tfrac {1}{2}}|01\rangle -{\tfrac {1}{2}}|11\rangle +{\tfrac {1}{2}}|01\rangle +{\tfrac {1}{2}}|11\rangle =|01\rangle .\end{aligned}}}

Now, Bob has the basis state|01{\displaystyle |01\rangle }, so he knows that Alice wanted to send the two-bit string 01.

Security

[edit]

Superdense coding is a form of secure quantum communication.[4] If an eavesdropper, commonly called Eve, intercepts Alice's qubit en route to Bob, all that is obtained by Eve is part of an entangled state. Without access to Bob's qubit, Eve is unable to get any information from Alice's qubit. A third party is unable to eavesdrop on information being communicated through superdense coding and an attempt to measure either qubit would collapse the state of that qubit and alert Bob and Alice.

General dense coding scheme

[edit]

General dense coding schemes can be formulated in the language used to describequantum channels. Alice and Bob share a maximally entangled stateω. Let the subsystems initially possessed by Alice and Bob be labeled 1 and 2, respectively. To transmit the messagex, Alice applies an appropriate channel

Φx{\displaystyle \;\Phi _{x}}

on subsystem 1. On the combined system, this is effected by

ω(ΦxI)(ω){\displaystyle \omega \rightarrow (\Phi _{x}\otimes I)(\omega )}

whereI denotes the identity map on subsystem 2. Alice then sends her subsystem to Bob, who performs a measurement on the combined system to recover the message. Let Bob's measurement be modelled by aPOVM{Fy}y{\displaystyle \{F_{y}\}_{y}}, withFy{\displaystyle F_{y}} positive semidefinite operators such thatyFy=I{\textstyle \sum _{y}F_{y}=I}. The probability that Bob's measuring apparatus registers the messagey{\displaystyle y} is thusp(y|x)=Fy,(ΦxI)(ω)Tr[Fy(ΦxI)(ω)].{\displaystyle p(y|x)=\langle F_{y},(\Phi _{x}\otimes I)(\omega )\rangle \equiv \operatorname {Tr} [F_{y}(\Phi _{x}\otimes I)(\omega )].}Therefore, to achieve the desired transmission, we require thatp(y|x)=Tr[Fy(ΦxI)(ω)]=δxy,{\displaystyle p(y|x)=\operatorname {Tr} [F_{y}(\Phi _{x}\otimes I)(\omega )]=\delta _{xy},}whereδxy{\displaystyle \delta _{xy}} is theKronecker delta.

Experimental

[edit]

The protocol of superdense coding has been actualized in several experiments using different systems to varying levels of channel capacity and fidelities. In 2004, trappedberyllium-9 ions were used in a maximally entangled state to achieve a channel capacity of 1.16 with a fidelity of 0.85.[5] In 2017, a channel capacity of 1.665 was achieved with a fidelity of 0.87 through optical fibers.[6] High-dimensionalququarts (states formed in photon pairs by non-degeneratespontaneous parametric down-conversion) were used to reach a channel capacity of 2.09 (with a limit of 2.32) with a fidelity of 0.98.[7]Nuclear magnetic resonance (NMR) has also been used to share among three parties.[8]

References

[edit]
  1. ^Bennett, C.; Wiesner, S. (1992). "Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states".Physical Review Letters.69 (20):2881–2884.Bibcode:1992PhRvL..69.2881B.doi:10.1103/PhysRevLett.69.2881.PMID 10046665.
  2. ^abcNielsen, Michael A.; Chuang, Isaac L. (9 December 2010). "2.3 Application: superdense coding".Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press. p. 97.ISBN 978-1-139-49548-6.
  3. ^Stephen Wiesner. Memorial blog post by Or Sattath, with scan of Bennett's handwritten notes from 1970. See alsoStephen Wiesner (1942–2021) byScott Aaronson, which also discusses this topic.
  4. ^abWang, Chuan; Deng, Fu-Guo; Li, Yan-Song; Liu, Xiao-Shu; Long, Gui Lu (2005-04-28)."Quantum secure direct communication with high-dimension quantum superdense coding".Physical Review A.71 (4): 044305.doi:10.1103/PhysRevA.71.044305.
  5. ^Schaetz, T.; Barrett, M. D.; Leibfried, D.; Chiaverini, J.; Britton, J.; Itano, W. M.; Jost, J. D.; Langer, C.; Wineland, D. J. (2004-07-22)."Quantum Dense Coding with Atomic Qubits".Physical Review Letters.93 (4): 040505.doi:10.1103/PhysRevLett.93.040505.PMID 15323743.
  6. ^Williams, Brian P.; Sadlier, Ronald J.; Humble, Travis S. (2017-02-01)."Superdense Coding over Optical Fiber Links with Complete Bell-State Measurements".Physical Review Letters.118 (5): 050501.arXiv:1609.00713.doi:10.1103/PhysRevLett.118.050501.PMID 28211745.Williams, B. P., Sadlier, R. J., & Humble, T. S. (2017). Superdense Coding over Optical Fiber Links with Complete Bell-State Measurements. Physical Review Letters, 118(5).
  7. ^Hu, Xiao-Min; Guo, Yu; Liu, Bi-Heng; Huang, Yun-Feng; Li, Chuan-Feng; Guo, Guang-Can (2018-07-06)."Beating the channel capacity limit for superdense coding with entangled ququarts".Science Advances.4 (7): eaat9304.doi:10.1126/sciadv.aat9304.ISSN 2375-2548.PMC 6054506.PMID 30035231.
  8. ^Wei, Daxiu; Yang, Xiaodong; Luo, Jun; Sun, Xianping; Zeng, Xizhi; Liu, Maili (2004-03-01)."NMR experimental implementation of three-parties quantum superdense coding".Chinese Science Bulletin.49 (5):423–426.doi:10.1007/BF02900957.ISSN 1861-9541.

Further reading

[edit]

External links

[edit]
General
Theorems
Quantum
communication
Quantum cryptography
Quantum algorithms
Quantum
complexity theory
Quantum
processor benchmarks
Quantum
computing models
Quantum
error correction
Physical
implementations
Quantum optics
Ultracold atoms
Spin-based
Superconducting
Quantum
programming
Retrieved from "https://en.wikipedia.org/w/index.php?title=Superdense_coding&oldid=1281100609"
Category:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp