2017
DOI: 10.1007/s10773-016-3250-1
|View full text |Cite
|
Sign up to set email alerts
|

Controlled Remote Implementation of an Arbitrary Single-Qubit Operation with Partially Entangled Quantum Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 67 publications
0
2
0
Order By: Relevance
“…And our protocol is not sensitive to collusive attacks (or called inside attacks) according to the above security analysis. Two-photon entangled states and single-photon states are used as the information carriers in our protocol, they can be prepared and controlled [47,48,49,50,51] even at a great distance. And photon states are also of great use in other fields, such as quantum computation [52,53,54,55] and quantum simulation [56,57].…”
Section: Discussion and Summarymentioning
confidence: 99%
“…And our protocol is not sensitive to collusive attacks (or called inside attacks) according to the above security analysis. Two-photon entangled states and single-photon states are used as the information carriers in our protocol, they can be prepared and controlled [47,48,49,50,51] even at a great distance. And photon states are also of great use in other fields, such as quantum computation [52,53,54,55] and quantum simulation [56,57].…”
Section: Discussion and Summarymentioning
confidence: 99%
“…Form equation (26), one can see that with the permission of controller Charlie, Alice is able to remotely apply  h on the state |ζ〉 Y of Bob's particle Y, at same time, Bob can remotely apply ( )…”
Section: Asymmetric Controlled Bidirectional Rio Of Puqosmentioning
confidence: 99%