Abstract
Quantum information splitting (QIS) provides an idea for transmitting the quantum state through a classical channel and a preshared quantum entanglement resource. This paper presents a new scheme for QIS based on a five-qubit cluster state and a Bell state. In this scheme, the sender transmits the unknown three-qubit secret state to two agents by the quantum channel with the Bell basis measurement three times and broadcasts the measurement results to the agents through the classical channel. The agent who restores the secret state can successfully recover the initial information to be transmitted through the appropriate unitary operation with the help of the other party. Firstly, our scheme’s process can be accurately realized by performing the applicable Bell basis measurement, single-qubit measurement, and local unitary operation instead of a multiparticle joint measurement. The splitting process of quantum information is realized through a convenient operation. Secondly, compared with some previous schemes, the efficiency of the total scheme has been improved in principle, and the qubit consumption is reduced. Finally, the security of the quantum information splitting scheme is analyzed from the perspectives of external attacks and participant attacks. It is proved that our scheme can effectively resist internal participant attacks and external eavesdropper attacks.
Keywords: quantum information splitting, bell basis measurement, cluster state, single-qubit measurement
1. Introduction
The traditional public-key cryptography is based on mathematically difficult problems. Moreover, the emergence and development of quantum computers significantly threaten the conventional cryptosystem’s security. However, with the in-depth study of the quantum mechanical phenomena and quantum information theory, security can be guaranteed in the process of encryption technology [1,2] and quantum communication [3,4,5]. Quantum communication, an essential branch of quantum information theory, uses quantum entanglement for quantum transmission. Quantum entanglement exerts an immense influence on the principles of quantum mechanics. It is widely used in quantum communication technologies, such as quantum teleportation [6,7], controlled teleportation [8,9,10], quantum secret sharing (QSS) [11,12,13], and quantum information splitting [14,15]. In general, QSS mainly involves two principles: one is to share classical secret information [16,17], and the other is to share confidential quantum information [18,19].
In 1993, Bennett et al. [20] proposed the scheme of quantum teleportation for two-level systems to transmit an arbitrary qubit from the sender to a long-distance receiver. In 1999, the concept of quantum information splitting by extending the idea of Bennett [20] was proposed by Hillery et al. [21] for the first time. Any receiver cannot reconfigure the original state alone but must be assisted by other agents. Quantum information splitting uses quantum entanglement resources to split the transmitted state [22], which can be regarded as the quantum counterpart of classical secret sharing. Since then, quantum information splitting has been extensively studied in theory [23,24] and experiments [25,26]. Subsequently, the splitting schemes for an arbitrary single-qubit secret state [27,28] and two-qubit secret state [29,30,31] have been introduced one after another. Nie et al. [32] designed a deterministic protocol for splitting an arbitrary three-qubit state using a genuinely entangled five-qubit state and a Bell state as the quantum entanglement resource. Shortly afterwards, Zhong et al. [33] demonstrated how to draw support from a four-qubit cluster state and a Greenberger−Horne−Zeilinge state to split the state to be transmitted in the sender’s hand.
In this paper, a new scheme to realize the splitting process of an arbitrary three-qubit state using a five-qubit cluster state and a Bell state as the quantum entanglement resource is presented. Firstly, the sender, Alison, needs to perform the corresponding Bell basis measurements on the three pairs of qubits she owns and send out the measurement outcomes to Bond and Calvin through the classical channel. Secondly, if Bond intends to reconstruct the initial secret information, the assistance of a third-party controller, Calvin, is necessary. It means that Calvin has to performthe X basis measurement on his particle and tell Bond the measurement outcome. Finally, by combining the information from Alison and Calvin, Bond can perform the appropriate unitary operations on the owned qubits to reconstruct the state to be transmitted. Compared with the previous schemes, our quantum information splitting process can be completed only by the Bell basis measurement, X basis measurement, and simple unitary transformation, without a multiparticle joint measurement. A more convenient way can accomplish the communication process, improve the qubit efficiency and the scheme’s security, and reduce communication costs.
The structure of thispaper is as follows. Section 2 briefly introduces some basic quantum gates and the preparation of the five-qubit cluster state from the principles of quantum circuits. Then, in Section 3, the scheme for splitting an arbitrary three-qubit state using a five-qubit cluster state and a Bell state as the quantum entanglement resource is proposed. Section 4 analyses the scheme’s security from internal participant and external eavesdropper attacks and the efficiency of our scheme. Finally, Section 5 concludes the paper.
2. Preliminaries
2.1. Basic Quantum Gates
Unitary operators play a significant part in quantum communication and quantum computation. The operators can act on qubits, in which the quantum gate can transform an input qubit state into a desired output state. A set of basic operations with single-qubit states is known as Pauli operators or I, X, Y, Z gates. The matrix specific forms and actions on the computational basis states are defined as follows:
| (1) |
The Hadamard matrix gate, or H gate, is defined as follows:
| (2) |
The elementary gate also contains the two-qubit gate, except the single-qubit gates mentioned above, namely the Controlled-NOT (CNOT) gate, which is defined as follows:
| (3) |
2.2. Cluster State
In Ref. [34], an important kind of entangled states, namely cluster states, was introduced. Cluster states enjoy the following remarkable property: each pair of qubits can be projected into a maximally entangled state with certainty by single-qubit measurements on all the other qubits. This property might suitably be referred to as maximal connectedness.
For conceptual simplicity, we first restrict ourselves to one-dimensional lattices. Let us recall the definition of one-dimensional cluster states for N qubits. Consider an N-site lattice, with a qubit attached to each site. As a novel multi-qubit entangled state, the cluster state is written as follows:
| (4) |
where () are the Pauli matrices assigned for site a in the lattice, and ,().
2.3. The Preparation of the Five-Qubit Cluster State
In this section, the quantum circuit that the five-qubit cluster state prepared from five individual single qubits is plotted, which is shown in the following Figure 1.
Figure 1.

Circuit diagram representation for the preparation of the five-qubit cluster state.
-
(1)
Prepare the five individual single qubits in the states , , , , , respectively.
-
(2)
Perform H gateon qubits , .
-
(3)
Carry out the CNOT gate on the qubit pairs , , , and , in which the control qubit is the former particle in the qubit pairs, and the target qubitis the second inputparticle, respectively.
Next, the preparation process of a five-qubit cluster state from five qubits can be shown as follows:
| (5) |
3. Splitting an Arbitrary Three-Qubit State
Our scheme is illustrated in detail in this section. There are only three legal parties in this scheme: Alison, Bond, and Calvin. Alisonis the sender; Bond and Calvin are the two agents of Alison. Bond is the information receiver, and Calvin is the controller. Alison first prepares the required quantum entanglement resources as the quantum channel [18], which is given as follows:
| (6) |
Thus, the quantum resource of the seven-qubit can be expressed as the following equation:
| (7) |
Alison possesses an arbitrary unknown three-qubit state as follows:
| (8) |
where the three particles x, y, and z make up the state ,and each of these coefficients is a complex number that satisfies the condition of normalization.
| (9) |
Hence, the entire system can be combined and written as the following state:
| (10) |
where Alison owns the particles x, y, z, 2, 4, and 6, Bond owns the qubits 1, 3, and 7, and Calvin owns the qubit 5, respectively.
The principle of our quantum information splitting scheme is shown in Figure 2, in which the particles connected by solid linesare in an entangled state. BM represents the Bell basis measurement, and SM represents the single-qubit measurement; U1, U3, and U7 represent unitary operations on the particles 1, 3, and 7, respectively. Next, the specific process is described in detail.
Figure 2.

The QIS process between the three parties. The particles connected by solid lines are in an entangled state. BM represents the Bell basis measurement, and SM represents the single-qubit measurement, U1, U3 and U7 represent unitary operations on the particles 1, 3 and 7, respectively. In the step 1 (a), Alison, Bond and Calvin possess the particles 246, 137 and 5, respectively. In the step 2 (b), Alison performs three times BM on her owned qubit pairs (x, 2), (y, 4) and (z, 6), respectively. In the step 3 (c), Calvin performs SM on particle 5. In the step 4 (d), Bond reconstructs the state to be transmitted through appropriate U1, U3 and U7 operations.
Step 1 Share the particles of quantum entangled states securely
Firstly, the sender Alison and the agents Bond and Calvin securely distribute the state and the state. Alison, Bond, and Calvin possess the particles 246, 137, 5, respectively. At the same time, Alison has the three particles of the three-qubit state .
Step 2 Alison performs the Bell basis measurements
Alison performs the BM three times on her owned qubit pairs (x, 2), (y, 4), and (z, 6), respectively. The Bell basis measurement is and . After that, it is possible to obtain 43measurement results in an equal probability form, and she will get one of them. Meanwhile, the residual particles will collapse and acquire one of the corresponding states through the above operation. In the following equations, the symbol in represents the results of three qubit pairs (x, 2), (y, 4), and (z, 6) under the Bell basis in the left-to-right order, respectively. See Equations (11)–(18) for the specific measurement outcomes.
| (11) |
| (12) |
| (13) |
| (14) |
| (15) |
| (16) |
| (17) |
| (18) |
Step 3 Calvin performs the single-qubit measurement
Alisontransmits the Bell measurement outcomes to Calvin and Bond using the classical channel. Only through Calvin’s assistance can Bond reconstruct the shared information. Consequently, to gain the original information, Calvin performs the X basismeasurement toparticle 5 on his own. After that, Calvin will obtain one of the two possible results at random, and the particles (1,3,7) held by Bond will collapse to the corresponding state.
Step 4 Bond reconstructs the state to be transmitted
Bond recovers this unknown state under the cooperation of Calvin. By combining the outcomes of Alison and Calvin, Bond can carry out aproper unitary operation on the particles he owns to restore the state to be transmitted.
For the sake of a simple but general description of the process, we take Alison’s measurement outcomes as an example to expound and prove the process of the splitting scheme. The remaining particles will collapse into the following state:
| (19) |
If Calvin, the controller, is willing to help Bond, he will make the X basis measurement on the particle5he owns, and then he transmits the measurement outcome to Bond. The X basis measurement is and . If the result is or , Bond needs to perform the corresponding operation or on his owned particles 1, 3 and 7, respectively. By completing the procedures mentioned above, Bond can accurately recover the information to be transmitted.
4. Security and Efficiency
We analyze the quantum information splitting scheme proposed in this paper from two aspects of security and efficiency in this section. The security is described from external eavesdropper attacks and internal participant attacks. Then, the efficiency of the qubit and the whole scheme is given in turn.
4.1. Security Analysis
4.1.1. Internal Participant Attack
Let us first discuss the case of an internal attack. Suppose the controller Calvin is the dishonest agent. He intercepts the Bell measurement results sent by Alison. After that, Calvin sends the usurped entangled information that is prepared in advance to Bond. Therefore, when Bondis responsible for reconstructing the quantum information, he will get the wrong original quantum state. At this time, Bond has a suspicion that there is an insider so that the prepared original quantum state is wrong. When Alison and Bond compare the partial information with the state reconstructed through a classical communication channel, they can detect the existence of an attack. Therefore, the communication is discarded.
4.1.2. External Eavesdropper Attack
An external eavesdropper, Eve, manages to steal the information of Alison, Bond, and Calvin. Eve wants to obtain the state to be transmittedby entangling an auxiliary qubit to the whole system during the particle distribution process. However, it is assumed that the three legitimate parties in the scheme are not conscious of the eavesdropping from Eve. After Alison performs the BM three times, the quantum system of Calvin, Bond, and Eve collapses into a state of entanglement. Then, Calvin performs the X basis measurement; at this time, the Bond−Eve system collapses into the tensorproductoftwo states. Eve can not gainany helpful information about the original stateto be transmitted in the process.
Take Alison’s measurement results of as an example. If Eve’s entangled auxiliary particles are , then the entangled state of Bond, Calvin, and Eve can be expressed as follows:
| (20) |
If Calvin’s X basis measurement outcome is , then the remaining particles in the Bond−Eve system will collapse into the state.
| (21) |
If Calvin’s X basis measurement outcome is , then the remaining particles in the Bond−Eve system will collapse into the state.
| (22) |
It is easy to see that Eve acquires no information about the original state.
4.2. Efficiency Analysis
The security of the QIS process is guaranteed by establishing a secure quantum channel. In distributing particles by the sender, decoy photons technology is introduced to detect the presence of eavesdroppers. The decoy state used to detect eavesdropping accounts for only a small part, which can be neglectedin the abstract. Hence, the qubits’ efficiency can reach 100% in our scheme, where the amount of the useful qubitsis expressed as , and the amount of qubits transferredis expressed as . Cabello [35] gave a formula of the efficiency of a quantum key distribution scheme from the perspective of the quantum information theory. Here, the total efficiency of the quantum information splitting scheme can be calculated from the following:
| (23) |
where stands for the quantity of qubits of the quantum state to be shared and and stand for the quantity of qubits transferred and the total number of classical bits used by agents to transmit the measurement results in the communication process, respectively. In our QIS for sharing an arbitrary three-qubit state between the three parties, the total efficiency is , which is the maximum value for the splitting scheme, in theory. Nevertheless, in Yin et al.’s scheme [36] for splitting the quantum state between the three legal parties, the efficiency is , which is lower than that of our QIS scheme.
We summarize the comparison of arbitrary three particle states under different quantum channels and give the following Table 1. On the one hand, in comparison to Ref. [32], although the efficiency is the same as ours, it sacrifices more complex quantum resources to recover the quantum state. On the other hand, in comparison to Ref. [36], it is worth noting that we use less quantum resources and improve the efficiency of the scheme.
Table 1.
The comparison for using the different quantum channels to split an arbitrary three-qubit state.
5. Conclusions
To sum up, a novel scheme is studied and proposed about the QIS of an arbitrary three-qubit system via a five-qubit cluster state and a Bell state as the quantum entanglement resource. In this scheme, Alison performs the BM on the owned three pairs of qubits and then sends out the measurement outcomes to Bond and Calvin through a classical communication channel. It is impractical for Bond to recover the secret by performing a unitary operation without the help of Calvin. Consequently, to recover the state to be transmitted, Calvin is supposed to carry out the X basis measurement and informs Bond of the measurement outcome with the aid of a classical channel. By the measurement results of Alison and Calvin, Bond can recover the state to be transmitted using an applicable unitary operation on his qubits. In addition, the scheme is demonstrated to be secure under internal and external attacks. Therefore, the scheme is experimentally achievable.
Author Contributions
Conceptualization, G.X.; methodology, X.-B.C.; software, T.Z. and G.X.; validation, G.X., T.Z., X.-B.C. and X.W.; formal analysis, T.Z.; investigation, G.X.; resources, X.-B.C.; data curation, G.X. and T.Z.; writing—original draft preparation, T.Z. and G.X.; writing—review and editing, X.-B.C. and G.X.; visualization, G.X. and T.Z.; supervision, X.-B.C. and X.W.; funding acquisition, G.X. and X.-B.C. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Grant No. SKLACSS-202101), NSFC (Grant Nos. 62176273, 61962009, U1936216), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No.2019BDKFJJ010, 2019BDKFJJ014), the Fundamental Research Funds for Beijing Municipal Commission of Education, Beijing Urban Governance Research Base of North China University of Technology, the Natural Science Foundation of Inner Mongolia (2021MS06006), Baotou Kundulun District Science and technology plan project (YF2020013), and Inner Mongolia discipline inspection and supervision big data laboratory open project fund (IMDBD2020020).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Xia Z.H., Jiang L.Q., Liu D.D., Lu L.H., Jeon B. BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans. Serv. Comput. 2019;15:202–214. doi: 10.1109/TSC.2019.2927215. [DOI] [Google Scholar]
- 2.Xia Z.H., Wang X.H., Sun X.M., Wang Q. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans. Parallel. Distrib. Syst. 2015;27:340–352. doi: 10.1109/TPDS.2015.2401003. [DOI] [Google Scholar]
- 3.Xu G., Xiao K., Li Z.P., Niu X.X., Ryan M. Controlled secure direct communication protocol via the three-qubit partially entangled set of states. Comput. Mater. Contin. 2019;58:809–827. doi: 10.32604/cmc.2019.04400. [DOI] [Google Scholar]
- 4.Zhang Z.X., Qu Z.G. Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model. J. Quantum Comput. 2019;1:89–109. doi: 10.32604/jqc.2019.07415. [DOI] [Google Scholar]
- 5.Chen S.Y., Xu G., Chen X.B., Ahmad H., Chen Y.L. Measurement-based quantum repeater network coding. Intell. Autom. Soft Comput. 2021;30:273–284. doi: 10.32604/iasc.2021.018120. [DOI] [Google Scholar]
- 6.Pfaff W., Hensen B.J., Bernien H., van Dam S.B., Blok M.S., Taminiau T.H., Tiggelman M.J., Schouten R.N., Markham M., Twitchen D.J., et al. Unconditional quantum teleportation between distant solid-state quantum bits. Science. 2014;345:532–535. doi: 10.1126/science.1253512. [DOI] [PubMed] [Google Scholar]
- 7.Karlsson A., Bourennane M. Quantum teleportation using three-particle entanglement. Phys. Rev. A. 1998;58:4394–4400. doi: 10.1103/PhysRevA.58.4394. [DOI] [Google Scholar]
- 8.Deng F.G., Li C.Y., Li Y.S., Zhou H.Y., Wang Y. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement. Phys. Rev. A. 2005;72:022338. doi: 10.1103/PhysRevA.72.022338. [DOI] [Google Scholar]
- 9.Chen X.B., Zhang N., Lin S., Wen Q.Y., Zhu F.C. Quantum circuits for controlled teleportation of two-particle entanglement via a W state. Opt. Commun. 2008;281:2331–2335. doi: 10.1016/j.optcom.2007.12.002. [DOI] [Google Scholar]
- 10.Wang T.Y., Wen Q.Y. Controlled quantum teleportation with Bell states. Chin. Phys. B. 2011;20:65–69. doi: 10.1088/1674-1056/20/4/040307. [DOI] [Google Scholar]
- 11.Guo G.P., Guo G.C. Quantum secret sharing without entanglement. Phys. Lett. A. 2003;310:247–251. doi: 10.1016/S0375-9601(03)00074-4. [DOI] [Google Scholar]
- 12.Wang T.Y., Wen Q.Y., Chen X.B., Guo F.Z., Zhu F.C. An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 2008;281:6130–6134. doi: 10.1016/j.optcom.2008.09.026. [DOI] [Google Scholar]
- 13.Sun Y., Wen Q.Y., Gao F., Chen X.B., Zhu F.C. Multiparty quantum secret sharing based on Bell measurement. Opt. Commun. 2009;282:3647–3651. doi: 10.1016/j.optcom.2009.05.054. [DOI] [Google Scholar]
- 14.Nie Y.Y., Li Y.H., Liu J.C., Sang M.H. Quantum state sharing of an arbitrary four-qubit GHZ-type state by using a four-qubit cluster state. QuantumInf. Processing. 2011;10:603–608. doi: 10.1007/s11128-010-0220-z. [DOI] [Google Scholar]
- 15.Chen Y. Splitting an Arbitrary Two-ubit State Via a Seven-qubit Maximally Entangled State. Int. J. Theor. Phys. 2015;54:1515–1518. doi: 10.1007/s10773-014-2348-6. [DOI] [Google Scholar]
- 16.Deng F.G., Long G.L., Zhou H.Y. An efficient quantum secret sharing scheme with Einstein–Podolsky–Rosen pairs. Phys. Lett. A. 2005;340:43–50. doi: 10.1016/j.physleta.2005.04.007. [DOI] [Google Scholar]
- 17.Xu G., Shan R.T., Chen X.B., Dong M.X., Chen Y.L. Probabilistic and hierarchical quantum information splitting based on the non-maximally entangled cluster state. Comput. Mater. Contin. 2021;69:339–349. doi: 10.32604/cmc.2021.017968. [DOI] [Google Scholar]
- 18.Ramírez M.D.G., Falaye B.J., Sun G.H., Cruz-Irisson M., Dong S.H. Quantum teleportation and information splitting via four-qubit cluster state and a Bell state. Front. Phys. 2017;12:171–179. doi: 10.1007/s11467-017-0684-8. [DOI] [Google Scholar]
- 19.Ma L.Y. Two-Qubit Quantum State Sharing Protocol Based on Bell State. Int. J. Theor. Phys. 2020;59:1844–1853. doi: 10.1007/s10773-020-04451-y. [DOI] [Google Scholar]
- 20.Bennett C.H., Brassard G., Crépeau C., Jozsa R., Peres A., Wootters W.K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993;70:1895–1899. doi: 10.1103/PhysRevLett.70.1895. [DOI] [PubMed] [Google Scholar]
- 21.Hillery M., Bužek V., Berthiaume A. Quantum secret sharing. Phys. Rev. A. 1999;59:1829–1834. doi: 10.1103/PhysRevA.59.1829. [DOI] [Google Scholar]
- 22.Kang S.Y., Chen X.B., Yang Y.X. Multi-party quantum state sharing of an arbitrary multi-qubit state via χ-type entangled states. Quantum Inf. Processing. 2014;13:2081–2098. doi: 10.1007/s11128-014-0800-4. [DOI] [Google Scholar]
- 23.Deng F.G., Li X.H., Li C.Y., Zhou P., Zhou H.Y. Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs. Phys. Rev. A. 2005;72:044301. doi: 10.1103/PhysRevA.72.044301. [DOI] [Google Scholar]
- 24.Xu G., Wang C., Yang Y.X. Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state. Quantum Inf. Processing. 2014;13:43–57. doi: 10.1007/s11128-013-0670-1. [DOI] [Google Scholar]
- 25.Zhao Z., Chen Y.A., Zhang A.N., Yang T., Briegel H.J., Pan J.W. Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature. 2004;430:54–58. doi: 10.1038/nature02643. [DOI] [PubMed] [Google Scholar]
- 26.Bell B.A., Markham D., Herrera-Martí D.A., Marin A., Wadsworth W.J., Rarity J.G., Tame M.S. Experimental demonstration of graph-state quantum secret sharing. Nat. Commun. 2014;5:5480. doi: 10.1038/ncomms6480. [DOI] [PubMed] [Google Scholar]
- 27.Muralidharan S., Panigrahi P.K. Quantum-information splitting using multipartite cluster states. Phys. Rev. A. 2008;78:062333. doi: 10.1103/PhysRevA.78.062333. [DOI] [Google Scholar]
- 28.Chen X.B., Niu X.X., Zhou X.J., Yang Y.X. Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Processing. 2013;12:365–380. doi: 10.1007/s11128-012-0379-6. [DOI] [Google Scholar]
- 29.Shi R.H., Huang L.S., Yang W., Zhong H. Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states. QuantumInf. Processing. 2011;10:231–239. doi: 10.1007/s11128-010-0191-0. [DOI] [Google Scholar]
- 30.Wang R.J., Li D.F., Deng F.H. Quantum information splitting of a two-qubit bell state using a five-qubit entangled state. Int. J. Theor. Phys. 2015;54:3229–3237. doi: 10.1007/s10773-015-2562-x. [DOI] [Google Scholar]
- 31.Yang Y., Li D., Liu M., Chen J. Quantum Information Splitting of Arbitrary Two-Qubit State Via a Five-Qubit Cluster State and a Bell-State. Int. J. Theor. Phys. 2020;59:187–199. doi: 10.1007/s10773-019-04310-5. [DOI] [Google Scholar]
- 32.Nie Y.Y., Li Y.H., Liu J.C., Sang M.H. Quantum information splitting of an arbitrary three-qubit state by using a genuinely entangled five-qubit state and a Bell-state. Quantum Inf. Processing. 2012;11:563–569. doi: 10.1007/s11128-011-0264-8. [DOI] [Google Scholar]
- 33.Zhong L.Y., Guo Q., Cheng L.Y., Su S.L., Zhu L., Wang H.F., Zhang S. Quantum information splitting of an arbitrary three-qubit state via the cavity input–output process. Opt. Commun. 2012;285:4616–4620. doi: 10.1016/j.optcom.2012.06.044. [DOI] [Google Scholar]
- 34.Zhou D.L., Zeng B., Xu Z., Sun C.P. Quantum computation based on d-Level cluster state. Phys. Rev. A. 2003;68:062303. doi: 10.1103/PhysRevA.68.062303. [DOI] [Google Scholar]
- 35.Cabello A. Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 2000;85:5635–5638. doi: 10.1103/PhysRevLett.85.5635. [DOI] [PubMed] [Google Scholar]
- 36.Yin A., Wang J. Quantum Information Splitting of Arbitrary Three-qubit State by Using Five-qubit Cluster state and GHZ-state. Int. J. Theor. Phys. 2016;55:5250–5264. doi: 10.1007/s10773-016-3146-0. [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Not applicable.
