Skip to main content
Entropy logoLink to Entropy
. 2022 Mar 8;24(3):381. doi: 10.3390/e24030381

Splitting an Arbitrary Three-Qubit State via a Five-Qubit Cluster State and a Bell State

Gang Xu 1,2,*, Tianai Zhou 3,*, Xiu-Bo Chen 3,*, Xiaojun Wang 4
Editor: Raúl Alcaraz
PMCID: PMC8947329  PMID: 35327892

Abstract

Quantum information splitting (QIS) provides an idea for transmitting the quantum state through a classical channel and a preshared quantum entanglement resource. This paper presents a new scheme for QIS based on a five-qubit cluster state and a Bell state. In this scheme, the sender transmits the unknown three-qubit secret state to two agents by the quantum channel with the Bell basis measurement three times and broadcasts the measurement results to the agents through the classical channel. The agent who restores the secret state can successfully recover the initial information to be transmitted through the appropriate unitary operation with the help of the other party. Firstly, our scheme’s process can be accurately realized by performing the applicable Bell basis measurement, single-qubit measurement, and local unitary operation instead of a multiparticle joint measurement. The splitting process of quantum information is realized through a convenient operation. Secondly, compared with some previous schemes, the efficiency of the total scheme has been improved in principle, and the qubit consumption is reduced. Finally, the security of the quantum information splitting scheme is analyzed from the perspectives of external attacks and participant attacks. It is proved that our scheme can effectively resist internal participant attacks and external eavesdropper attacks.

Keywords: quantum information splitting, bell basis measurement, cluster state, single-qubit measurement

1. Introduction

The traditional public-key cryptography is based on mathematically difficult problems. Moreover, the emergence and development of quantum computers significantly threaten the conventional cryptosystem’s security. However, with the in-depth study of the quantum mechanical phenomena and quantum information theory, security can be guaranteed in the process of encryption technology [1,2] and quantum communication [3,4,5]. Quantum communication, an essential branch of quantum information theory, uses quantum entanglement for quantum transmission. Quantum entanglement exerts an immense influence on the principles of quantum mechanics. It is widely used in quantum communication technologies, such as quantum teleportation [6,7], controlled teleportation [8,9,10], quantum secret sharing (QSS) [11,12,13], and quantum information splitting [14,15]. In general, QSS mainly involves two principles: one is to share classical secret information [16,17], and the other is to share confidential quantum information [18,19].

In 1993, Bennett et al. [20] proposed the scheme of quantum teleportation for two-level systems to transmit an arbitrary qubit from the sender to a long-distance receiver. In 1999, the concept of quantum information splitting by extending the idea of Bennett [20] was proposed by Hillery et al. [21] for the first time. Any receiver cannot reconfigure the original state alone but must be assisted by other agents. Quantum information splitting uses quantum entanglement resources to split the transmitted state [22], which can be regarded as the quantum counterpart of classical secret sharing. Since then, quantum information splitting has been extensively studied in theory [23,24] and experiments [25,26]. Subsequently, the splitting schemes for an arbitrary single-qubit secret state [27,28] and two-qubit secret state [29,30,31] have been introduced one after another. Nie et al. [32] designed a deterministic protocol for splitting an arbitrary three-qubit state using a genuinely entangled five-qubit state and a Bell state as the quantum entanglement resource. Shortly afterwards, Zhong et al. [33] demonstrated how to draw support from a four-qubit cluster state and a Greenberger−Horne−Zeilinge state to split the state to be transmitted in the sender’s hand.

In this paper, a new scheme to realize the splitting process of an arbitrary three-qubit state using a five-qubit cluster state and a Bell state as the quantum entanglement resource is presented. Firstly, the sender, Alison, needs to perform the corresponding Bell basis measurements on the three pairs of qubits she owns and send out the measurement outcomes to Bond and Calvin through the classical channel. Secondly, if Bond intends to reconstruct the initial secret information, the assistance of a third-party controller, Calvin, is necessary. It means that Calvin has to performthe X basis measurement on his particle and tell Bond the measurement outcome. Finally, by combining the information from Alison and Calvin, Bond can perform the appropriate unitary operations on the owned qubits to reconstruct the state to be transmitted. Compared with the previous schemes, our quantum information splitting process can be completed only by the Bell basis measurement, X basis measurement, and simple unitary transformation, without a multiparticle joint measurement. A more convenient way can accomplish the communication process, improve the qubit efficiency and the scheme’s security, and reduce communication costs.

The structure of thispaper is as follows. Section 2 briefly introduces some basic quantum gates and the preparation of the five-qubit cluster state from the principles of quantum circuits. Then, in Section 3, the scheme for splitting an arbitrary three-qubit state using a five-qubit cluster state and a Bell state as the quantum entanglement resource is proposed. Section 4 analyses the scheme’s security from internal participant and external eavesdropper attacks and the efficiency of our scheme. Finally, Section 5 concludes the paper.

2. Preliminaries

2.1. Basic Quantum Gates

Unitary operators play a significant part in quantum communication and quantum computation. The operators can act on qubits, in which the quantum gate can transform an input qubit state into a desired output state. A set of basic operations with single-qubit states is known as Pauli operators or I, X, Y, Z gates. The matrix specific forms and actions on the computational basis states are defined as follows:

I=1001,X=0110,iY=i0ii0=0110,iY0=1,iY1=0,Z=1001 (1)

The Hadamard matrix gate, or H gate, is defined as follows:

H = 121111 (2)

The elementary gate also contains the two-qubit gate, except the single-qubit gates mentioned above, namely the Controlled-NOT (CNOT) gate, which is defined as follows:

CNOT = 1000010000010010 (3)

2.2. Cluster State

In Ref. [34], an important kind of entangled states, namely cluster states, was introduced. Cluster states enjoy the following remarkable property: each pair of qubits can be projected into a maximally entangled state with certainty by single-qubit measurements on all the other qubits. This property might suitably be referred to as maximal connectedness.

For conceptual simplicity, we first restrict ourselves to one-dimensional lattices. Let us recall the definition of one-dimensional cluster states for N qubits. Consider an N-site lattice, with a qubit attached to each site. As a novel multi-qubit entangled state, the cluster state is written as follows:

ϕC = 12N/2a = 1N[0a + 1a(σz)a + 1] (4)

where (σi)a(i = x,y,z) are the Pauli matrices assigned for site a in the lattice, and σzsa = (1)ss,(s{0,1}).

2.3. The Preparation of the Five-Qubit Cluster State

In this section, the quantum circuit that the five-qubit cluster state prepared from five individual single qubits is plotted, which is shown in the following Figure 1.

Figure 1.

Figure 1

Circuit diagram representation for the preparation of the five-qubit cluster state.

  • (1)

    Prepare the five individual single qubits a,b,c,d,e in the states 0a, 0b, 0c, 0d, 0e, respectively.

  • (2)

    Perform H gateon qubits a, c.

  • (3)

    Carry out the CNOT gate on the qubit pairs a,b, c,d, a,c, and c,e, in which the control qubit is the former particle in the qubit pairs, and the target qubitis the second inputparticle, respectively.

Next, the preparation process of a five-qubit cluster state from five qubits can be shown as follows:

0a0b0c0d0eHaIbHcIdIe120+1a0b120 + 1c0d0eCNOTab1200 + 11ab0 + 1c0d0eCNOTcd1200 + 11ab00 + 11cd0eCNOTac120000+0011 + 1110 + 1101abcd0eCNOTce1200000 + 00111 + 11101 + 11010abcde (5)

3. Splitting an Arbitrary Three-Qubit State

Our scheme is illustrated in detail in this section. There are only three legal parties in this scheme: Alison, Bond, and Calvin. Alisonis the sender; Bond and Calvin are the two agents of Alison. Bond is the information receiver, and Calvin is the controller. Alison first prepares the required quantum entanglement resources as the quantum channel [18], which is given as follows:

Ψ12345 = 1200000 + 00111 + 11101 + 1101012345ϕ+67 = 1200 + 1167 (6)

Thus, the quantum resource of the seven-qubit can be expressed as the following equation:

Θ1234567=ψ12345ϕ+67=1200000 + 00111 + 11101 + 11010123451200 + 1167=1220000000 + 0011100 + 1110100 + 1101000+0000011 + 0011111 + 1110111 + 11010111234567 (7)

Alison possesses an arbitrary unknown three-qubit state as follows:

ψxyz=δ000000 + δ001001 + δ010010 + δ011011+δ100100 + δ101101 + δ110110 + δ111111xyz (8)

where the three particles x, y, and z make up the state ψxyz,and each of these coefficients is a complex number that satisfies the condition of normalization.

l1,l2,l3 = 01δl1l2l32 = 1 (9)

Hence, the entire system can be combined and written as the following state:

Ψxyz1234567 = ψxyzΘ1234567 (10)

where Alison owns the particles x, y, z, 2, 4, and 6, Bond owns the qubits 1, 3, and 7, and Calvin owns the qubit 5, respectively.

The principle of our quantum information splitting scheme is shown in Figure 2, in which the particles connected by solid linesare in an entangled state. BM represents the Bell basis measurement, and SM represents the single-qubit measurement; U1, U3, and U7 represent unitary operations on the particles 1, 3, and 7, respectively. Next, the specific process is described in detail.

Figure 2.

Figure 2

The QIS process between the three parties. The particles connected by solid lines are in an entangled state. BM represents the Bell basis measurement, and SM represents the single-qubit measurement, U1, U3 and U7 represent unitary operations on the particles 1, 3 and 7, respectively. In the step 1 (a), Alison, Bond and Calvin possess the particles 246, 137 and 5, respectively. In the step 2 (b), Alison performs three times BM on her owned qubit pairs (x, 2), (y, 4) and (z, 6), respectively. In the step 3 (c), Calvin performs SM on particle 5. In the step 4 (d), Bond reconstructs the state to be transmitted through appropriate U1, U3 and U7 operations.

Step 1 Share the particles of quantum entangled states securely

Firstly, the sender Alison and the agents Bond and Calvin securely distribute the ψ12345 state and the ϕ+67 state. Alison, Bond, and Calvin possess the particles 246, 137, 5, respectively. At the same time, Alison has the three particles of the three-qubit state ψxyz.

Step 2 Alison performs the Bell basis measurements

Alison performs the BM three times on her owned qubit pairs (x, 2), (y, 4), and (z, 6), respectively. The Bell basis measurement is ϕ± = 1200 ± 11 and φ± = 1201 ± 10. After that, it is possible to obtain 43measurement results in an equal probability form, and she will get one of them. Meanwhile, the residual particles will collapse and acquire one of the corresponding states through the above operation. In the following equations, the symbol ± in ϑ1357 represents the results of three qubit pairs (x, 2), (y, 4), and (z, 6) under the Bell basis ϕ±,φ± in the left-to-right order, respectively. See Equations (11)–(18) for the specific measurement outcomes.

ϕ±x2ϕ±y4ϕ±z6ϑ1357=18δ0000000++±δ0010001+±+δ0100110+±±δ0110111±++δ1001110±+±δ1011111±±+δ1101000±±±δ11110011357 (11)
ϕ±x2ϕ±y4φ±z6ϑ1357=18δ0000001++±δ0010000+±+δ0100111+±±δ0110110±++δ1001111±+±δ1011110±±+δ1101001±±±δ11110001357 (12)
ϕ±x2φ±y4ϕ±z6ϑ1357=18δ0000110++±δ0010111+±+δ0100000+±±δ0110001±++δ1001000±+±δ1011001±±+δ1101110±±±δ11111111357 (13)
ϕ±x2φ±y4φ±z6ϑ1357=18δ0000111++±δ0010110+±+δ0100001+±±δ0110000±++δ1001001±+±δ1011000±±+δ1101111±±±δ11111101357 (14)
φ±x2ϕ±y4ϕ±z6ϑ1357=18δ0001110++±δ0011111+±+δ0101000+±±δ0111001±++δ1000000±+±δ1010001±±+δ1100110±±±δ11101111357 (15)
φ±x2ϕ±y4φ±z6ϑ1357=18δ0001111++±δ0011110+±+δ0101001+±±δ0111000±++δ1000001±+±δ1010000±±+δ1100111±±±δ11101101357 (16)
φ±x2φ±y4ϕ±z6ϑ1357=18δ0001000++±δ0011001+±+δ0101110+±±δ0111111±++δ1000110±+±δ1010111±±+δ1100000±±±δ11100011357 (17)
φ±x2φ±y4φ±z6ϑ1357=18δ0001001++±δ0011000+±+δ0101111+±±δ0111110±++δ1000111±+±δ1010110±±+δ1100001±±±δ11100001357 (18)

Step 3 Calvin performs the single-qubit measurement

Alisontransmits the Bell measurement outcomes to Calvin and Bond using the classical channel. Only through Calvin’s assistance can Bond reconstruct the shared information. Consequently, to gain the original information, Calvin performs the X basismeasurement toparticle 5 on his own. After that, Calvin will obtain one of the two possible results at random, and the particles (1,3,7) held by Bond will collapse to the corresponding state.

Step 4 Bond reconstructs the state to be transmitted

Bond recovers this unknown state under the cooperation of Calvin. By combining the outcomes of Alison and Calvin, Bond can carry out aproper unitary operation on the particles he owns to restore the state to be transmitted.

For the sake of a simple but general description of the process, we take Alison’s measurement outcomes ϕx2ϕy4ϕz6 as an example to expound and prove the process of the splitting scheme. The remaining particles will collapse into the following state:

ϑ1357=18δ0000000δ0010001δ0100110+δ0110111δ1001110+δ1011111+δ1101000δ11110011357=182+5δ000000δ001001δ010010+δ011011δ100110+δ101111+δ110100δ111101137+5(δ000000δ001001+δ010010δ011011+δ100110δ101111+δ110100δ111101)137] (19)

If Calvin, the controller, is willing to help Bond, he will make the X basis measurement on the particle5he owns, and then he transmits the measurement outcome to Bond. The X basis measurement is +=120+1 and =1201. If the result is +5 or 5, Bond needs to perform the corresponding operation C13Z3Z7 or C13Z7 on his owned particles 1, 3 and 7, respectively. By completing the procedures mentioned above, Bond can accurately recover the information to be transmitted.

4. Security and Efficiency

We analyze the quantum information splitting scheme proposed in this paper from two aspects of security and efficiency in this section. The security is described from external eavesdropper attacks and internal participant attacks. Then, the efficiency of the qubit and the whole scheme is given in turn.

4.1. Security Analysis

4.1.1. Internal Participant Attack

Let us first discuss the case of an internal attack. Suppose the controller Calvin is the dishonest agent. He intercepts the Bell measurement results sent by Alison. After that, Calvin sends the usurped entangled information that is prepared in advance to Bond. Therefore, when Bondis responsible for reconstructing the quantum information, he will get the wrong original quantum state. At this time, Bond has a suspicion that there is an insider so that the prepared original quantum state is wrong. When Alison and Bond compare the partial information with the state reconstructed through a classical communication channel, they can detect the existence of an attack. Therefore, the communication is discarded.

4.1.2. External Eavesdropper Attack

An external eavesdropper, Eve, manages to steal the information of Alison, Bond, and Calvin. Eve wants to obtain the state to be transmittedby entangling an auxiliary qubit to the whole system during the particle distribution process. However, it is assumed that the three legitimate parties in the scheme are not conscious of the eavesdropping from Eve. After Alison performs the BM three times, the quantum system of Calvin, Bond, and Eve collapses into a state of entanglement. Then, Calvin performs the X basis measurement; at this time, the Bond−Eve system collapses into the tensorproductoftwo states. Eve can not gainany helpful information about the original stateto be transmitted in the process.

Take Alison’s measurement results of ϕ+x2ϕ+y4ϕ+z6 as an example. If Eve’s entangled auxiliary particles are 120+1E, then the entangled state of Bond, Calvin, and Eve can be expressed as follows:

Ξ1357E = 182δ00000000+δ00000001+δ00100010+δ00100011+δ01001100+δ01001101+δ01101110+δ01101111+δ10011100+δ10011101+δ10111110+δ10111111+δ11010000+δ11010001+δ11110010+δ111100111357E (20)

If Calvin’s X basis measurement outcome is +5, then the remaining particles in the Bond−Eve system will collapse into the ξ1137E state.

ξ1137E = 116δ0000000+δ0000001+δ0010010+δ0010011+δ0100100+δ0100101+δ0110110+δ0110111+δ1001100+δ1001101+δ1011110+δ1011111+δ1101000+δ1101001+δ1111010+δ1111011137E=182δ000000+δ001001+δ010010+δ011011+δ100110+δ101111+δ110100+δ111101137120+1E (21)

If Calvin’s X basis measurement outcome is 5, then the remaining particles in the Bond−Eve system will collapse into the ξ2137E state.

ξ2137E = 116δ0000000+δ0000001+δ0010010+δ0010011δ0100100δ0100101δ0110110δ0110111δ1001100δ1001101δ1011110δ1011111+δ1101000+δ1101001+δ1111010+δ1111011137E=182δ000000+δ001001δ010010δ011011δ100110δ101111+δ110100+δ111101137120+1E (22)

It is easy to see that Eve acquires no information about the original state.

4.2. Efficiency Analysis

The security of the QIS process is guaranteed by establishing a secure quantum channel. In distributing particles by the sender, decoy photons technology is introduced to detect the presence of eavesdroppers. The decoy state used to detect eavesdropping accounts for only a small part, which can be neglectedin the abstract. Hence, the qubits’ efficiency η=qu/qt can reach 100% in our scheme, where the amount of the useful qubitsis expressed as qu, and the amount of qubits transferredis expressed as qt. Cabello [35] gave a formula of the efficiency of a quantum key distribution scheme from the perspective of the quantum information theory. Here, the total efficiency of the quantum information splitting scheme can be calculated from the following:

ε = qsqt + bt (23)

where qs stands for the quantity of qubits of the quantum state to be shared and qt and bt stand for the quantity of qubits transferred and the total number of classical bits used by agents to transmit the measurement results in the communication process, respectively. In our QIS for sharing an arbitrary three-qubit state between the three parties, the total efficiency is ε = qsqt + bt = 34 + 7 = 311, which is the maximum value for the splitting scheme, in theory. Nevertheless, in Yin et al.’s scheme [36] for splitting the quantum state between the three legal parties, the efficiency is ε = qsqt + bt = 35 + 8 = 313, which is lower than that of our QIS scheme.

We summarize the comparison of arbitrary three particle states under different quantum channels and give the following Table 1. On the one hand, in comparison to Ref. [32], although the efficiency is the same as ours, it sacrifices more complex quantum resources to recover the quantum state. On the other hand, in comparison to Ref. [36], it is worth noting that we use less quantum resources and improve the efficiency of the scheme.

Table 1.

The comparison for using the different quantum channels to split an arbitrary three-qubit state.

Entanglement Resource qt bt Efficiency
Nie’s scheme [32] genuinely entangled five-qubit state + Bell state 4 7 3/11
Yin’s scheme [36] five-qubit cluster state + GHZ state 5 8 3/13
our scheme five-qubit cluster state + Bell state 4 7 3/11

5. Conclusions

To sum up, a novel scheme is studied and proposed about the QIS of an arbitrary three-qubit system via a five-qubit cluster state and a Bell state as the quantum entanglement resource. In this scheme, Alison performs the BM on the owned three pairs of qubits and then sends out the measurement outcomes to Bond and Calvin through a classical communication channel. It is impractical for Bond to recover the secret by performing a unitary operation without the help of Calvin. Consequently, to recover the state to be transmitted, Calvin is supposed to carry out the X basis measurement and informs Bond of the measurement outcome with the aid of a classical channel. By the measurement results of Alison and Calvin, Bond can recover the state to be transmitted using an applicable unitary operation on his qubits. In addition, the scheme is demonstrated to be secure under internal and external attacks. Therefore, the scheme is experimentally achievable.

Author Contributions

Conceptualization, G.X.; methodology, X.-B.C.; software, T.Z. and G.X.; validation, G.X., T.Z., X.-B.C. and X.W.; formal analysis, T.Z.; investigation, G.X.; resources, X.-B.C.; data curation, G.X. and T.Z.; writing—original draft preparation, T.Z. and G.X.; writing—review and editing, X.-B.C. and G.X.; visualization, G.X. and T.Z.; supervision, X.-B.C. and X.W.; funding acquisition, G.X. and X.-B.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Grant No. SKLACSS-202101), NSFC (Grant Nos. 62176273, 61962009, U1936216), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No.2019BDKFJJ010, 2019BDKFJJ014), the Fundamental Research Funds for Beijing Municipal Commission of Education, Beijing Urban Governance Research Base of North China University of Technology, the Natural Science Foundation of Inner Mongolia (2021MS06006), Baotou Kundulun District Science and technology plan project (YF2020013), and Inner Mongolia discipline inspection and supervision big data laboratory open project fund (IMDBD2020020).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Xia Z.H., Jiang L.Q., Liu D.D., Lu L.H., Jeon B. BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans. Serv. Comput. 2019;15:202–214. doi: 10.1109/TSC.2019.2927215. [DOI] [Google Scholar]
  • 2.Xia Z.H., Wang X.H., Sun X.M., Wang Q. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans. Parallel. Distrib. Syst. 2015;27:340–352. doi: 10.1109/TPDS.2015.2401003. [DOI] [Google Scholar]
  • 3.Xu G., Xiao K., Li Z.P., Niu X.X., Ryan M. Controlled secure direct communication protocol via the three-qubit partially entangled set of states. Comput. Mater. Contin. 2019;58:809–827. doi: 10.32604/cmc.2019.04400. [DOI] [Google Scholar]
  • 4.Zhang Z.X., Qu Z.G. Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model. J. Quantum Comput. 2019;1:89–109. doi: 10.32604/jqc.2019.07415. [DOI] [Google Scholar]
  • 5.Chen S.Y., Xu G., Chen X.B., Ahmad H., Chen Y.L. Measurement-based quantum repeater network coding. Intell. Autom. Soft Comput. 2021;30:273–284. doi: 10.32604/iasc.2021.018120. [DOI] [Google Scholar]
  • 6.Pfaff W., Hensen B.J., Bernien H., van Dam S.B., Blok M.S., Taminiau T.H., Tiggelman M.J., Schouten R.N., Markham M., Twitchen D.J., et al. Unconditional quantum teleportation between distant solid-state quantum bits. Science. 2014;345:532–535. doi: 10.1126/science.1253512. [DOI] [PubMed] [Google Scholar]
  • 7.Karlsson A., Bourennane M. Quantum teleportation using three-particle entanglement. Phys. Rev. A. 1998;58:4394–4400. doi: 10.1103/PhysRevA.58.4394. [DOI] [Google Scholar]
  • 8.Deng F.G., Li C.Y., Li Y.S., Zhou H.Y., Wang Y. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement. Phys. Rev. A. 2005;72:022338. doi: 10.1103/PhysRevA.72.022338. [DOI] [Google Scholar]
  • 9.Chen X.B., Zhang N., Lin S., Wen Q.Y., Zhu F.C. Quantum circuits for controlled teleportation of two-particle entanglement via a W state. Opt. Commun. 2008;281:2331–2335. doi: 10.1016/j.optcom.2007.12.002. [DOI] [Google Scholar]
  • 10.Wang T.Y., Wen Q.Y. Controlled quantum teleportation with Bell states. Chin. Phys. B. 2011;20:65–69. doi: 10.1088/1674-1056/20/4/040307. [DOI] [Google Scholar]
  • 11.Guo G.P., Guo G.C. Quantum secret sharing without entanglement. Phys. Lett. A. 2003;310:247–251. doi: 10.1016/S0375-9601(03)00074-4. [DOI] [Google Scholar]
  • 12.Wang T.Y., Wen Q.Y., Chen X.B., Guo F.Z., Zhu F.C. An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 2008;281:6130–6134. doi: 10.1016/j.optcom.2008.09.026. [DOI] [Google Scholar]
  • 13.Sun Y., Wen Q.Y., Gao F., Chen X.B., Zhu F.C. Multiparty quantum secret sharing based on Bell measurement. Opt. Commun. 2009;282:3647–3651. doi: 10.1016/j.optcom.2009.05.054. [DOI] [Google Scholar]
  • 14.Nie Y.Y., Li Y.H., Liu J.C., Sang M.H. Quantum state sharing of an arbitrary four-qubit GHZ-type state by using a four-qubit cluster state. QuantumInf. Processing. 2011;10:603–608. doi: 10.1007/s11128-010-0220-z. [DOI] [Google Scholar]
  • 15.Chen Y. Splitting an Arbitrary Two-ubit State Via a Seven-qubit Maximally Entangled State. Int. J. Theor. Phys. 2015;54:1515–1518. doi: 10.1007/s10773-014-2348-6. [DOI] [Google Scholar]
  • 16.Deng F.G., Long G.L., Zhou H.Y. An efficient quantum secret sharing scheme with Einstein–Podolsky–Rosen pairs. Phys. Lett. A. 2005;340:43–50. doi: 10.1016/j.physleta.2005.04.007. [DOI] [Google Scholar]
  • 17.Xu G., Shan R.T., Chen X.B., Dong M.X., Chen Y.L. Probabilistic and hierarchical quantum information splitting based on the non-maximally entangled cluster state. Comput. Mater. Contin. 2021;69:339–349. doi: 10.32604/cmc.2021.017968. [DOI] [Google Scholar]
  • 18.Ramírez M.D.G., Falaye B.J., Sun G.H., Cruz-Irisson M., Dong S.H. Quantum teleportation and information splitting via four-qubit cluster state and a Bell state. Front. Phys. 2017;12:171–179. doi: 10.1007/s11467-017-0684-8. [DOI] [Google Scholar]
  • 19.Ma L.Y. Two-Qubit Quantum State Sharing Protocol Based on Bell State. Int. J. Theor. Phys. 2020;59:1844–1853. doi: 10.1007/s10773-020-04451-y. [DOI] [Google Scholar]
  • 20.Bennett C.H., Brassard G., Crépeau C., Jozsa R., Peres A., Wootters W.K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993;70:1895–1899. doi: 10.1103/PhysRevLett.70.1895. [DOI] [PubMed] [Google Scholar]
  • 21.Hillery M., Bužek V., Berthiaume A. Quantum secret sharing. Phys. Rev. A. 1999;59:1829–1834. doi: 10.1103/PhysRevA.59.1829. [DOI] [Google Scholar]
  • 22.Kang S.Y., Chen X.B., Yang Y.X. Multi-party quantum state sharing of an arbitrary multi-qubit state via χ-type entangled states. Quantum Inf. Processing. 2014;13:2081–2098. doi: 10.1007/s11128-014-0800-4. [DOI] [Google Scholar]
  • 23.Deng F.G., Li X.H., Li C.Y., Zhou P., Zhou H.Y. Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs. Phys. Rev. A. 2005;72:044301. doi: 10.1103/PhysRevA.72.044301. [DOI] [Google Scholar]
  • 24.Xu G., Wang C., Yang Y.X. Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state. Quantum Inf. Processing. 2014;13:43–57. doi: 10.1007/s11128-013-0670-1. [DOI] [Google Scholar]
  • 25.Zhao Z., Chen Y.A., Zhang A.N., Yang T., Briegel H.J., Pan J.W. Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature. 2004;430:54–58. doi: 10.1038/nature02643. [DOI] [PubMed] [Google Scholar]
  • 26.Bell B.A., Markham D., Herrera-Martí D.A., Marin A., Wadsworth W.J., Rarity J.G., Tame M.S. Experimental demonstration of graph-state quantum secret sharing. Nat. Commun. 2014;5:5480. doi: 10.1038/ncomms6480. [DOI] [PubMed] [Google Scholar]
  • 27.Muralidharan S., Panigrahi P.K. Quantum-information splitting using multipartite cluster states. Phys. Rev. A. 2008;78:062333. doi: 10.1103/PhysRevA.78.062333. [DOI] [Google Scholar]
  • 28.Chen X.B., Niu X.X., Zhou X.J., Yang Y.X. Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Processing. 2013;12:365–380. doi: 10.1007/s11128-012-0379-6. [DOI] [Google Scholar]
  • 29.Shi R.H., Huang L.S., Yang W., Zhong H. Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states. QuantumInf. Processing. 2011;10:231–239. doi: 10.1007/s11128-010-0191-0. [DOI] [Google Scholar]
  • 30.Wang R.J., Li D.F., Deng F.H. Quantum information splitting of a two-qubit bell state using a five-qubit entangled state. Int. J. Theor. Phys. 2015;54:3229–3237. doi: 10.1007/s10773-015-2562-x. [DOI] [Google Scholar]
  • 31.Yang Y., Li D., Liu M., Chen J. Quantum Information Splitting of Arbitrary Two-Qubit State Via a Five-Qubit Cluster State and a Bell-State. Int. J. Theor. Phys. 2020;59:187–199. doi: 10.1007/s10773-019-04310-5. [DOI] [Google Scholar]
  • 32.Nie Y.Y., Li Y.H., Liu J.C., Sang M.H. Quantum information splitting of an arbitrary three-qubit state by using a genuinely entangled five-qubit state and a Bell-state. Quantum Inf. Processing. 2012;11:563–569. doi: 10.1007/s11128-011-0264-8. [DOI] [Google Scholar]
  • 33.Zhong L.Y., Guo Q., Cheng L.Y., Su S.L., Zhu L., Wang H.F., Zhang S. Quantum information splitting of an arbitrary three-qubit state via the cavity input–output process. Opt. Commun. 2012;285:4616–4620. doi: 10.1016/j.optcom.2012.06.044. [DOI] [Google Scholar]
  • 34.Zhou D.L., Zeng B., Xu Z., Sun C.P. Quantum computation based on d-Level cluster state. Phys. Rev. A. 2003;68:062303. doi: 10.1103/PhysRevA.68.062303. [DOI] [Google Scholar]
  • 35.Cabello A. Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 2000;85:5635–5638. doi: 10.1103/PhysRevLett.85.5635. [DOI] [PubMed] [Google Scholar]
  • 36.Yin A., Wang J. Quantum Information Splitting of Arbitrary Three-qubit State by Using Five-qubit Cluster state and GHZ-state. Int. J. Theor. Phys. 2016;55:5250–5264. doi: 10.1007/s10773-016-3146-0. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES