Content deleted Content added
m Open access bot: url-access updated in citation with #oabot. |
|||
(47 intermediate revisions by 22 users not shown) | |||
Line 1:
{{multiple issues|{{more footnotes|date=August 2013}}▼
{{refimprove|date=August 2013}}}}▼
{{
▲{{more footnotes|date=August 2013}}
▲{{refimprove|date=August 2013}}
[[File:Superdense coding.png|right|frame|When the sender and receiver share a Bell state, two classical bits can be packed into one qubit. See the section below "The protocol" for more details regarding this picture.]]▼
[[File:Video superdense coding.ogg|right|thumb|Schematic video demonstrating individual steps of superdense coding. A message consisting of two bits (in video these are (1, 0)) is sent from station A to station B using only a single particle. This particle is a member of an entangled pair created by source S. Station A at first applies a properly chosen operation to its particle and then sends it to station B, which measures both particles in the Bell basis. The measurement result retrieves the two bits sent by station A.]]
In [[quantum information theory]], '''superdense coding''' (or dense coding) is a [[quantum communication]] protocol to transmit two classical bits of information (i.e., either 00, 01, 10 or 11) from a sender (often called Alice) to a receiver (often called Bob), by sending only one [[qubit]] from Alice to Bob, under the assumption of Alice and Bob pre-sharing an entangled state.<ref name="bennett1992communication">{{cite journal|last1=Bennett|first1=C.|last2=Wiesner|first2=S.|year=1992|title=Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states|journal=Physical Review Letters|volume=69|issue=20|pages=2881–2884|doi=10.1103/PhysRevLett.69.2881|pmid=10046665}}</ref><ref name="NielsenChuang2010">{{cite book|url=https://books.google.com/books?id=-s4DEy7o-a0C|title=Quantum Computation and Quantum Information: 10th Anniversary Edition|last1=Nielsen|first1=Michael A.|last2=Chuang|first2=Isaac L.|date=9 December 2010|publisher=Cambridge University Press|isbn=978-1-139-49548-6|page=97|section=2.3 Application: superdense coding}}</ref> This protocol was first proposed by [[Charles H. Bennett (physicist)|Bennett]] and [[Stephen Wiesner|Wiesner]] in 1992 and experimentally actualized in 1996 by Mattle, Weinfurter, Kwiat and [[Anton Zeilinger|Zeilinger]] using entangled photon pairs.<ref name="NielsenChuang2010" /> By performing one of four [[quantum gate]] operations on the (entangled) qubit she possesses, Alice can prearrange the measurement Bob makes. After receiving Alice's qubit, operating on the pair and measuring both, Bob has two classical bits of information. If Alice and Bob do not already share entanglement before the protocol begins, then it is impossible to send two classical bits using 1 qubit, as this would violate [[Holevo's theorem]].▼
▲In [[quantum information theory]], '''superdense coding''' (
Superdense coding is the underlying principle of secure quantum secret coding. The necessity of having both qubits to decode the information being sent eliminates the risk of eavesdroppers intercepting messages.<ref name="Wang2005">Wang, C., Deng, F.-G., Li, Y.-S., Liu, X.-S., & Long, G. L. (2005). Quantum secure direct communication with high-dimension quantum superdense coding. Physical Review A, 71(4).</ref>▼
The transmission of two bits via a single qubit is made possible by the fact that Alice can choose among ''four'' [[quantum gate]] operations to perform on her share of the entangled state. Alice determines which operation to perform accordingly to the pair of bits she wants to transmit. She then sends Bob the qubit state ''evolved through the chosen gate''. Said qubit thus encodes information about the two bits Alice used to select the operation, and this information can be retrieved by Bob thanks to pre-shared entanglement between them. After receiving Alice's qubit, operating on the pair and measuring both, Bob obtains two classical bits of information. It is worth stressing that if Alice and Bob do not pre-share entanglement, then the superdense protocol is impossible, as this would violate [[Holevo's theorem]].
▲Superdense coding is the underlying principle of secure quantum secret coding. The necessity of having both qubits to decode the information being sent eliminates the risk of eavesdroppers intercepting messages.<ref name="Wang2005">{{Cite journal |last1=Wang
== Overview ==
▲[[File:Superdense coding.png|right|
Suppose [[Alice and Bob|Alice]] wants to send two classical bits of information (00, 01, 10, or 11) to Bob using [[Qubit|qubits]] (instead of classical [[Bit|bits]]). To do this, an entangled state (e.g. a Bell state) is prepared using a Bell circuit or gate by Charlie, a third person. Charlie then sends one of these qubits (in the Bell state) to Alice and the other to Bob. Once Alice obtains her qubit in the entangled state, she applies a certain quantum gate to her qubit depending on which two-bit message (00, 01, 10 or 11) she wants to send to Bob. Her entangled qubit is then sent to Bob who, after applying the appropriate quantum gate and making a [[Measurement in quantum mechanics|measurement]], can retrieve the classical two-bit message. Observe that Alice does not need to communicate to Bob which gate to apply in order to obtain the correct classical bits from his projective measurement.
== The protocol ==
Line 24 ⟶ 23:
=== Preparation ===
The protocol starts with the preparation of an entangled state, which is later shared between Alice and Bob.
:<math>|\Phi ^{+}\rangle = \frac{1}{\sqrt{2}} (|0\rangle_A \otimes |0\rangle_B + |1\rangle_A \otimes |1\rangle_B)</math>
is prepared, where <math>\otimes </math> denotes the [[tensor product]]
:<math>|\Phi ^{+}\rangle = \frac{1}{\sqrt{2}}(|0_A0_B\rangle + |1_A1_B\rangle)</math>.
Line 34 ⟶ 33:
=== Sharing ===
After the preparation of the Bell state <math>|\Phi ^{+}\rangle</math>, the qubit denoted by subscript ''A'' is sent to Alice and the qubit denoted by subscript ''B'' is sent to Bob
There may be
=== Encoding ===
Line 46 ⟶ 45:
1. If Alice wants to send the classical two-bit string 00 to Bob, then she applies the identity quantum gate, <math>\mathbb{I} = \begin{bmatrix} 1 & 0 \\ 0 & 1\end{bmatrix}</math>, to her qubit, so that it remains unchanged. The resultant entangled state is then
: <math>
In other words, the entangled state shared between Alice and Bob has not changed, i.e. it is still <math>|\Phi ^{+}\rangle</math>. The notation <math>|B_{00}\rangle</math>
2. If Alice wants to send the classical two-bit string 01 to Bob, then she applies the [[Quantum logic gate#X|quantum ''NOT'' (or ''bit-flip'') gate]], <math>X = \begin{bmatrix} 0 & 1 \\ 1 & 0 \end{bmatrix} </math>, to her qubit, so that the resultant entangled quantum state becomes
:<math>
3. If Alice wants to send the classical two-bit string 10 to Bob, then she applies the [[Quantum logic gate#Phase shift gates|quantum ''phase-flip'' gate]] <math>Z = \begin{bmatrix} 1 & 0 \\ 0 & -1 \end{bmatrix}</math> to her qubit, so the resultant entangled state becomes
:<math>
4. If, instead, Alice wants to send the classical two-bit string 11 to Bob, then she applies the quantum gate <math>Z*X = iY = \begin{bmatrix} 0 & 1 \\ -1 & 0 \end{bmatrix} </math> to her qubit, so that the resultant entangled state becomes
:<math>
The matrices <math>X</math>
=== Sending ===
Line 81 ⟶ 80:
==== Example ====
For example, if the resultant entangled state (after the operations performed by Alice) was <math>
: <math>
<math>B_{01}'' = \frac{1}{\sqrt{2}} \left({\left(\frac{1}{\sqrt{2}}(|0 \rangle + |1 \rangle) \right) }_A \otimes▼
▲
</math>
For simplicity,
: <math>
\begin{align}
\
\left(
▲\frac{1}{\sqrt{2}}(|0 \rangle + |1 \rangle) \otimes |1\rangle +
\
▲\right)
\right) \\▼
&=
\
\left(
▲\frac{1}{\sqrt{2}}(|01 \rangle + |11 \rangle) +
\
\tfrac{1}{\sqrt{2}}(|01 \rangle + |11\rangle)
▲\right)
\right) =
\
\
= |01
\end{align}
</math>
Now, Bob has the basis state <math>|01\rangle</math>, so he knows that Alice wanted to send the
== Security ==
Line 122 ⟶ 125:
:<math>\omega \rightarrow (\Phi_x \otimes I)(\omega)</math>
where ''I'' denotes the identity map on subsystem 2. Alice then sends her subsystem to Bob, who performs a measurement on the combined system to recover the message. Let
<math display="block">p(y|x)=\langle F_y, (\Phi_x \otimes I)(\omega)\rangle\equiv \operatorname{Tr}[ F_y(\Phi_x \otimes I)(\omega)].</math>
:<math>\operatorname{Tr}\; (\Phi_x \otimes I)(\omega) \cdot F_y .</math>▼
Therefore, to achieve the desired transmission, we require that
▲
== Experimental ==
The protocol of superdense coding has been actualized in several experiments using different systems to varying levels of channel capacity and fidelities. In 2004, trapped [[beryllium
==References==
{{reflist}}
== Further reading ==
* Wilde, Mark M., 2017, [http://www.cambridge.org/us/academic/subjects/computer-science/cryptography-cryptology-and-coding/quantum-information-theory-2nd-edition Quantum Information Theory, Cambridge University Press], Also available at [https://arxiv.org/abs/1106.1445 eprint arXiv:1106.1145]
|