Examine individual changes
This page allows you to examine the variables generated by the Edit Filter for an individual change.
Variables generated for this change
Variable | Value |
---|---|
Edit count of the user (user_editcount ) | null |
Name of the user account (user_name ) | '76.119.239.104' |
Age of the user account (user_age ) | 0 |
Groups (including implicit) the user is in (user_groups ) | [
0 => '*'
] |
Rights that the user has (user_rights ) | [
0 => 'createaccount',
1 => 'read',
2 => 'edit',
3 => 'createtalk',
4 => 'writeapi',
5 => 'viewmywatchlist',
6 => 'editmywatchlist',
7 => 'viewmyprivateinfo',
8 => 'editmyprivateinfo',
9 => 'editmyoptions',
10 => 'abusefilter-log-detail',
11 => 'centralauth-merge',
12 => 'abusefilter-view',
13 => 'abusefilter-log',
14 => 'vipsscaler-test'
] |
Whether the user is editing from mobile app (user_app ) | false |
Whether or not a user is editing through the mobile interface (user_mobile ) | true |
Page ID (page_id ) | 3002956 |
Page namespace (page_namespace ) | 0 |
Page title without namespace (page_title ) | 'Superdense coding' |
Full page title (page_prefixedtitle ) | 'Superdense coding' |
Last ten users to contribute to the page (page_recent_contributors ) | [
0 => '2600:1700:A20:19E0:6041:5F9:8C91:5170',
1 => '2601:184:4700:CB59:8DB6:1AB:EACA:119A',
2 => 'BrownHairedGirl',
3 => 'Daviddwd',
4 => 'Amacle',
5 => 'Spintendo',
6 => '27.52.106.134',
7 => 'Djobes',
8 => '129.81.157.54',
9 => 'Baileyruesch'
] |
Action (action ) | 'edit' |
Edit summary/reason (summary ) | 'Removed superfluous ref. Probably self promotion' |
Old content model (old_content_model ) | 'wikitext' |
New content model (new_content_model ) | 'wikitext' |
Old page wikitext, before the edit (old_wikitext ) | '{{Use American English|date=January 2019}}{{Short description|Two-bit quantum communication protocol
}}
{{multiple issues|
{{lead too short|date=August 2013}}
{{more footnotes|date=August 2013}}
{{refimprove|date=August 2013}}
}}
[[File:Superdense coding.png|right|frame|When the sender and receiver share a Bell state, two classical bits can be packed into one qubit. See the section below "The protocol" for more details regarding this picture.]]
In [[quantum information theory]], '''superdense coding''' is a [[quantum communication]] protocol to transmit two classical bits of information (i.e., either 00, 01, 10 or 11) from a sender (often called Alice) to a receiver (often called Bob), by sending only one [[qubit]] from Alice to Bob, under the assumption of Alice and Bob pre-sharing an entangled state.<ref name="bennett1992communication">{{cite journal|last1=Bennett|first1=C.|last2=Wiesner|first2=S.|year=1992|title=Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states|journal=Physical Review Letters|volume=69|issue=20|pages=2881|doi=10.1103/PhysRevLett.69.2881|pmid=10046665}}</ref><ref name="NielsenChuang2010">{{cite book|url=https://books.google.com/books?id=-s4DEy7o-a0C|title=Quantum Computation and Quantum Information: 10th Anniversary Edition|last1=Nielsen|first1=Michael A.|last2=Chuang|first2=Isaac L.|date=9 December 2010|publisher=Cambridge University Press|isbn=978-1-139-49548-6|page=97|section=2.3 Application: superdense coding}}</ref> This protocol was first proposed by Bennett and [[Stephen Wiesner|Weisner]] in 1992 and experimentally actualized in 1996 by Mattel, Weinfurter, Kwiat and Zeilinger using entangled photon pairs.<ref name="NielsenChuang2010" /> By performing one of four [[quantum gate]] operations on the (entangled) qubit she possesses, Alice can prearrange the measurement Bob makes. After receiving Alice's qubit, operating on the pair and measuring both, Bob has two classical bits of information. If Alice and Bob do not already share entanglement before the protocol begins, then it is impossible to send two classical bits using 1 qubit, as this would violate [[Holevo's theorem]].
Superdense coding is the underlying principle of secure quantum secret coding. The necessity of having both qubits to decode the information being sent eliminates the risk of eavesdroppers intercepting messages.<ref name="Wang2005">{{Wang, C., Deng, F.-G., Li, Y.-S., Liu, X.-S., & Long, G. L. (2005). Quantum secure direct communication with high-dimension quantum superdense coding. Physical Review A, 71(4).}}</ref>
It can be thought of as the opposite of [[quantum teleportation]], in which one transfers one qubit from Alice to Bob by communicating two classical bits, as long as Alice and Bob have a pre-shared Bell pair.<ref name = NielsenChuang2010/>
== Overview ==
Suppose Alice wants to send two classical bits of information (00, 01, 10, or 11) to Bob using [[Qubit|qubits]] (instead of classical [[Bit|bits]]). To do this, an entangled state (e.g. a Bell state) is prepared using a Bell circuit or gate by Charlie, a third person. Charlie then sends one of these qubits (in the Bell state) to Alice and the other to Bob. Once Alice obtains her qubit in the entangled state, she applies a certain quantum gate to her qubit depending on which two-bit message (00, 01, 10 or 11) she wants to send to Bob. Her entangled qubit is then sent to Bob who, after applying the appropriate quantum gate and making a [[Measurement in quantum mechanics|measurement]], can retrieve the classical two-bit message. Alice must tell Bob which gate to apply after he receives the entangled qubit in order to obtain the correct classical bits.
== The protocol ==
The protocol can be split into five different steps: preparation, sharing, encoding, sending, and decoding.
=== Preparation ===
The protocol starts with the preparation of an entangled state, which is later shared between Alice and Bob. Suppose the following [[Bell state]]
:<math>|\Phi ^{+}\rangle = \frac{1}{\sqrt{2}} (|0\rangle_A \otimes |0\rangle_B + |1\rangle_A \otimes |1\rangle_B)</math>
where <math>\otimes </math> denotes the [[tensor product]], is prepared. Note: we can omit the tensor product symbol <math>\otimes</math>and write the Bell state as
:<math>|\Phi ^{+}\rangle = \frac{1}{\sqrt{2}}(|0_A0_B\rangle + |1_A1_B\rangle)</math>.
=== Sharing ===
After the preparation of the Bell state <math>|\Phi ^{+}\rangle</math>, the qubit denoted by subscript ''A'' is sent to Alice and the qubit denoted by subscript ''B'' is sent to Bob (note: this is the reason these states have subscripts). At this point, Alice and Bob may be in completely different locations (which might be very distant from each other).
There may be a long period of time between the preparation and sharing of the entangled state <math>|\Phi ^{+}\rangle</math> and the rest of the steps in the procedure.
=== Encoding ===
By applying a [[Quantum logic gate|quantum gate]] to her qubit locally, Alice can transform the entangled state <math>|\Phi ^{+}\rangle</math> into any of the four [[Bell states]] (including, of course, <math>|\Phi ^{+}\rangle</math>). Note that this process cannot "break" the entanglement between the two qubits.
Let's now describe which operations Alice needs to perform on her entangled qubit, depending on which classical two-bit message she wants to send to Bob. We'll later see why these specific operations are performed. There are four cases, which correspond to the four possible two-bit strings that Alice may want to send.
1. If Alice wants to send the classical two-bit string 00 to Bob, then she applies the identity quantum gate, <math>\mathbb{I} = \begin{bmatrix} 1 & 0 \\ 0 & 1\end{bmatrix}</math>, to her qubit, so that it remains unchanged. The resultant entangled state is then
: <math>|\Phi ^{+}\rangle := |B_{00}\rangle = \frac{1}{\sqrt{2}}(|0_A0_B\rangle + |1_A1_B\rangle)</math>
In other words, the entangled state shared between Alice and Bob has not changed, i.e. it is still <math>|\Phi ^{+}\rangle</math>. The notation <math>|B_{00}\rangle</math> is also used to remind us of the fact that Alice wants to send the two-bit string 00.
2. If Alice wants to send the classical two-bit string 10 to Bob, then she applies the [[Quantum logic gate|quantum ''phase-flip'' gate]] <math>Z = \begin{bmatrix} 1 & 0 \\ 0 & -1 \end{bmatrix}</math> to her qubit, so the resultant entangled state becomes
: <math>|\Phi ^{-}\rangle := |B_{10}\rangle = \frac{1}{\sqrt{2}}(|0_A0_B\rangle - |1_A1_B\rangle)</math>
3. If Alice wants to send the classical two-bit string 01 to Bob, then she applies the [[Quantum logic gate|quantum ''NOT'' (or ''bit-flip'') gate]], <math>X = \begin{bmatrix} 0 & 1 \\ 1 & 0 \end{bmatrix} </math>, to her qubit, so that the resultant entangled quantum state becomes
: <math> |\Psi ^{+}\rangle := |B_{01}\rangle = \frac{1}{\sqrt{2}}(|1_A0_B\rangle + |0_A1_B\rangle)</math>
4. If, instead, Alice wants to send the classical two-bit string 11 to Bob, then she applies the quantum gate <math>Z*X</math> to her qubit, so that the resultant entangled state becomes
:<math>|\Psi ^{-}\rangle := |B_{11}\rangle = \frac{1}{\sqrt{2}}(|0_A1_B\rangle -|1_A0_B\rangle ) </math>
The matrices <math>X</math> and <math>Z</math> are two of the [[Pauli matrices]]. The quantum states <math>|\Phi ^{+}\rangle</math>, <math>|\Psi ^{+}\rangle</math>, <math>|\Phi ^{-}\rangle</math> and <math>|\Psi ^{-}\rangle</math> (or, respectively, <math>B_{00}, B_{01}, B_{10}</math> and <math>B_{11}</math>) are the [[Bell states]].
=== Sending ===
After having performed one of the operations described above, Alice can send her entangled qubit to Bob using a [[quantum network]] through some conventional physical medium.
=== Decoding ===
In order for Bob to find out which classical bits Alice sent he will perform the [[Controlled NOT gate|CNOT]] unitary operation, with A as control qubit and B as target qubit. Then, he will perform <math>H\otimes I</math> unitary operation on the entangled qubit A. In other words, the Hadamard quantum gate H is only applied to A (see the figure above).
* If the resultant entangled state was <math>B_{00}</math> then after the application of the above unitary operations the entangled state will become <math>|00\rangle</math>
* If the resultant entangled state was <math>B_{01}</math> then after the application of the above unitary operations the entangled state will become <math>|01\rangle</math>
* If the resultant entangled state was <math>B_{10}</math> then after the application of the above unitary operations the entangled state will become <math>|10\rangle</math>
* If the resultant entangled state was <math>B_{11}</math> then after the application of the above unitary operations the entangled state will become <math>|11\rangle</math>
These operations performed by Bob can be seen as a measurement which projects the entangled state onto one of the four two-qubit basis vectors <math>|00 \rangle, |01 \rangle, |10 \rangle</math> or <math>|11 \rangle</math> (as you can see from the outcomes and the example below).
==== Example ====
For example, if the resultant entangled state (after the operations performed by Alice) was <math>|\Psi ^{+}\rangle := B_{01} = \frac{1}{\sqrt{2}}(|1_A0_B\rangle + |0_A1_B\rangle)</math>, then a CNOT with A as control bit and B as target bit will change <math>B_{01}</math> to become <math>B_{01}' = \frac{1}{\sqrt{2}}(|1_A1_B\rangle + |0_A1_B\rangle)</math>. Now, the Hadamard gate is applied only to A, to obtain
<math>B_{01}'' = \frac{1}{\sqrt{2}} \left({\left(\frac{1}{\sqrt{2}}(|0 \rangle - |1 \rangle) \right) }_A \otimes
|1_B\rangle + {\left(\frac{1}{\sqrt{2}}(|0 \rangle + |1 \rangle) \right) }_A \otimes
|1_B\rangle \right)</math>
For simplicity, let's get rid of the subscripts, so we have
<math>B_{01}'' =
\frac{1}{\sqrt{2}}
\left(
\frac{1}{\sqrt{2}}(|0 \rangle - |1 \rangle) \otimes |1\rangle +
\frac{1}{\sqrt{2}}(|0 \rangle + |1 \rangle) \otimes |1\rangle
\right)
=
\frac{1}{\sqrt{2}}
\left(
\frac{1}{\sqrt{2}}(|01 \rangle - |11 \rangle) +
\frac{1}{\sqrt{2}}(|01 \rangle + |11 \rangle)
\right)
=
\frac{1}{2}|01 \rangle - \frac{1}{2}|11 \rangle +
\frac{1}{2}|01 \rangle + \frac{1}{2} |11 \rangle
= |01 \rangle
</math>
Now, Bob has the basis state <math>|01 \rangle</math>, so he knows that Alice wanted to send the two-bit string 01.
== Security ==
Superdense coding is a form of secure quantum communication.<ref name="Wang2005" /> If an eavesdropper, which may be referred to as Eve, intercepts Alice's qubit en route to Bob, all that is obtained by Eve is part of an entangled state. Without access to Bob's qubit, Eve is unable to get any information from Alice's qubit. A third party is unable to eavesdrop on information being communicated through superdense coding and an attempt to measure either qubit would collapse the state of that qubit and alert Bob and Alice.
== General dense coding scheme ==
General dense coding schemes can be formulated in the language used to describe [[quantum channel]]s. Alice and Bob share a maximally entangled state ''ω''. Let the subsystems initially possessed by Alice and Bob be labeled 1 and 2, respectively. To transmit the message ''x'', Alice applies an appropriate channel
:<math>\; \Phi_x</math>
on subsystem 1. On the combined system, this is effected by
:<math>\omega \rightarrow (\Phi_x \otimes I)(\omega)</math>
where ''I'' denotes the identity map on subsystem 2. Alice then sends her subsystem to Bob, who performs a measurement on the combined system to recover the message. Let the ''effects'' of Bob's measurement be ''F<sub>y</sub>''. The probability that Bob's measuring apparatus registers the message ''y'' is
:<math>\operatorname{Tr}\; (\Phi_x \otimes I)(\omega) \cdot F_y .</math>
Therefore, to achieve the desired transmission, we require that
:<math>\operatorname{Tr}\; (\Phi_x \otimes I)(\omega) \cdot F_y = \delta_{xy}</math>
where ''δ<sub>xy</sub>'' is the [[Kronecker delta]].
== Experimental ==
The protocol of superdense coding has been actualized in several experiments using different systems to varying levels of channel capacity and fidelities. In 2004, trapped beryllium 9 ions were used in a maximally entangled state to achieve a channel capacity of 1.16 with a fidelity of 0.85<ref name="Schaetz2004">{{Schaetz, T., Barrett, M. D., Leibfried, D., Chiaverini, J., Britton, J., Itano, W. M., … Wineland, D. J. (2004). Quantum Dense Coding with Atomic Qubits. Physical Review Letters, 93(4).}}</ref>. In 2017, a channel capacity of 1.665 was achieved with a fidelity of 0.87 through optical fibers<ref name="William2017">{{Williams, B. P., Sadlier, R. J., & Humble, T. S. (2017). Superdense Coding over Optical Fiber Links with Complete Bell-State Measurements. Physical Review Letters, 118(5).}}</ref>. High dimensional ququarts were used to exceed a channel capacity of 2, at 2.09 with a fidelity of 0.98<ref name="Hu2018">{{Hu, X.-M., Guo, Y., Liu, B.-H., Huang, Y.-F., Li, C.-F., & Guo, G.-C. (2018). Beating the channel capacity limit for superdense coding with entangled ququarts. Science Advances, 4(7), eaat9304.}}</ref>. Nuclear Magnetic Resonance (NMR) has also been used to share among three parties<ref name="Wei2004">{{Wei, D., Yang, X., Luo, J., Sun, X., Zeng, X., & Liu, M. (2004). NMR experimental implementation of three-parties quantum superdense coding. Chinese Science Bulletin, 49(5), 423–426.}}</ref>.
==References==
{{reflist}}
* Wilde, Mark M., 2017, [http://www.cambridge.org/us/academic/subjects/computer-science/cryptography-cryptology-and-coding/quantum-information-theory-2nd-edition Quantum Information Theory, Cambridge University Press], Also available at [https://arxiv.org/abs/1106.1445 eprint arXiv:1106.1145]
==External links==
* [http://www-inst.eecs.berkeley.edu/~cs191/fa09/lectures/lecture6_fa09.pdf Qubits, Quantum Mechanics and Computers Course Notes]
* {{YouTube | w5rCn593Dig| Superdense coding: how to send two bits using one qubit }} by [[Michael Nielsen]]
{{quantum computing}}
[[Category:Quantum information science]]' |
New page wikitext, after the edit (new_wikitext ) | '{{Use American English|date=January 2019}}{{Short description|Two-bit quantum communication protocol
}}
{{multiple issues|
{{lead too short|date=August 2013}}
{{more footnotes|date=August 2013}}
{{refimprove|date=August 2013}}
}}
[[File:Superdense coding.png|right|frame|When the sender and receiver share a Bell state, two classical bits can be packed into one qubit. See the section below "The protocol" for more details regarding this picture.]]
In [[quantum information theory]], '''superdense coding''' is a [[quantum communication]] protocol to transmit two classical bits of information (i.e., either 00, 01, 10 or 11) from a sender (often called Alice) to a receiver (often called Bob), by sending only one [[qubit]] from Alice to Bob, under the assumption of Alice and Bob pre-sharing an entangled state.<ref name="bennett1992communication">{{cite journal|last1=Bennett|first1=C.|last2=Wiesner|first2=S.|year=1992|title=Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states|journal=Physical Review Letters|volume=69|issue=20|pages=2881|doi=10.1103/PhysRevLett.69.2881|pmid=10046665}}</ref><ref name="NielsenChuang2010">{{cite book|url=https://books.google.com/books?id=-s4DEy7o-a0C|title=Quantum Computation and Quantum Information: 10th Anniversary Edition|last1=Nielsen|first1=Michael A.|last2=Chuang|first2=Isaac L.|date=9 December 2010|publisher=Cambridge University Press|isbn=978-1-139-49548-6|page=97|section=2.3 Application: superdense coding}}</ref> This protocol was first proposed by Bennett and [[Stephen Wiesner|Weisner]] in 1992 and experimentally actualized in 1996 by Mattel, Weinfurter, Kwiat and Zeilinger using entangled photon pairs.<ref name="NielsenChuang2010" /> By performing one of four [[quantum gate]] operations on the (entangled) qubit she possesses, Alice can prearrange the measurement Bob makes. After receiving Alice's qubit, operating on the pair and measuring both, Bob has two classical bits of information. If Alice and Bob do not already share entanglement before the protocol begins, then it is impossible to send two classical bits using 1 qubit, as this would violate [[Holevo's theorem]].
Superdense coding is the underlying principle of secure quantum secret coding. The necessity of having both qubits to decode the information being sent eliminates the risk of eavesdroppers intercepting messages.<ref name="Wang2005">{{Wang, C., Deng, F.-G., Li, Y.-S., Liu, X.-S., & Long, G. L. (2005). Quantum secure direct communication with high-dimension quantum superdense coding. Physical Review A, 71(4).}}</ref>
It can be thought of as the opposite of [[quantum teleportation]], in which one transfers one qubit from Alice to Bob by communicating two classical bits, as long as Alice and Bob have a pre-shared Bell pair.<ref name = NielsenChuang2010/>
== Overview ==
Suppose Alice wants to send two classical bits of information (00, 01, 10, or 11) to Bob using [[Qubit|qubits]] (instead of classical [[Bit|bits]]). To do this, an entangled state (e.g. a Bell state) is prepared using a Bell circuit or gate by Charlie, a third person. Charlie then sends one of these qubits (in the Bell state) to Alice and the other to Bob. Once Alice obtains her qubit in the entangled state, she applies a certain quantum gate to her qubit depending on which two-bit message (00, 01, 10 or 11) she wants to send to Bob. Her entangled qubit is then sent to Bob who, after applying the appropriate quantum gate and making a [[Measurement in quantum mechanics|measurement]], can retrieve the classical two-bit message. Alice must tell Bob which gate to apply after he receives the entangled qubit in order to obtain the correct classical bits.
== The protocol ==
The protocol can be split into five different steps: preparation, sharing, encoding, sending, and decoding.
=== Preparation ===
The protocol starts with the preparation of an entangled state, which is later shared between Alice and Bob. Suppose the following [[Bell state]]
:<math>|\Phi ^{+}\rangle = \frac{1}{\sqrt{2}} (|0\rangle_A \otimes |0\rangle_B + |1\rangle_A \otimes |1\rangle_B)</math>
where <math>\otimes </math> denotes the [[tensor product]], is prepared. Note: we can omit the tensor product symbol <math>\otimes</math>and write the Bell state as
:<math>|\Phi ^{+}\rangle = \frac{1}{\sqrt{2}}(|0_A0_B\rangle + |1_A1_B\rangle)</math>.
=== Sharing ===
After the preparation of the Bell state <math>|\Phi ^{+}\rangle</math>, the qubit denoted by subscript ''A'' is sent to Alice and the qubit denoted by subscript ''B'' is sent to Bob (note: this is the reason these states have subscripts). At this point, Alice and Bob may be in completely different locations (which might be very distant from each other).
There may be a long period of time between the preparation and sharing of the entangled state <math>|\Phi ^{+}\rangle</math> and the rest of the steps in the procedure.
=== Encoding ===
By applying a [[Quantum logic gate|quantum gate]] to her qubit locally, Alice can transform the entangled state <math>|\Phi ^{+}\rangle</math> into any of the four [[Bell states]] (including, of course, <math>|\Phi ^{+}\rangle</math>). Note that this process cannot "break" the entanglement between the two qubits.
Let's now describe which operations Alice needs to perform on her entangled qubit, depending on which classical two-bit message she wants to send to Bob. We'll later see why these specific operations are performed. There are four cases, which correspond to the four possible two-bit strings that Alice may want to send.
1. If Alice wants to send the classical two-bit string 00 to Bob, then she applies the identity quantum gate, <math>\mathbb{I} = \begin{bmatrix} 1 & 0 \\ 0 & 1\end{bmatrix}</math>, to her qubit, so that it remains unchanged. The resultant entangled state is then
: <math>|\Phi ^{+}\rangle := |B_{00}\rangle = \frac{1}{\sqrt{2}}(|0_A0_B\rangle + |1_A1_B\rangle)</math>
In other words, the entangled state shared between Alice and Bob has not changed, i.e. it is still <math>|\Phi ^{+}\rangle</math>. The notation <math>|B_{00}\rangle</math> is also used to remind us of the fact that Alice wants to send the two-bit string 00.
2. If Alice wants to send the classical two-bit string 10 to Bob, then she applies the [[Quantum logic gate|quantum ''phase-flip'' gate]] <math>Z = \begin{bmatrix} 1 & 0 \\ 0 & -1 \end{bmatrix}</math> to her qubit, so the resultant entangled state becomes
: <math>|\Phi ^{-}\rangle := |B_{10}\rangle = \frac{1}{\sqrt{2}}(|0_A0_B\rangle - |1_A1_B\rangle)</math>
3. If Alice wants to send the classical two-bit string 01 to Bob, then she applies the [[Quantum logic gate|quantum ''NOT'' (or ''bit-flip'') gate]], <math>X = \begin{bmatrix} 0 & 1 \\ 1 & 0 \end{bmatrix} </math>, to her qubit, so that the resultant entangled quantum state becomes
: <math> |\Psi ^{+}\rangle := |B_{01}\rangle = \frac{1}{\sqrt{2}}(|1_A0_B\rangle + |0_A1_B\rangle)</math>
4. If, instead, Alice wants to send the classical two-bit string 11 to Bob, then she applies the quantum gate <math>Z*X</math> to her qubit, so that the resultant entangled state becomes
:<math>|\Psi ^{-}\rangle := |B_{11}\rangle = \frac{1}{\sqrt{2}}(|0_A1_B\rangle -|1_A0_B\rangle ) </math>
The matrices <math>X</math> and <math>Z</math> are two of the [[Pauli matrices]]. The quantum states <math>|\Phi ^{+}\rangle</math>, <math>|\Psi ^{+}\rangle</math>, <math>|\Phi ^{-}\rangle</math> and <math>|\Psi ^{-}\rangle</math> (or, respectively, <math>B_{00}, B_{01}, B_{10}</math> and <math>B_{11}</math>) are the [[Bell states]].
=== Sending ===
After having performed one of the operations described above, Alice can send her entangled qubit to Bob using a [[quantum network]] through some conventional physical medium.
=== Decoding ===
In order for Bob to find out which classical bits Alice sent he will perform the [[Controlled NOT gate|CNOT]] unitary operation, with A as control qubit and B as target qubit. Then, he will perform <math>H\otimes I</math> unitary operation on the entangled qubit A. In other words, the Hadamard quantum gate H is only applied to A (see the figure above).
* If the resultant entangled state was <math>B_{00}</math> then after the application of the above unitary operations the entangled state will become <math>|00\rangle</math>
* If the resultant entangled state was <math>B_{01}</math> then after the application of the above unitary operations the entangled state will become <math>|01\rangle</math>
* If the resultant entangled state was <math>B_{10}</math> then after the application of the above unitary operations the entangled state will become <math>|10\rangle</math>
* If the resultant entangled state was <math>B_{11}</math> then after the application of the above unitary operations the entangled state will become <math>|11\rangle</math>
These operations performed by Bob can be seen as a measurement which projects the entangled state onto one of the four two-qubit basis vectors <math>|00 \rangle, |01 \rangle, |10 \rangle</math> or <math>|11 \rangle</math> (as you can see from the outcomes and the example below).
==== Example ====
For example, if the resultant entangled state (after the operations performed by Alice) was <math>|\Psi ^{+}\rangle := B_{01} = \frac{1}{\sqrt{2}}(|1_A0_B\rangle + |0_A1_B\rangle)</math>, then a CNOT with A as control bit and B as target bit will change <math>B_{01}</math> to become <math>B_{01}' = \frac{1}{\sqrt{2}}(|1_A1_B\rangle + |0_A1_B\rangle)</math>. Now, the Hadamard gate is applied only to A, to obtain
<math>B_{01}'' = \frac{1}{\sqrt{2}} \left({\left(\frac{1}{\sqrt{2}}(|0 \rangle - |1 \rangle) \right) }_A \otimes
|1_B\rangle + {\left(\frac{1}{\sqrt{2}}(|0 \rangle + |1 \rangle) \right) }_A \otimes
|1_B\rangle \right)</math>
For simplicity, let's get rid of the subscripts, so we have
<math>B_{01}'' =
\frac{1}{\sqrt{2}}
\left(
\frac{1}{\sqrt{2}}(|0 \rangle - |1 \rangle) \otimes |1\rangle +
\frac{1}{\sqrt{2}}(|0 \rangle + |1 \rangle) \otimes |1\rangle
\right)
=
\frac{1}{\sqrt{2}}
\left(
\frac{1}{\sqrt{2}}(|01 \rangle - |11 \rangle) +
\frac{1}{\sqrt{2}}(|01 \rangle + |11 \rangle)
\right)
=
\frac{1}{2}|01 \rangle - \frac{1}{2}|11 \rangle +
\frac{1}{2}|01 \rangle + \frac{1}{2} |11 \rangle
= |01 \rangle
</math>
Now, Bob has the basis state <math>|01 \rangle</math>, so he knows that Alice wanted to send the two-bit string 01.
== Security ==
Superdense coding is a form of secure quantum communication.<ref name="Wang2005" /> If an eavesdropper, which may be referred to as Eve, intercepts Alice's qubit en route to Bob, all that is obtained by Eve is part of an entangled state. Without access to Bob's qubit, Eve is unable to get any information from Alice's qubit. A third party is unable to eavesdrop on information being communicated through superdense coding and an attempt to measure either qubit would collapse the state of that qubit and alert Bob and Alice.
== General dense coding scheme ==
General dense coding schemes can be formulated in the language used to describe [[quantum channel]]s. Alice and Bob share a maximally entangled state ''ω''. Let the subsystems initially possessed by Alice and Bob be labeled 1 and 2, respectively. To transmit the message ''x'', Alice applies an appropriate channel
:<math>\; \Phi_x</math>
on subsystem 1. On the combined system, this is effected by
:<math>\omega \rightarrow (\Phi_x \otimes I)(\omega)</math>
where ''I'' denotes the identity map on subsystem 2. Alice then sends her subsystem to Bob, who performs a measurement on the combined system to recover the message. Let the ''effects'' of Bob's measurement be ''F<sub>y</sub>''. The probability that Bob's measuring apparatus registers the message ''y'' is
:<math>\operatorname{Tr}\; (\Phi_x \otimes I)(\omega) \cdot F_y .</math>
Therefore, to achieve the desired transmission, we require that
:<math>\operatorname{Tr}\; (\Phi_x \otimes I)(\omega) \cdot F_y = \delta_{xy}</math>
where ''δ<sub>xy</sub>'' is the [[Kronecker delta]].
== Experimental ==
The protocol of superdense coding has been actualized in several experiments using different systems to varying levels of channel capacity and fidelities. In 2004, trapped beryllium 9 ions were used in a maximally entangled state to achieve a channel capacity of 1.16 with a fidelity of 0.85<ref name="Schaetz2004">{{Schaetz, T., Barrett, M. D., Leibfried, D., Chiaverini, J., Britton, J., Itano, W. M., … Wineland, D. J. (2004). Quantum Dense Coding with Atomic Qubits. Physical Review Letters, 93(4).}}</ref>. In 2017, a channel capacity of 1.665 was achieved with a fidelity of 0.87 through optical fibers<ref name="William2017">{{Williams, B. P., Sadlier, R. J., & Humble, T. S. (2017). Superdense Coding over Optical Fiber Links with Complete Bell-State Measurements. Physical Review Letters, 118(5).}}</ref>. High dimensional ququarts were used to exceed a channel capacity of 2, at 2.09 with a fidelity of 0.98<ref name="Hu2018">{{Hu, X.-M., Guo, Y., Liu, B.-H., Huang, Y.-F., Li, C.-F., & Guo, G.-C. (2018). Beating the channel capacity limit for superdense coding with entangled ququarts. Science Advances, 4(7), eaat9304.}}</ref>. Nuclear Magnetic Resonance (NMR) has also been used to share among three parties<ref name="Wei2004">{{Wei, D., Yang, X., Luo, J., Sun, X., Zeng, X., & Liu, M. (2004). NMR experimental implementation of three-parties quantum superdense coding. Chinese Science Bulletin, 49(5), 423–426.}}</ref>.
==External links==
* [http://www-inst.eecs.berkeley.edu/~cs191/fa09/lectures/lecture6_fa09.pdf Qubits, Quantum Mechanics and Computers Course Notes]
* {{YouTube | w5rCn593Dig| Superdense coding: how to send two bits using one qubit }} by [[Michael Nielsen]]
{{quantum computing}}
[[Category:Quantum information science]]' |
Unified diff of changes made by edit (edit_diff ) | '@@ -134,9 +134,4 @@
== Experimental ==
The protocol of superdense coding has been actualized in several experiments using different systems to varying levels of channel capacity and fidelities. In 2004, trapped beryllium 9 ions were used in a maximally entangled state to achieve a channel capacity of 1.16 with a fidelity of 0.85<ref name="Schaetz2004">{{Schaetz, T., Barrett, M. D., Leibfried, D., Chiaverini, J., Britton, J., Itano, W. M., … Wineland, D. J. (2004). Quantum Dense Coding with Atomic Qubits. Physical Review Letters, 93(4).}}</ref>. In 2017, a channel capacity of 1.665 was achieved with a fidelity of 0.87 through optical fibers<ref name="William2017">{{Williams, B. P., Sadlier, R. J., & Humble, T. S. (2017). Superdense Coding over Optical Fiber Links with Complete Bell-State Measurements. Physical Review Letters, 118(5).}}</ref>. High dimensional ququarts were used to exceed a channel capacity of 2, at 2.09 with a fidelity of 0.98<ref name="Hu2018">{{Hu, X.-M., Guo, Y., Liu, B.-H., Huang, Y.-F., Li, C.-F., & Guo, G.-C. (2018). Beating the channel capacity limit for superdense coding with entangled ququarts. Science Advances, 4(7), eaat9304.}}</ref>. Nuclear Magnetic Resonance (NMR) has also been used to share among three parties<ref name="Wei2004">{{Wei, D., Yang, X., Luo, J., Sun, X., Zeng, X., & Liu, M. (2004). NMR experimental implementation of three-parties quantum superdense coding. Chinese Science Bulletin, 49(5), 423–426.}}</ref>.
-
-==References==
-{{reflist}}
-
-* Wilde, Mark M., 2017, [http://www.cambridge.org/us/academic/subjects/computer-science/cryptography-cryptology-and-coding/quantum-information-theory-2nd-edition Quantum Information Theory, Cambridge University Press], Also available at [https://arxiv.org/abs/1106.1445 eprint arXiv:1106.1145]
==External links==
' |
New page size (new_size ) | 13838 |
Old page size (old_size ) | 14162 |
Size change in edit (edit_delta ) | -324 |
Lines added in edit (added_lines ) | [] |
Lines removed in edit (removed_lines ) | [
0 => false,
1 => '==References==',
2 => '{{reflist}}',
3 => false,
4 => '* Wilde, Mark M., 2017, [http://www.cambridge.org/us/academic/subjects/computer-science/cryptography-cryptology-and-coding/quantum-information-theory-2nd-edition Quantum Information Theory, Cambridge University Press], Also available at [https://arxiv.org/abs/1106.1445 eprint arXiv:1106.1145]'
] |
Whether or not the change was made through a Tor exit node (tor_exit_node ) | false |
Unix timestamp of change (timestamp ) | 1560136371 |