5
Quantum state sharing using linear optical elements q Yan Xia * , Jie Song, He-Shan Song School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024, China article info Article history: Received 22 April 2008 Accepted 16 June 2008 PACS: 03.67.Lx 42.65.Lm Keywords: Quantum state sharing Optical elements Linear optical abstract Motivated by protocols [G. Gordon, G. Rigolin, Phys. Rev. A 73 (2006) 062316] and [N.B. An, G. Mahler, Phys. Lett. A 365 (2007) 70], we propose a linear optical protocol for quantum state sharing of polariza- tion entangled state in terms optical elements. Our protocol can realize a near-complete quantum state sharing of polarization entangled state with arbitrary coefficients, and it is possible to achieve unity fidel- ity transfer of the state if the parties collaborate. This protocol can also be generalized to the multi-party system. Ó 2008 Elsevier B.V. All rights reserved. No-cloning theorem forbids a perfect copy of an arbitrary un- known quantum state. How to interchange different resources has ever been a question in quantum computation and quantum information. Using the theory of quantum mechanics in the field of information in the recent years has produced many interesting developments, such as quantum teleportation [1,2], quantum cryp- tography [3,4], quantum secret sharing [5], and so on [6–8]. Quan- tum secret sharing (QSS), an important branch of quantum communication, is the generalization of classical secret sharing [9] into a quantum scenario and has attracted much attention [10–17]. Different from secret sharing of classical information via quantum channels, Cleve et al. [18] proposed a secret sharing of quantum state protocol, which was called quantum state sharing (QSTS) by Lance et al. [19]. We term this quantum state sharing to differentiate from the quantum secret sharing of classical infor- mation. In (k; n) threshold quantum state sharing [18], the boss (Alice) node encodes a secret state into an n-party entangled state and distributes it to n players nodes. Any k players (the access structure) can collaborate to retrieve the quantum state, whereas the remaining n k players (the adversary structure), even when conspiring, acquire nothing. This scheme provides quantum infor- mation networks with a secure framework for distributed quan- tum computation and quantum communication. The important feature of such a scheme is that at the end of the protocol the infor- mation contained in the transferred state is completely available to only one of the parties and Alice is free to choose whether Bob or Charlie will be the receiver. Later, quantum state sharing has received much attention both theoretically and experimentally [18–22] in recent years due to its important applications in quantum communications. For example, in 2004, Lance et al. [19] demonstrated a multipartite protocol to securely distribute and reconstruct a quantum state. In their proto- col, a secret quantum state is encoded into a tripartite entangled state and distributed to three players. These quantum state sharing protocols to date are based on maximally bipartite or multipartite entangled states. But in a realistic situation, however, decoherence and noise degrade the channel and we do not have a maximally entangled state anymore. To overcome this flaw, there are three approaches [23] to quantum state sharing that the sender and the receivers can take: (a) one way out of this problem is to employ quantum distillation protocol [24], which allows us to obtain a maximally entangled state from a large ensemble of partially states. But quantum distillation only achieves a maximally entan- gled state asymptotically. Thus, for finite runs of the distillation protocol we always obtain an almost maximally entangled state. The probability for concentration is less than 1, but the fidelity of the teleported state using the concentrated pair as the quantum channel is 1; (b) the sender may perform the standard Bell-state measurements directly with the nonmaximally entangled states and let the receiver apply an auxiliary unitary transformation with the aid of an auxiliary qubit to obtain the desired state probabilis- tically [2]. The success probability is less than 1, but the receiver knows whether he(she) obtained the desired state or not by 0030-4018/$ - see front matter Ó 2008 Elsevier B.V. All rights reserved. doi:10.1016/j.optcom.2008.06.028 q The project supported by National Natural Science Foundation of China under Grant No. 10575017. * Corresponding author. Tel.: +86 411 84706201. E-mail addresses: [email protected] (Y. Xia), [email protected] (H.S. Song). Optics Communications 281 (2008) 4946–4950 Contents lists available at ScienceDirect Optics Communications journal homepage: www.elsevier.com/locate/optcom

Quantum state sharing using linear optical elements

  • Upload
    yan-xia

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Quantum state sharing using linear optical elements

Optics Communications 281 (2008) 4946–4950

Contents lists available at ScienceDirect

Optics Communications

journal homepage: www.elsevier .com/locate/optcom

Quantum state sharing using linear optical elements q

Yan Xia *, Jie Song, He-Shan SongSchool of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024, China

a r t i c l e i n f o

Article history:Received 22 April 2008Accepted 16 June 2008

PACS:03.67.Lx42.65.Lm

Keywords:Quantum state sharingOptical elementsLinear optical

0030-4018/$ - see front matter � 2008 Elsevier B.V. Adoi:10.1016/j.optcom.2008.06.028

q The project supported by National Natural SciencGrant No. 10575017.

* Corresponding author. Tel.: +86 411 84706201.E-mail addresses: [email protected] (Y. Xia), hsson

a b s t r a c t

Motivated by protocols [G. Gordon, G. Rigolin, Phys. Rev. A 73 (2006) 062316] and [N.B. An, G. Mahler,Phys. Lett. A 365 (2007) 70], we propose a linear optical protocol for quantum state sharing of polariza-tion entangled state in terms optical elements. Our protocol can realize a near-complete quantum statesharing of polarization entangled state with arbitrary coefficients, and it is possible to achieve unity fidel-ity transfer of the state if the parties collaborate. This protocol can also be generalized to the multi-partysystem.

� 2008 Elsevier B.V. All rights reserved.

No-cloning theorem forbids a perfect copy of an arbitrary un-known quantum state. How to interchange different resourceshas ever been a question in quantum computation and quantuminformation. Using the theory of quantum mechanics in the fieldof information in the recent years has produced many interestingdevelopments, such as quantum teleportation [1,2], quantum cryp-tography [3,4], quantum secret sharing [5], and so on [6–8]. Quan-tum secret sharing (QSS), an important branch of quantumcommunication, is the generalization of classical secret sharing[9] into a quantum scenario and has attracted much attention[10–17]. Different from secret sharing of classical information viaquantum channels, Cleve et al. [18] proposed a secret sharing ofquantum state protocol, which was called quantum state sharing(QSTS) by Lance et al. [19]. We term this quantum state sharingto differentiate from the quantum secret sharing of classical infor-mation. In (k; n) threshold quantum state sharing [18], the boss(Alice) node encodes a secret state into an n-party entangled stateand distributes it to n players nodes. Any k players (the accessstructure) can collaborate to retrieve the quantum state, whereasthe remaining n � k players (the adversary structure), even whenconspiring, acquire nothing. This scheme provides quantum infor-mation networks with a secure framework for distributed quan-tum computation and quantum communication. The importantfeature of such a scheme is that at the end of the protocol the infor-

ll rights reserved.

e Foundation of China under

[email protected] (H.S. Song).

mation contained in the transferred state is completely available toonly one of the parties and Alice is free to choose whether Bob orCharlie will be the receiver.

Later, quantum state sharing has received much attention boththeoretically and experimentally [18–22] in recent years due to itsimportant applications in quantum communications. For example,in 2004, Lance et al. [19] demonstrated a multipartite protocol tosecurely distribute and reconstruct a quantum state. In their proto-col, a secret quantum state is encoded into a tripartite entangledstate and distributed to three players. These quantum state sharingprotocols to date are based on maximally bipartite or multipartiteentangled states. But in a realistic situation, however, decoherenceand noise degrade the channel and we do not have a maximallyentangled state anymore. To overcome this flaw, there are threeapproaches [23] to quantum state sharing that the sender andthe receivers can take: (a) one way out of this problem is to employquantum distillation protocol [24], which allows us to obtain amaximally entangled state from a large ensemble of partiallystates. But quantum distillation only achieves a maximally entan-gled state asymptotically. Thus, for finite runs of the distillationprotocol we always obtain an almost maximally entangled state.The probability for concentration is less than 1, but the fidelity ofthe teleported state using the concentrated pair as the quantumchannel is 1; (b) the sender may perform the standard Bell-statemeasurements directly with the nonmaximally entangled statesand let the receiver apply an auxiliary unitary transformation withthe aid of an auxiliary qubit to obtain the desired state probabilis-tically [2]. The success probability is less than 1, but the receiverknows whether he(she) obtained the desired state or not by

Page 2: Quantum state sharing using linear optical elements

Y. Xia et al. / Optics Communications 281 (2008) 4946–4950 4947

observing the state of the auxiliary qubit; (c) Alice may perform‘‘generalized measurements” upon the nonmaximally entangledpairs that distinguish nonorthogonal ‘‘Bell-type” states conclu-sively with a certain probability less than 1. For example, Gordonand Rigolin [25] present two interesting generalized quantum statesharing protocols where the channels are not maximally entangledstates. In this protocol, by properly choosing the measurement ba-sis it is possible to achieve unity fidelity transfer of the state if theparties collaborate.

It is this third approach we wish to study in detail here. In thispaper, inspired by the protocols of Gordon and Rigolin [25] and Anand Mahler [26], we present a linear optical protocol for quantumstate sharing in terms optical elements. The realization of this pro-tocol is appealing due to the fact that quantum state of light is ro-bust against the decoherence and photons are ideal carriers fortransmitting quantum information over long distances. The pres-ent case, however, holds an interesting advantage over the previ-ous case [29–38] in that the detectors do not need to distinguishbetween one and two photons.

Let us assume the sender Alice wants to transfer to the receivers(Bob and Charlie) the polarization state

j/i0 ¼ ajHi0 þ bjVi0; ð1Þ

where we encode the polarized photon states jHi and jVi as logiczero and one states, i.e., jHi ¼ j0i and jVi ¼ j1i, and a and b are com-plex coefficients to satisfy jaj2 þ jbj2 ¼ 1. Alice shares with Bob andCharlie the state [40]

jWiABC ¼ cos gjVHHiABC � sin gjHVViABC: ð2Þ

Mode A belongs to Alice, the second mode belongs to Bob, and thelast one to Charlie. The initial state can be written as

jUi0ABC ¼ j/0i � jWiABC: ð3Þ

(S1) The protocol begins when Alice implements a correspond-ing generalized Bell-type measurement. See Fig. 1 (Alice area) for apictorial representation of generalized Bell-type measurement aswell as of the whole protocol. The linear optical scheme that distin-guishes two of the Bell-type states jU�g iA0 ¼ cos gjViAjVi0�sin gjHiAjHi0 and jW�g iA0 ¼ cos gjViAjHi0 � sin gjHiAjVi0 consist oftwo beam splitters (one is 50/50 beam splitter ðBS1Þ, the otherbeam splitter ðBS2Þ of transmission coefficient t ¼ tan g), fourpolarizing beam splitters (PBS1, PBS2, PBS3, and PBS4), and fourdetectors (DE1, DE2, DF1, and DF2). The polarizing beam splitterstransmit vertically polarized photons ðjViÞ and reflect horizontallypolarized photons ðjHiÞ. In fact, one obtains through a straightfor-ward calculation that the state jUi0ABC is transformed, via the actionof PBS1, PBS2, PBS3, PBS4, BS1, and BS2, into the state

jUiEFYBC ¼12f½singðjViEjHiF � jHiFjViEÞj0iY þ

ffiffiffiffiffiffiffiffiffiffiffiffiffifficos 2g

pffiffiffi2p ðjHiEj0iF þ j0iEjHiFÞj1iY� � ðajHHiBC þ bjVViBCÞ � ½singðjVHiEj0iF

� j0iEjVHiFÞj0iY þffiffiffiffiffiffiffiffiffiffiffiffiffifficos 2g

pffiffiffi2p ðjHiEj0iF þ j0iEjHiFÞj1iY�ðajHHiBC � bjVViBCÞ

þffiffiffi2p

2½jVViEj0iF � j0iEjVViF � jHHiEj0iF þ j0iEjHHiF�j0iY

ffiffiffiffiffiffiffiffiffiffiffiffiffifficos 2g

pffiffiffi2p ðjViEj0iF þ j0iEjViFÞjViY

)ðbjHHiBC þ ajVViBCÞ

þ 1ffiffiffi2p ½jVViEj0iF � j0iEjVViF þ jHHiEj0iF � j0iEjHHiF�j0iY�

þffiffiffiffiffiffiffiffiffiffiffiffiffifficos 2g

pffiffiffi2p ðjViEj0iF þ j0iEjViFÞjViY

)ðbjHHiBC þ ajVViBCÞ; ð4Þ

where j0iE means that there is neither a vertically polarized nor ahorizontally polarized photon of mode E, jVHiE stands for the stateof one vertically polarized photon and one horizontally polarized

photon of mode E, and jVViE stands for the state of two verticallypolarized photons of mode E. It is clear from Eq. (4) that the tele-portation succeeds if detectors DE1 and DF2 (or DE2 and DF1) registera photon each or if detectors DE1 and DE2 (or DF1 and DF2) register aphoton each corresponding to the first square bracket (secondsquare bracket) of Eq. (4). All other measurement results corre-spond to inconclusive events. We show in Fig. 2 the success prob-ability as a function of j for this case is nearly 1/2 when g ¼ p=4.The present case, however, holds an interesting advantage over theprevious case in that there is no need for a detector to detect pho-tons of mode Y.

Alice measures modes 0 and A with detectors DE1, DE2, DF1, andDF2. We observe that neither Bob nor Charlie can recover the statein Eq. (1) in its exact form by performing any general operationsthemselves without communicating between themselves. Thoughthey have the amplitude information, that is not sufficient sincethe phase information is not available. In this case they must agreeto cooperate among themselves. Only by this way, one of them, notboth, can recover the desired state for the no-cloning theorem.

(S2) For concreteness, let us assume Alice assigns Charlie to re-cover the quantum state in Eq. (1) (The case when Bob is selected issimilar because of the Bob–Charlie symmetry in this problem andthe selection should not be learn beforehand by neither Bob norCharlie). Therefore, after measuring her two modes Alice tellsBob to let his mode B pass through a half-wave plate (HWP) [39](see Fig. 1 Bob area), whose action is given by transformationjHi ! 1ffiffi

2p ðjHi þ jViÞ and jVi ! 1ffiffi

2p ðjHi � jViÞ. After passing through

the HWP, the mode B is sent through another PBS (50/50 beamsplitter) and the outmodes 1 and 2 are detected by two conven-tional photon detectors D1 and D2. Alice and Bob then tell Charlietheir measurement outcomes. Depending on Alice’s and Bob’s re-sults Charlie implements a corresponding specific unitary opera-tion in terms optical elements to change the polarization state toEq. (1). If Charlie does not learn from Bob the outcome of thedetecting result his mode will be left in a mixed state for withoutthat information Charlie cannot know the phase of Alice’s mode.

For example, if Alice’s measurement result is that DE1 and DF2

register a photon each, see Table 1, so Bob and Charlie shareajHHiBC þ bjVViBC. Bob sent mode B pass through a half-wave plate(HWP). After passing through the HWP, one obtains the quantumstate of the system as

jWiBC ¼ jHiaðajHiC þ bjViCÞ þ jViaðajHiC � bjViCÞ: ð5Þ

Finally the mode a is sent through another PBS and the statebecomes

jWim ¼ jHi1ðajHiC þ bjViCÞ þ jVi2ðajHiC � bjViCÞ: ð6Þ

The outmodes 1 and 2 are detected by two conventional photondetectors D1 and D2. The conventional photon detector can only dis-tinguish between the presence and absence of photons, and no

Page 3: Quantum state sharing using linear optical elements

Source D1

D2

PBSHWP

DE1

DE2PBS1

PBS2

PBS4

PBS3

BS1

BS2

DF2

DF1

Alice

Bob

P1

Charlie

Y

0

a1

2

Fig. 1. Linear optical scheme for a quantum state sharing. The source station generates a nonmaximally entangled state Eq. (2). DE1, DE2, DF1, DF1, D1, and D2 are detectors,PBS1, PBS2, PBS3, PBS1, and PBS are polarizing beam splitters, BS1 is a 50/50 beam splitter, and BS2 is a beam splitter of transmission coefficient t ¼ tan g. HWP is a half-waveplate. P1 is a p=2-phase shifter.

4948 Y. Xia et al. / Optics Communications 281 (2008) 4946–4950

information on the exact number of photons can be obtained. Ifquantum efficiency of the detector is denoted by j, the positive-operator-valued measure for describing the conventional photondetector is given by

Yno

¼X1m¼0

ð1� jÞmjmihmj; ð7Þ

Yclick

¼ 1�Yno

¼X1m¼1

½1� ð1� jÞm�jmihmj: ð8Þ

We only consider the event that one of both detectors detects pho-tons and another does not register any photon. If the detector D1 de-tects photons and D2 does not register any photon, the state ofmode C is given by

qout ¼Tr1;2

Q1click

Q2nojWimhWj

� �Tr1;2;C

Q1click

Q2nojWimhWj

� � ; ð9Þ

0.2 0.4 0.6 0.8h

0.1

0.2

0.3

0.4

0.5

P

Fig. 2. Alice’s success detects probability P vs. g.

whereQi

j is a positive-operator-valued measure for the detectors Di

(i= 1,2). Substituting Eqs. (6)–(8) into Eq. (9), we obtain the exactform of the density operator of mode C

qout ¼ jjWiouthWj; ð10ÞjWouti ¼ ajHiC þ bjViC: ð11Þ

Otherwise, if the detector D1 does not detect any photon and D2 reg-isters one photon, the state of mode C is given by

qout ¼ jjW0iouthW0j; ð12Þ

jW0outi ¼ ajHiC � bjViC: ð13Þ

(S3) Then Bob tells his measurement results to Charlie. If detectorD1 registers one photon and detector D2 does not detect any photon,Charlie do noting and he can receiver the original state in Eq. (1); Ifdetector D2 registers one photon and detector D1 does not detectany photon, Charlie receives the state jW0outi ¼ ajHiC � bjViC, whichcan be transformed into Eq. (1) by applying a p=2-phase shifter P1

to change the sign of the polarization state jViC. The success prob-ability of obtaining Eq. (1) is j, which depends on the detector’s(D1, D2) efficiency. So Charlie can recover the original state in Eq.(1) with the help of Bob, and the total success probability isP ¼ j sin2 g. We can see from Fig. 3 that the total success probabil-

Table 1Corresponding relations among Alice’s measurement results, Bob’s measurementresult, Charlie’s state, and Charlie’s operation

Alice’s measurementresults

Bob’s measurementresult

Charlie’sstate

Charlie’soperation

DE1, DF2 or DE2, DF1 D2 ajHiC � bjViC PD1 ajHiC þ bjViC

DE1, DE2 or DF1, DF2 D2 ajHiC þ bjViCD1 ajHiC � bjViC P

Page 4: Quantum state sharing using linear optical elements

00.25

0.5

0.75

1

k0

0.2

0.4

0.6

h

0

0.2

0.4P

00.25

0.5

0.75k

Fig. 3. The total success probability P vs. g and j.

Y. Xia et al. / Optics Communications 281 (2008) 4946–4950 4949

ity increases with increasing the quantum efficiency j of the detec-tor and the transmission coefficient g of the BS2.

This protocol can also be generalized to multi-party system, forexample:

Case 1: we generalize the two-party secret sharing of 1-qubitpolarization state protocol to M-qubit state case, where M P 2. Itcan be seen as M single qubit protocols implemented at once orin sequence. Suppose that Alice has an arbitrary M-qubit secretpolarization state that she would like to send to Bob and Charliein such a way that they must cooperate in order to faithfully recon-struct this state. The secret state can generally be represented as(Just like the original N-qubit state in [27])

jSiM ¼ �M

i¼1NiðxijHi þ yijViÞ; ð14Þ

where xi 6¼ xiþ1, and yi 6¼ yiþ1. Now Alice, Bob, and Charlie need shar-ing of M 3-qubit polarization state channels, which is given by MGHZ-type polarization state with different degrees of entanglement(in general mi 6¼ mj, for i 6¼ J) j/channeli ¼ �N

i¼1j/AmiBmi

Cmii. For each

M=3

00.2

0.40.6h

0

0.25

0.5

0.75

1

k0

0.0050.01

0.015P

00.2

0.40.6h

P

M=1

00.2

0.40.6h

0

0.25

0.5

0.75

1

k

0

0.2

0.4P

00.2

0.40.6h

P

Fig. 4. The total success probability

polarization entangled GHZ state, 1-qubit is with Alice, one is withBob, and the third one is with Charlie.

The rest of the protocol is similar to two-party sharing of one-qubit polarization state case. (a) Firstly Alice sends mode (0M ,AM) pass through PBS1, PBS2, PBS3, PBS4, BS1, and BS2 in sequence.Alice performs M measurements with the detectors DE1, DE2, DF1,and DF2. (b) Alice informs Bob and Charlie of the acceptable results,and she assigns one of the agents (Charlie) to recover the quantumstate in Eq. (14). (c) Then Bob performs M operations as that in (S2)on his M modes, respectively. (B area of Fig. 1). (d) The receiver canalso recover the original polarization state in Eq. (14) with the helpof Bob’s classical information as (S3). The total success probabilityis P ¼ jðsin2 gÞM . We can see from Fig. 4 that the total successprobability decline with increasing the number of the qubit (M).

Case 2: This protocol can also be generalized to multi-party (N)sharing of multi-qubit ðMÞ state case. That is, the secret state canalso generally be represented as Eq. (14). The sender Alice, the Nagents BN need sharing of M N þ 1-qubit polarization state chan-nels, which is given by M N þ 1-qubit polarization entangledGHZ-type states like case 1. For each N þ 1-qubit polarizationentangled GHZ state, the mode 1 is with Alice. The rest of the Nmodes belong to N agents, respectively. Alice takes some opera-tions as that in (a) in case 1 and informs the N agents of her mea-surements results. If she assigns the Nth agent to recover heroriginal state. Then all the N � 1 agents are take as controller. Ifall the controller would like to help the receiver N, they performoperations as that in (S2) on their modes, respectively. After classi-cal communications, the receiver can also recover the original statein Eq. (14) as (S3). The total success probability isP ¼ jN�1ðsin2 gÞM , which denotes that P decline with increasingthe number M and N.

The security of the quantum state sharing protocol againsteavesdropping and cheating can be shown by the same methodspresented in Ref. [28]. Actually, as a matter of fact, it is Alice’s abil-ity to choose whether Bob or Charlie will receive the transferredstate which prevents cheating by one of the parties. If she thinks

M=4

00.2

0.40.6h

0

0.25

0.5

0.75

1

k

00.0010.0020.003

00.2

0.40.6h

M=2

00.2

0.40.6h

0

0.25

0.5

0.75

1

k

00.020.040.060.08

00.2

0.40.6h

P vs. g, j and M (M = 1,2,3,4).

Page 5: Quantum state sharing using linear optical elements

4950 Y. Xia et al. / Optics Communications 281 (2008) 4946–4950

one of the parties is the dishonest one, she can choose the otherone to be the receiver and by comparing a subset of the states re-ceived by the latter with the states transmitted Alice can detect ifthe former is cheating.

In conclusion, we have proposed an optical protocol for thequantum state sharing by using optical elements such as beamsplitters, phase shifters, and photo detectors. Although our presentprotocol is probabilistic, the average fidelity can approach unity fora large amplitude of the polarization state. Hence, this is a near-complete protocol. Compared with Ref. [25], the realization of thisprotocol is appealing due to the fact that quantum state of light isrobust against the decoherence and photons are ideal carriers fortransmitting quantum information over long distances. The pres-ent case, however, holds an interesting advantage over the previ-ous case in that the detectors do not need to distinguish betweenone and two photons. Experimental techniques for single-photondetection have made tremendous progress [41]. What we used alsoconsists of linear optical elements, and photon detectors, whichhave been widely used to entangle photons. This is an advantageof the present protocol that may make it easier to be demonstratedexperimentally. This protocol can also be generalized to the multi-party system and the total success probability is P ¼ jN�1ðsin2 gÞM .Also, note that the sender and receivers could perform the opera-tions on the N modes, each one on their side, using either a setof beam splitters and detectors sequentially or N sets of splittersand detectors in parallel. The latter case has a lower time complex-ity than the former, but requires more resources (Higher spacecomplexity). This protocol may play an important role in the actualimplementation of linear optical scheme for quantum communica-tion. Future work will comprise investigating more extensivequantum information processing procedures.

References

[1] C.H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres, W.K. Wootters, Phys.Rev. Lett. 70 (1993) 1895.

[2] Y. Xia, C.B. Fu, S. Zhang, K.H. Yeon, C.I. Um, J. Korean Phys. Soc. 46 (2005) 388.[3] N. Gisin, G. Ribordy, W. Tittel, H. Zbinden, Rev. Mod. Phys. 74 (2002) 145;

A.K. Ekert, Phys. Rev. Lett. 67 (1991) 661.[4] W.Y. Wang, C. Wang, K. Wen, G.L. Long, Chin. Phys. Lett. 24 (2007) 1463.

[5] S. Abstract, Phys. Rev. Lett. 59 (1999) 1829;F.G. Deng, X.H. Li, C.Y. Li, P. Zhou, H.Y. Zhou, Phys. Rev. A 72 (2005) 044301.

[6] Y. Xia, J. Song, H.S. Song, Opt. Commun. 279 (2007) 395;Y. Xia, J. Song, H.S. Song, Opt. Commun. 277 (2007) 219;Y. Xia, H.S. Song, Phys. Lett. A 364 (2007) 117.

[7] B. Zeng, P. Zhang, Phys. Rev. A 65 (2002) 022316;J. Song, Y. Xia, H.S. Song, Europhys. Lett. 80 (2008) 60001.

[8] C. Wang, F.G. Deng, G.L. Long, Opt. Commun. 253 (2005) 15.[9] G.R. Blakley, in: Proceeding of the American Federation of Information

Processing National Computer Conference, American Federation ofInformation Processing, Arlington, VA, 1979, p. 313;A. Shamir, Commun. ACM 22 (1979) 612.

[10] M. Hillery, V. Buzek, A. Berthiaume, Phys. Rev. A 59 (1999) 1829.[11] A. Karlsson, M. Koashi, N. Imoto, Phys. Rev. A 59 (1999) 162.[12] A.C.A. Nascimento, J. Mueller-Quade, H. Imai, Phys. Rev. A 64 (2001).[13] G.P. Guo, G. C Guo, Phys. Lett. A 310 (2003) 247.[14] F.G. Deng, H.Y. Zhou, G.L. Long, Phys. Lett. A 337 (2005) 329.[15] F.G. Deng, G.L. Long, H.Y. Zhou, Phys. Lett. A 340 (2005) 43.[16] L.Y. Hsu, C.M. Li, Phys. Rev. A 71 (2005) 022321.[17] A.M. Lance, T. Symul, W.P. Bowen, B.C. Sanders, T. Tyc, T.C. Ralph, P.K. Lam,

Phys. Rev. A 71 (2005) 033814.[18] R. Cleve, D. Gottesman, H.-K. Lo, Phys. Rev. Lett. 83 (1999) 648.[19] A.M. Lance, T. Symul, W.P. Bowen, B.C. Sanders, P.K. Lam, Phys. Rev. Lett. 92

(2004) 177903.[20] Y. Li, K. Zhang, K. Peng, Phys. Lett. A 324 (2004) 420.[21] Z.J. Zhang, Z.X. Man, Phys. Rev. A 72 (2005) 022303.[22] F.G. Deng, C.Y. Li, Y.S. Li, H.Y. Zhou, Y. Wang, Phys. Rev. A 72 (2005) 022338.[23] H. Kim, Y.W. Cheong, H.W. Lee, Phys. Rev. A 70 (2004) 012309.[24] C.H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J.A. Smolin, W.K.

Wootters, Phys. Rev. Lett. 76 (1996) 722.[25] G. Gordon, G. Rigolin, Phys. Rev. A 73 (2006) 062316.[26] N.B. An, G. Mahler, Phys. Lett. A 365 (2007) 70.[27] G. Gordon, G. Rigolin, Phys. Rev. A 73 (2006) 042309.[28] Y.Q. Zhang, X.R. Jin, S. Zhang, Phys. Lett. A 341 (2005) 380.[29] X. Wang, Phys. Rev. A 64 (2001) 022302.[30] J.Q. Liao, L.M. Kuang, Phys. Lett. A 358 (2006) 115.[31] H. Jeong, M.S. Kim, J. Lee, Phys. Rev. A 64 (2001) 052308.[32] S.J. van Enk, O. Hirota, Phys. Rev. A 64 (2001) 022313.[33] Y. Zheng, Y.J. Gu, G.C. Guo, J. Opt. B: Quant. Semiclass. Opt. 5 (2003) 29.[34] N.B. An, Phys. Rev. A 68 (2003) 022321.[35] N.B. An, Phys. Rev. A 69 (2004) 022315.[36] Y.W. Cheong, H. Kim, H.W. Lee, Phys. Rev. A 70 (2004) 032327.[37] X.H. Cai, L.M. Kuang, Phys. Lett. A 300 (2002) 103.[38] S. Takeuch, J. Kim, Y. Yamamoto, H.H. Hogue, Appl. Phys. Lett. 74 (1999) 1063;

J. Kim, S. Takeuch, Y. Yamamoto, H.H. Hogue, Appl. Phys. Lett. 74 (1999) 902.[39] X. Zou, S.L. Zhang, K. Li, G. Guo, Phys. Rev. A 75 (2007) 034302;

Y. Xia, J. Song, H.S. Song, Appl. Phys. Lett. 92 (2008) 021127.[40] J.W. Pan et al., Nature (London) 403 (2000) 515.[41] J. Kim et al., Appl. Phys. Lett. 74 (1999) 902;

A. Imamoglu, Phys. Rev. Lett. 89 (2002) 163602;D.F.V. James, P.G. Kwiat, Phys. Rev. Lett. 89 (2002) 183601.