Abstract
Generation of entangled state is of paramount importance both from quantum theoretical foundation and technology applications. Entanglement swapping provides an efficient method to generate entanglement in quantum communication protocols. However, perfect Bell measurements for qudits, the key to entanglement swapping, have been proven impossible to achieve by using only linear elements and particle detectors. To avoid this bottleneck, we propose a scheme to generate entangled state including two-qubit entangled state, two-qudit entangled state, three-qubit GHZ state and three-qudit GHZ state between several designate parties via the model of quantum walks with multiple coins. Then we conduct experimental realization of Bell state and three-qubit GHZ state between several designate parties on IBM quantum platform and the result has high fidelity by performing quantum tomography. In the end, we give a practical application of our scheme in multiparty quantum secret sharing.
Similar content being viewed by others
Introduction
Entanglement, a very powerful and efficient quantum resource, is a cornerstone of many quantum communication and quantum computation protocols. A lot of quantum schemes depend heavily on the property of entanglement1, such as quantum key distribution2, quantum teleportation3, quantum metrology4, and quantum sensing5.
There is no doubt that the preparation of entangled quantum states is of great concern in the past decades. Many schemes have been proposed theoretically and achieved experimentally6,7,8,9,10,11,12,13. However, the preparation of high-dimensional entangled states is so difficult that it has been implemented almost exclusively in photonic systems14. Entanglement swapping15, also known as teleportation of entanglement, can entangle two particles that are not related at first by performing a joint Bell-state measurement on them, which plays an important role in long-distance quantum communication, such as quantum repeater16,17. However, ref. 18 has pointed out that it is impossible to perform perfect Bell state measurement for qudits by using only linear elements and particle detectors. It is of interest to know if we can sidestep this thorny issue but still entangle designate parts. And in addition to the simple case involving two-qubit entangled quantum state, GHZ entanglement swapping by using three pairs EPR entangled state has also been discussed19. Then, ref. 20 demonstrated entanglement swapping between two multipartite entangled state, such as GHZ state and EPR state, and two GHZ states. However, a relatively general framework for generating entangled state via entanglement swapping is missing, let alone the experimental platform chosen to test.
Motivated by this, we develop a scheme to generate multipartite entanglement in high dimensions by using quantum walks instead of direct Bell state measurement in the framework of entanglement swapping and thus avoid the difficulty of the realization of Bell state measurement. Our scheme is mainly based on the model of quantum walks with multiple coins21 which can bring out entanglement between position space and coin space and has been proved to be useful in quantum communication protocols22,23. Here we mainly consider quantum walks with multiple coins on 2-line, 2-circle, and 2-complete (d-complete) graph, which are all the building blocks in quantum network. In this way, we can generate two-qubit entangled state, two-qudit entangled state, three-qubit GHZ state and even three-qudit GHZ state between several designate parties.
In terms of experimental realization of entangled state, it is very difficult to find an appropriate experimental preparation device especially for the high-dimensional entangled state, let alone universal method and experimental device. However, the physical implementations of the quantum walk have been realized in many different physical systems, such as trapped atom24, trapped ions25, photonic system26, and so on. Since quantum walk is a universal quantum computing model27,28,29,30, these schemes may provide a universal platform for entanglement generation.
Recently, IBM Quantum Experience, as a superconducting flux qubit based open platform, attracts the attention of many researchers31. Many theoretical schemes in the field of quantum computation and quantum information have been detected and performed on this platform32,33,34,35,36. Here, we carry out experiments on this platform to generate Bell state and three-qubit GHZ state between several designate parties. Also, the accuracy of our scheme can be verified well by performing quantum state tomography37.
Furthermore, we give its application in quantum communication. In detail, we provide an improved multiparty quantum secret sharing protocol based on ref. 38 by using our scheme. Compared with the original protocols, our scheme are high code capacity and high security. And it is easy to be implemented in experiment.
The paper is organized as follows. First, we will briefly introduce the model of quantum walks with multiple coins and give theoretical schemes based on quantum walks that can generate two-qubit entangled state, two-qudit entangled state, three-qubit GHZ state, and three-qudit GHZ state. Next, we demonstrate experiments using our schemes to generate Bell state and three-qubit GHZ state on IBM Quantum Experience. And then, we give an application of our schemes to multiparty quantum secret sharing. Finally, we make a summary and outlook.
Results
For the quantum walks with k coins on an arbitrary graph, the k coins were used cyclically. The whole evolutionary Hilbert space is \({\mathcal{H}}={{\mathcal{H}}}^{{\rm{P}}}\otimes {{\mathcal{H}}}^{{{\rm{C}}}_{1}}\otimes ...\otimes {{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{k}}}}\), where \({{\mathcal{H}}}^{{\rm{P}}}\) and \({{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{i}}}}\) represent the position space and the i-th coin space respectively. At i-th step of quantum walks, the coin state can be flipped with the i-th coin operator Ci and then the walker moves to another position according to the conditional shift operator Si, which can be described as
where Ci acts on the i-th coin space \({{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{i}}}}\) and Si acts on the combination space of position \({{\mathcal{H}}}^{{\rm{P}}}\) and i-th coin space \({{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{i}}}}\). To make it clear that Ci and Si operate on different spaces, we explicitly write the above unitary operator by expanding all involved subspaces and adding the space of action of the identity operator involved in the upper right corner of the operator, i.e. \({U}_{i}=({S}_{i}\otimes {I}^{{{\mathcal{H}}}^{{{\rm{C}}}_{1}}}\ldots \otimes {I}^{{{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{i}}-1}}}\otimes {I}^{{{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{i}}+1}}}\ldots \otimes {I}^{{{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{k}}}}})\cdot ({I}^{{{\mathcal{H}}}^{{\rm{p}}}}\otimes {I}^{{{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{1}}}}}\ldots \otimes {I}^{{{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{i}}-1}}}\otimes {C}_{i}\otimes {I}^{{{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{i}}+1}}}\ldots \otimes {I}^{{{\mathcal{H}}}^{{{\rm{C}}}_{{\rm{k}}}}})\). After t steps, the initial state \(\left|\phi (0)\right\rangle\) evolves into
We denote the line, circle and complete graph with N vertices as N-line, N-circle, and N-complete graph respectively. The three corresponding conditional shift operators acting on the position space and the coin space that is active at the step can be written as:
In particular, when the number of vertices is 2, the conditional shift operators are:
Generation of two-qubit entangled state
We start by discussing the generation of two-qubit entangled state. And the setup is illustrated in Fig. 1a. Without loss of generality, we can assume that the initial state of the four particles is
where ∣a∣2 + ∣b∣2 = 1. Now we try to generate entanglement between particle 1 and 4. Here, we can view particle 1 and 2, 3, 4 as walker and three coins respectively. And thus we can consider quantum walks with three coins on 2-line, 2-circle and 2-complete graph.
For the case of quantum walks with three coins on 2-line, we can perform two-step quantum walks where C1 = H and C2 = I. According to conditional shift operator and initial state shown in Eqs. (8) and (9), the evolution process is written as follows:
Therefore, we can definitely obtain entangled state between particle 1 and 4 by performing two local measurements on the other two particles. In particular, the state will be Bell state, also known as maximal entangled state, when \(a=b=\frac{1}{\sqrt{2}}\).
In the case of quantum walks with three coins on 2-circle, it is impossible to get entangled between particle 1 and 4 no matter how many steps we take. In this case, the conditional shift operator happens to be the second-order Pauli matrix X2. Therefore, the general form of evolved quantum state under three-step quantum walks is \((I\otimes {C}_{1}\otimes {C}_{2}\otimes {C}_{3})({a}^{2}\left|1101\right\rangle +ab\left|1110\right\rangle +ab\left|0001\right\rangle +{b}^{2}\left|0010\right\rangle )\). And it has a definite explicit form by giving three unitary coin operators with parameters. Then, it is not hard for us to find that there is no satisfied coin operator by analyzing the final state with parameters.
As regards quantum walks with three coins on 2-complete graph, we can take three-step quantum walks where C1 = I, C2 = H and C3 = X2. Thus the whole evolutionary process can be described as follows:
So we obtain entanglement between particle 1 and 4 by performing three-step quantum walks and two local measurements. Of course, the state obtained happens to be Bell state when \(a=b=\frac{1}{\sqrt{2}}\). In addition, there are other ways to select coin operators to generate entanglement. For example, C1 = I, C2 = X2, C3 = H or C1 = X2, C2 = X2, C3 = H, or C1 = X2, C2 = H, C3 = X2 can also be used to generate entanglement between particle 1 and 4.
Generation of two-qudit entangled state
High-dimensional entangled states are of paramount interest both from a theoretical and practical perspective. Generalized Bell states in Hilbert space Cd ⊗ Cd, a basis of maximally entangled high-dimensional bipartite states, can be described as3,39
where m −l means \((m-l)\,{\rm{mod}}\,d\). The general entangled state can be written as \(\mathop{\sum }\nolimits_{i = 0}^{d-1}{a}_{i}\left|i\right\rangle \left|i\right\rangle\), where \(\mathop{\sum }\nolimits_{i = 0}^{d-1}| {a}_{i}{| }^{2}=1\). For the sake of simplicity, we denote d-order generalized Pauli operator as \({X}_{d}=\mathop{\sum }\nolimits_{i = 0}^{d-1}\left|i+1\right\rangle \left\langle i\right|\), which is also known as discrete Weyl operator. Next, we propose two schemes to generate maximal and non-maximal entangled high-dimensional states (two-qudit entangled state) by performing quantum walks with three coins on d-complete graph. And its schematic diagram is shown in Fig. 1a.
For the case of maximal entangled state, the initial state is \(\left|\psi (0)\right\rangle ={\left|{\psi }_{k,l}\right\rangle }_{1,2}{\left|{\psi }_{k,l}\right\rangle }_{3,4}=\frac{1}{d}\mathop{\sum }\nolimits_{m,n = 0}^{d-1}\exp (\frac{2\pi {\rm{i}}}{d}(m+n)k)\left|m,m-l,n,n-l\right\rangle\). Now we can perform three-step quantum walks where C1 = I, C2 = F (Fourier transformation) and C3 = Xd. Thus, we can obtain the final state:
Then we take two local measurements on particle 2 and 3 and assume that the result are \(\exp (\frac{2\pi {\rm{i}}}{d}{m}_{0}k){\left|{m}_{0}-l\right\rangle }_{2}{\left|{p}_{0}\right\rangle }_{3}\). So the reduced state would be \(\exp (-\frac{2\pi {\rm{i}}}{d}(2{m}_{0}+{p}_{0}-2l+1)(k+{p}_{0}))|{\psi }_{k+{p}_{0},2{m}_{0}+{p}_{0}-l}\rangle_{1,4}\).
More generally, in the case of non-maximal entangled state, the initial state can be written as \(\left|\psi (0)\right\rangle ={\left(\mathop{\sum }\nolimits_{i = 0}^{d-1}{a}_{i}\left|i\right\rangle \left|i\right\rangle \right)}_{1,2}\otimes {\left(\mathop{\sum }\nolimits_{j = 0}^{d-1}{b}_{j}\left|j\right\rangle \left|j\right\rangle \right)}_{3,4}\), where \(\mathop{\sum }\nolimits_{i = 0}^{d-1}| {a}_{i}{| }^{2}=\mathop{\sum }\nolimits_{j = 0}^{d-1}| {b}_{j}{| }^{2}=1\). After the same three-step quantum walks (C1 = I, C2 = F and C3 = Xd), the final state will be \(\left|\psi (3)\right\rangle =\frac{1}{\sqrt{d}}\mathop{\sum }\nolimits_{i,k = 0}^{d-1}[{a}_{i}{\left|i\right\rangle }_{2}{\left|k\right\rangle }_{3}(\mathop{\sum }\nolimits_{j = 0}^{d-1}{b}_{j}\exp (\frac{2\pi {\rm{i}}}{d}jk){\left|2i+j+k+1\right\rangle }_{1}{\left|j+1\right\rangle }_{4})]\). Similarly, particle 1 is entangled with 4 after two local measurements.
Generation of three-qubit GHZ state
The three-qubit GHZ states maximize entanglement monotones40,41 and have extremely non-classical properties. The setup for this problem is shown in the Fig. 1b. The initial state of the five particles can be written as
where ∣a∣2 + ∣b∣2 = 1. In order to generate entanglement between particle 1, 4, and 5, we can view these five particles as the walker and four coins respectively. So we can discuss the quantum walks with four coins on 2-line, 2-circle, and 2-complete graph.
Let us start by talking about the case of quantum walks with four coins on 2-line. And in order to do that, we perform two-step quantum walks where C1 = H and C2 = X. Thus the initial quantum state presented in Eq. (17) will evolves over time into
and
Then we just have to make local measurements of particle 2 and particle 3, and no matter what the measurements are, the remaining three particles always collapse to be GHZ state.
For quantum walks with four coins on 2-circle, particle 1, 4, and 5 will never get entangled no matter how many steps we take. Given an initial state in Eq. (17), after four steps the state evolves to \(\frac{1}{\sqrt{2}}(I\otimes {C}_{1}\otimes {C}_{2}\otimes {C}_{3}\otimes {C}_{4})(a\left|01000\right\rangle +a\left|01111\right\rangle +b\left|10000\right\rangle +b\left|10111\right\rangle )\), where these four operators can be any unitary operator of the second order. By calculating the undetermined coefficients of these four coin operators, we find that particle 1, 4, and 5 are never completely entangled.
In regard to the quantum walks with four coins on 2-complete graph, we can generate entanglement between particle 1, 4 and 5 by performing four-step quantum walks where C1 = C2 = I and C3 = C4 = H. After the first two steps of quantum walks, the quantum state evolves into
The resulting state will be
after one step with coin operator C3 = H. And then the final quantum state can be described as follows:
So we can get the GHZ-like state42 of particle 1, 4, and 5, which is the entangled quantum state and belongs to the class of GHZ state, by taking two local measurements of particle 2 and 3.
Generation of three-qudit GHZ state
Three-qudit GHZ state can be written as \(\frac{1}{\sqrt{d}}\mathop{\sum }\nolimits_{n = 0}^{d-1}{\left|n\right\rangle }^{{\otimes }^{3}}\). And its generation process is presented in Fig. 1b. For the initial state
we can perform four-step quantum walks with four coins on d-complete graph by choosing C1 = C2 = I and C3 = C4 = F to establish the entanglement between particle 1, 4 and 5 that are unrelated at first. The evolutionary process can be described as follows:
Then we can obtain an entangled state of particle 1, 4 and 5 by performing two local measurements on particle 2 and 3. Note that any state like \(\mathop{\sum }\nolimits_{p,q = 0}^{d-1}\left|{x}_{0}+p+q,p,q\right\rangle\) is completely entangled, where x0 ∈ {0, 1, 2, … , d − 1}. It can be seen as the high-dimensional case of GHZ-like state.
Experimental protocol
We provide the experimental realization of our scheme using IBM quantum computer ibmq_5_yorktown − ibmqx2 (it is called ibmqx2 for short) and ibmq_qasm_simulator (simulator) with 8192 number shots (see Supplementary Note 1 for the introduction). Here, we mainly discuss the generation of standard Bell state and three-qubit GHZ state based on quantum walks. To verify the effect of our scheme, we focus on the fidelity between the theoretical and experimental (simulation) results by performing quantum state tomography37. Here the theoretical results can be calculated in our schemes directly. The experimental results are obtained on a real quantum machine, i.e. on ibmqx2. And the simulation results are provided on a quantum simulator, which is a classical computer that simulates the quantum operation under realistic device noisy models.
Based on the theoretical scheme, we provide the corresponding IBM quantum circuit that can be seen in Fig. 2 to generate Bell state by performing three-step quantum walks on 2-complete graph. And the results, measured in Z-basis, are shown in Fig. 3. According to the Fig. 3a, the simulation seems very close to the theoretical result (there are eight outcomes appeared in Fig. 3a and the probability of each is 12.5%). And the results on ibmqx2 shown in Fig. 3b are not as good as the simulation results. In fact, there are some noises on the quantum platform, such as decoherence, depolarizing, general noises and so on, which result in the discrepancy between theoretical values and the run results. According to the quantum state tomography37 and the detailed experimental data, we find that the fidelity between theoretical and simulation density matrix \(F({\rho }_{ij}^{{\rm{T}}},{\rho }_{ij}^{{\rm{E}}\_{\rm{simulator}}})\) where i, j ∈ {0, 1} are approximately equal to 1 (see Supplementary Note 2). And the fidelity between theoretical and experimental density matrix \(F({\rho }_{ij}^{{\rm{T}}},{\rho }_{ij}^{{\rm{E}}\_{\rm{ibmqx2}}})\) are 0.8535, 0.8793, 0.7909, 0.8549 (see Supplementary Note 2).
As for the generation of three-qubit GHZ state, we provide the corresponding IBM quantum circuit diagram that can be seen in Fig. 4a, which is realized by performing two-step quantum walks on 2-line. The whole design idea is similar to the experimental realization of Bell state. The only thing that needs to be noticed is the design of shift operator on 2-line. Here we give the simulation results and probability results on ibmqx2 in Fig. 4b, c, respectively. The analysis of the experimental results can be similarly obtained, so we will not repeat it.
Application
In fact, our proposed schemes not only generate entangled states, but also really work in the quantum domain. To illustrate this point, here we present an application of our scheme in the field of quantum cryptography. In order to share secret among some agents and reconstruct it only when they collaborate together, the scheme of quantum secret sharing (QSS) was proposed in 199943. Zhang proposed a multiparty quantum secret sharing (MQSS) protocol by using entanglement swapping38. Then Lin and Zhang revised and improved the protocol, respectively44,45.
Here, we improve and extend the performance of MQSS protocol proposed by Zhang38 by using our scheme. According to our scheme, for the initial state
after three-step quantum walks (the coin operators are I, F, Xd in sequence), we could obtain the final state
Assume that d is odd, we can set up a bijection between the pairs (m − y, p) and (k + p, 2m + p − y), where y and k are known fixed numbers.
Let \({U}_{i}={X}_{d}^{i}=\mathop{\sum }\nolimits_{j = 0}^{d-1}\left|j+i\right\rangle \left\langle j\right|\) be d local unitary transformations (i = 0, 1, … , d − 1) that correspond to \(\lceil \mathrm{log}\,d\rceil\) classical bits respectively. To be specific, U0 corresponds to ”0 … 000”, U1 corresponds to ”0 … 001”, U2 corresponds to ”0 … 010” and so on. Based on the property Ui holds,
we can establish correspondence between the unitary operators {Ui: i = 0, 1, … , d − 1} and generalized Bell states \(\{\left|{\psi }_{k,l}\right\rangle :l=0,1,\cdots \ ,d-1\}\) for an arbitrary fixed k. Next, we will show the improved MQSS based on38 in which d is an odd number. And the schematic flow chart of the whole process is shown in Fig. 5.
-
1.
Alice prepares three identical generalized Bell state pairs \({|{\psi }_{k,l}\rangle }_{1,2}\), \({|{\psi }_{k,l}\rangle }_{3,4}\) and \({|{\psi }_{k,l}\rangle }_{5,6}\). She sends qudit 2 and 3 to Bob, 4 and 5 to Charlie via their quantum channels respectively. Then, Alice enters step 2 with probability q, or enters step 3 with probability 1 − q.
-
2.
Alice chooses randomly from two mutually unbiased measurement basis, \({{\mathcal{M}}}_{1}=\{\left|i\right\rangle \!:i=0,1, \ldots \ ,d-1\}\) and \({{\mathcal{M}}}_{2}=\{|\tilde{i}\rangle :i=0,1,\ldots \ ,d-1\}\), where \(|\tilde{i}\rangle =\frac{1}{\sqrt{d}}\mathop{\sum }\nolimits_{j = 0}^{d-1}\exp (\frac{2\pi {\rm{i}}}{d}ij)|j\rangle\). Alice tells Bob the basis she has chosen. They measure qudit 1 and 2 by chosen measurement basis respectively. Then Bob tells Alice his outcome of qudit 2. Alice compares these two outcomes to judge the security of Alice-Bob quantum channel (For example, if the generalized Bell state pairs that Alice prepares is \(\left|{\psi }_{0,0}\right\rangle\), these two measurement outcomes must be identical when the channel is safe). The security of Alice-Charlie quantum channel can also be checked in the same way. If the two channel are both secure, returns to step 3. Otherwise, this process will be terminated.
-
3.
Alice applies a local unitary operator chosen randomly from {Ui: i = 0, 1, … , d − 1} on one of her qudits 1 and 6 (say, on qudit 6). Firstly, they perform three-step quantum walks on qudit 5, 6, 1 and 2. Alice performs two local measurements on qudit 6 and 1 and announces her outcome. Next, they perform three-step quantum walks on qudit 5, 2, 3, and 4. Bob performs two local measurements on qudit 2 and 3 and writes down the outcomes. At this times, Charlie records his own state. Bob and Charlie can deduce the unitary transformation Alice performs and the classical bits Alice wants to share.
Now let us explain how we derived Ui in step 3 based on the three measurement results they announced and evolutionary properties. Without loss of generality, we can denote the outcome Alice announces as \({\left|a,b\right\rangle }_{6,1}\). Suppose the quantum state of qudit 5 and 2 is \(|{\psi }_{\bar{k},\bar{l}}\rangle\) after the first quantum walks. According to Eq. (27), we can denote the outcome Bob writes down and the state Charlie possesses as \({|m-\bar{l},p\rangle }_{2,3}\) and \({|{\psi }_{k+p,2m+p-\bar{l}}\rangle }_{5,4}\) respectively. Since k is known, p, m and \(\bar{l}\) are also known. Next we can infer that \(\bar{k}=k+b\) and the state of qudit 5 and 6 after the local unitary transformation performed by Alice is \({|{\psi }_{k,\bar{l}-b-2a}\rangle }_{5,6}\) based on the first quantum walks. Thus, the unitary transformation Alice performed is \({U}_{l-(\bar{l}-b-2a)}\). Note that the above-mentioned addition and subtraction methods are all of modulo d. So it is not hard to infer the classical bits Alice wants to share.
In addition, our protocol can also be generalized to a multiparty case. Without loss of generality, we suppose that there are N parties in total. First, the sender prepares N identical generalized Bell state pairs and distributes two qudits to the agents one by one and does not tell their the ordering of the two qudits. So the i-th agent and the i + 1-th agent share a generalized Bell state pair. And the N-th agent will share a generalized Bell state pair with the sender. Then, they check the security of quantum channel (step 2) with probability q or transmit message (step 3) with probability 1 − q. The order of quantum walk and measurements, which is crucial for the whole process, is the same as the order of entanglement swapping in the previous protocol44,45. The security (even in a noisy channel) can be guaranteed on step 2 by the similar discussions in ref. 38,44,45. For example, the communication protocol here is secure against the intercept and resend attack (i.e., Eve intercepts the qudit during the transmission between Alice and Bob, and sends a fake qudit to Bob) and direct measurement attack (Eve intercepts the qudit, makes the measurement and resends the measured qudit to Bob), which can be guaranteed by step 2. When it enters into the step 3, the whole process becomes evolution of quantum walk which takes place in an isolated system and does not involve a transmission channel. So it is safe.
Now, let us make some comparisons between our scheme and the other schemes38,46. Compared with ref. 38, the advantage of our scheme is that the capacity of classical messages it can distribute is much larger. Specifically, it is a task to distribute \(N=\lceil \mathrm{log}\,d\rceil\) classical bits instead of just two bits. In addition, ref. 38 needs \(\frac{3N}{2(1-q)}\) Bell states in step 3. Our scheme just needs \(\frac{3}{1-q}\) generalized Bell states. Although the preparation of generalized Bell state is difficult with the current technological level, our scheme may show some advantage in theory. It could be better when the generalized Bell state is possibly generated in the lab. Thus, from the view point of the resource, our scheme is much better theoretically and has the merit of potential application.
In ref. 46, Zhang et.al designed a MQSS protocol by swapping qutrit-state entanglement and then generalized to the qudit case, in which the so-called two-qutrit (two-qudit) entangled-state measurement is crucial but hard to implement in experiment. Our scheme avoids the difficulty in the experimental realization of Bell state measurement, especially for the measurement of high dimensional Bell state18. So our protocol is more feasible than the one in ref. 46. Here we give a theoretical scheme to do QSS by quantum walk and provide the potential implementation merit by IBM quantum machine. Because quantum walk is a universal quantum computing platform, it may inspire some different idea for the implementation of QSS in a truly distributed quantum system.
Discussion
The generation of entanglement, especially in the high-dimensional case, between several designated parties is vital and essential in scalable quantum network. Inspired by entanglement swapping, we have developed a scheme to generate entangled state by using quantum walks with multiple coins, including two-qubit entangled state, two-qudit entangled state, three-qubit GHZ state, and three-qudit GHZ state. In comparison with original entanglement swapping, the benefit of using our scheme is expected to avoid performing joint Bell state measurement that is still an unsolved problem to date, and provide a relatively general framework for generating entangled state via entanglement swapping.
Also, we provide the experimental realization of our scheme to generate Bell state and three-qubit GHZ state on IBM platform. And our scheme exhibits high fidelity by performing quantum state tomography. Moreover, we present an improved multiparty quantum secret sharing by using our our scheme. After our improvement, it can convey more classical information and require less quantum resources.
It remains an interesting open question to design further the GHZ state and W state for a system of n qubit, where n is an arbitrary integer. It is also highly desired to extend our method to more practical applications.
Data availability
The experimental data that supports our finding are available from the corresponding author on reasonable request.
References
Horodecki, R., Horodecki, P., Horodecki, M. & Horodecki, K. Quantum entanglement. Rev. Mod. Phys. 81, 865–942 (2009).
Ekert, A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991).
Bennett, C. H. et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993).
Giovannetti, V., Lloyd, S. & Maccone, L. Quantum metrology. Phys. Rev. Lett. 96, 010401 (2006).
Degen, C. L., Reinhard, F. & Cappellaro, P. Quantum sensing. Rev. Mod. Phys. 89, 035002 (2017).
DiCarlo, L. et al. Preparation and measurement of three-qubit entanglement in a superconducting circuit. Nature 467, 574–578 (2010).
Neeley, M. et al. Generation of three-qubit entangled states using superconducting phase qubits. Nature 467, 570–573 (2010).
Delteil, A. et al. Generation of heralded entanglement between distant hole spins. Nat. Phys. 12, 218–223 (2016).
Hu, X. M. et al. Experimental creation of multi-photon high-dimensional layered quantum states. npj Quantum Inf. 6, 88 (2020).
Erhard, M., Krenn, M. & Zeilinger, A. Advances in high-dimensional quantum entanglement. Nat. Rev. Phys. 2, 365–381 (2020).
Abliz, A., Gao, H. J., Xie, X. C., Wu, Y. S. & Liu, W. M. Entanglement control in an anisotropic two-qubit Heisenberg XYZ model with external magnetic fields. Phys. Rev. A 74, 052105 (2006).
Li, Z. G., Fei, S. M., Wang, Z. D. & Liu, W. M. Evolution equation of entanglement for bipartite systems. Phys. Rev. A 79, 024303 (2009).
Hu, X., Fan, H., Zhou, D. L. & Liu, W. M. Necessary and sufficient conditions for local creation of quantum correlation. Phys. Rev. A 85, 032102 (2012).
Krenn, M. et al. Generation and confirmation of a (100 × 100)-dimensional entangled quantum system. Proc. Natl. Acad. Sci. USA 111, 6243–6247 (2014).
Zukowski, M., Zeilinger, A., Horne, M. A. & Ekert, A. K. "Event-ready-detectors" Bell experiment via entanglement swapping. Phys. Rev. Lett. 71, 4287–4290 (1993).
Briegel, H. J., Dür, W., Cirac, J. I. & Zoller, P. Quantum repeaters: the role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932–5935 (1998).
Santra, S. et al. Quantum repeaters based on two species trapped ions. N. J. Phys. 21, 073002 (2019).
Calsamiglia, J. Generalized measurements by linear elements. Phys. Rev. A 65, 030301 (2002).
Lu, C. Y., Yang, T. & Pan, J. W. Experimental multiparticle entanglement swapping for quantum networking. Phys. Rev. Lett. 103, 020501 (2009).
Su, X. L. et al. Quantum entanglement swapping between two multipartite entangled states. Phys. Rev. Lett. 117, 240503 (2016).
Brun, T. A., Carteret, H. A. & Ambainis, A. Quantum walks driven by many coins. Phys. Rev. A 67, 052317 (2003).
Wang, Y., Shang, Y. & Xue, P. Generalized teleportation by quantum walks. Quantum Inf. Process. 16, 221 (2017).
Shang, Y., Wang, Y., Li, M. & Lu, R. Q. Quantum communication protocols by quantum walks with two coins. EPL 124, 60009 (2019).
Karski, M. et al. Quantum walk in position space with single optically trapped atoms. Science 325, 174–177 (2009).
Tamura, M., Mukaiyama, T. & Toyoda, K. Quantum walks of a phonon in trapped ions. Phys. Rev. Lett. 124, 200501 (2020).
Tang, H. et al. Experimental two-dimensional quantum walk on a photonic chip. Sci. Adv. 4, eaat3174 (2018).
Childs, A. M. Universal computation by quantum walk. Phys. Rev. Lett. 102, 180501 (2009).
Childs, A. M., Gosset, D. & Webb, Z. Universal computation by multiparticle quantum walk. Science 339, 791–794 (2013).
Lovett, N. B., Cooper, S., Everitt, M., Trevers, M. & Kendon, V. Universal quantum computation using the discrete-time quantum walk. Phys. Rev. A 81, 042330 (2010).
Underwood, M. S. & Feder, D. L. Universal quantum computation by discontinuous quantum walk. Phys. Rev. A 82, 042304 (2010).
IBM quanutm team. IBM Quantum experience, https://www.ibm.com/quantum-computing/. Accessed (2020).
Shang, Y. & Li, M. Experimental realization of state transfer by quantum walks with two coins. Quantum Sci. Technol. 5, 015005 (2019).
Alsina, D. & Latorre, J. I. Experimental test of Mermin inequalities on a five-qubit quantum computer. Phys. Rev. A 94, 012314 (2016).
Devitt, S. J. Performing quantum computing experiments in the cloud. Phys. Rev. A 94, 032329 (2016).
Behera, B. K., Banerjee, A. & Panigrahi, P. K. Experimental realization of quantum cheque using a five-qubit quantum computer. Quantum Inf. Process. 16, 312 (2017).
Wang, Y. H., Li, Y., Yin, Z. Q. & Zeng, B. 16-qubit IBM universal quantum computer can be fully entangled. npj Quantum Inf. 4, 46 (2018).
James, D. F. V., Kwiat, P. G., Munro, W. J. & White, A. G. Measurement of qubits. Phys. Rev. A 64, 052312 (2001).
Zhang, Z. J. & Man, Z. X. Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 72, 022303 (2005).
Sych, D. & Leuchs, G. A complete basis of generalized Bell states. N. J. Phys 11, 013006 (2009).
Verstraete, F., Dehaene, J. & De Moor, B. Normal forms and entanglement measures for multipartite quantum states. Phys. Rev. A 68, 012103 (2003).
Dür, W., Vidal, G. & Cirac, J. I. Three qubits can be entangled in two inequivalent ways. Phys. Rev. A 62, 062314 (2000).
Yang, K., Huang, L., Yang, W. & Song, F. Quantum teleportation via GHZ-like state. Int. J. Theor. Phys. 48, 516–521 (2009).
Hillery, M., Bužek, V. & Berthiaume, A. Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999).
Lin, S., Gao, F., Guo, F. Z., Wen, Q. Y. & Zhu, F. C. Comment on "Multiparty quantum secret sharing of classical messages based on entanglement swapping”. Phys. Rev. A 76, 036301 (2007).
Zhang, Z. J. & Man, Z. X. Reply to Comment on "Multiparty quantum secret sharing of classical messages based on entanglement swapping”. Phys. Rev. A 76, 036302 (2007).
Zhang, Z. J., Liu, Y. M., Fang, M. & Wang, D. Multiparty quantum secret sharing scheme of classical messages by swapping qudit-state entanglement. Int. J. Mod. Phys. C 18, 1885–1901 (2007).
Acknowledgements
We thank the support of National Key Research and Development Program of China under grant 2016YFB1000902, National Natural Science Foundation of China (Grant No. 61472412, 61872352), and Program for Creative Research Group of National Natural Science Foundation of China (Grant No. 61621003).
Author information
Authors and Affiliations
Contributions
M.L. and Y.S. contributed equally.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Li, M., Shang, Y. Entangled state generation via quantum walks with multiple coins. npj Quantum Inf 7, 70 (2021). https://doi.org/10.1038/s41534-021-00401-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41534-021-00401-6