Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3122
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
In this paper, by using eleven entangled quantum states as a quantum channel, we propose a cyclic and asymmetric novel protocol for four participants in which both Alice and Bob can transmit two-qubit states, and Charlie can transmit three-qubit states with the assistance of the supervisor David, who provides a guarantee for communication security. This protocol is based on GHZ state measurement (GHZ), single-qubit measurement (SM), and unitary operations (UO) to implement the communication task. The analysis demonstrates that the success probability of the proposed protocol can reach 100%. Furthermore, considering that in actual production environments, it is difficult to avoid the occurrence of noise in quantum channels, this paper also analyzes the changes in fidelity in four types of noisy scenarios: bit-flip noise, phase-flip noise, bit-phase-flip noise, and depolarizing noise. Showing that communication quality only depends on the amplitude parameters of the initial state and decoherence rate. Additionally, we give a comparison with previous similar schemes in terms of achieved method and intrinsic efficiency, which illustrates the superiority of our protocol. Finally, in response to the vulnerability of quantum channels to external attacks, a security analysis was conducted, and corresponding defensive measures were proposed.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.3390/e26121108 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!