[BACK]
Computers, Materials & Continua
DOI:10.32604/cmc.2022.027437
images
Article

Quantum Remote State Preparation Based on Quantum Network Coding

Zhen-Zhen Li1, Zi-Chen Li1, Yi-Ru Sun2,3,*, Haseeb Ahmad4, Gang Xu5,6 and Xiu-Bo Chen3

1School of Information Engineering, Beijing Institute of Graphic Communication, Beijing, 102600, China
2School of Computer Science and Information Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China
3Information Security Center, State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
4Department of Computer Science, National Textile University, Faisalabad, 37610, Pakistan
5School of Information Science and Technology, North China University of Technology, Beijing, 100144, China
6Advanced Cryptography and System Security Key Laboratory of Sichuan Province, China
*Corresponding Author: Yi-Ru Sun. Email: syr@mail.zjgsu.edu.cn
Received: 18 January 2022; Accepted: 08 March 2022

Abstract: As an innovative theory and technology, quantum network coding has become the research hotspot in quantum network communications. In this paper, a quantum remote state preparation scheme based on quantum network coding is proposed. Comparing with the general quantum remote state preparation schemes, our proposed scheme brings an arbitrary unknown quantum state finally prepared remotely through the quantum network, by designing the appropriate encoding and decoding steps for quantum network coding. What is worth mentioning, from the network model, this scheme is built on the quantum k-pair network which is the expansion of the typical bottleneck network—butterfly network. Accordingly, it can be treated as an efficient quantum network preparation scheme due to the characteristics of network coding, and it also makes the proposed scheme more applicable to the large-scale quantum networks. In addition, the fact of an arbitrary unknown quantum state remotely prepared means that the senders do not need to know the desired quantum state. Thus, the security of the proposed scheme is higher. Moreover, this scheme can always achieve the success probability of 1 and 1-max flow of value k. Thus, the communication efficiency of the proposed scheme is higher. Therefore, the proposed scheme turns out to be practicable, secure and efficient, which helps to effectively enrich the theory of quantum remote state preparation.

Keywords: Quantum remote state preparation; quantum network coding; quantum k-pair network

1  Introduction

In 2000, quantum remote state preparation (RSP) was first proposed by Lo [1]. RSP enables the senders to prepare known states for remote receivers with the assistance of entangled resources [2,3] and classical communications [4,5]. With so many years of development, RSP has already made significant advances in theories [68] and applications [911]. In these researches, respect to the different target state, such as Bell state [12], GHZ state [13], W state [14], cluster state [15] and so on, various kinds of RSP schemes have been proposed. In addition, respect to the different implementation techniques, such as deterministic RSP [16], joint RSP [17] and controlled RSP [18], several schemes have also been proposed.

However, with the development of quantum communication and the requirement for multi-user’s quantum communication, point-to-point communication mode will necessarily toward to the direction of network communication. Thus, the research of RSP over the quantum network have become a meaningful task. In quantum network communications, as a breakthrough technology, quantum network coding (QNC) can effectively improve the quantum communication efficiency and quantum network throughput as compared to the traditional technology of routing. Since the first QNC scheme proposed by Hayashi et al. [19] in 2006, a series of QNC schemes have been put forward in theories [2023] and applications [2426] over the past decade. By QNC, the intermediate nodes are allowed to encode the received information and ultimately the destination nodes can recover the original unknown quantum state by decoding. Therefore, it is reasonable to believe that if combining RSP and QNC, the problem of quantum state preparation over quantum networks can be solved effectively.

In this paper, a novel RSP scheme based on QNC is proposed. This scheme is assisted by the resource of prior entanglement and classical communication, and the specified encoding or decoding operations are performed at the corresponding nodes. In terms of the quantum state, an arbitrary unknown quantum state possessed by the source nodes are finally prepared at the sink nodes; in terms of the success probability, this scheme can always achieve the success probability of 1; in terms of the network model, the quantum k-pair network as an expansion of the typical bottleneck network—butterfly network [2729] in QNC is constructed to propose the scheme. Thus, the proposed scheme can effectively improve the communication efficiency and is more applicable to the scenarios of large-scale quantum networks, which can enrich the theory of quantum remote state preparation over quantum network.

The remainder of this paper is organized as follows. In Section 2, preliminaries including notations, quantum k-pair network, quantum operators and quantum measurements are presented. In Section 3, the specific RSP scheme based on QNC is proposed. In Section 4, the performance analyses including correctness, security, practicability and achievable rate region are discussed. At last, some concluding remarks are given in Section 5.

2  Preliminaries

2.1 Notations

The following notations will be used throughout this paper:

: The addition module d; : The tensor product of vector space.

Cd: The d-dimension complex field; Zd: The integer ring with respect to addition module d.

σx: The Pauli operator over 2-dimension space; X/R: The Pauli operator over d-dimension space.

2.2 Quantum K-Pair Network

Let us consider a directed acyclic graph (DAG) G = (V,E), where V is the set of nodes and E is the set of edges that connect pairs of nodes in V. K pairs of nodes (s1,t1),(s2,t2),,(sk,tk) constitute a subset of V. Next, a directed acyclic network (DAN) N is deemed a quantum network if it comprises a DAG G and the edge quantum capacity function c:EZ+. The quantum k-pair network N explored herein is shown in Fig. 1.

images

Figure 1: Quantum k-pair network N

In this figure, the solid lines represent the quantum physical channels and the arrows indicate the transmission direction of the quantum information. Let H=Cd denote a Hilbert space. According to the task of the quantum RSP and QNC, one needs to make a quantum state |ΨS1,,SkHk supported on the source nodes s1,,sk (in this order) remotely prepared at the sink nodes t1,,tk (in this order) through N, under the condition that c(e)1,eE, i.e., each edge of N can transmit no more than one qudit state over H. For i{1,2,,k}, each quantum register Si is possessed by the source node si, while the quantum register Ti is possessed by the sink node ti. A RSP scheme based on QNC over the quantum k-pair network refers to the corresponding protocol, which contains certain quantum operations for all nodes in V that enable the above preparation to be accomplished successfully.

2.3 Quantum Operators

Firstly, let us introduce the controlled-X operation on a d-dimension quantum system H=Cd, which is written as follows:

ΛXAB:=rd|rr|AXBr,(1)

where X|i=|i1modd is an analogue of the unitary Pauli operator σx on qubits [30,31]. Based on this, for tZd, the quantum operation constructed by performing t times the controlled-X operation in d-dimension quantum system H=Cd is also presented here, defined as

ΛXABt:=rd|rr|AXBrt.(2)

Then, another quantum operation named controlled-R operation on d-dimension quantum system H=Cd is also presented here, defined as

ΛRAB:=i=0d1|ii|ARBi,(3)

where R|i=|i1modd is the reverse transformation of X on qudits.

2.4 Quantum Measurements

In the quantum system H=Cd, quantum Fourier transform F is a unitary transformation that transforms the computing basis states {|k}kZd to the Fourier basis as

|wk=F|k=1dl=0d1e2πιkl/d|l,(4)

where ι2=1, F=1dl,k=0d1e2πιkl/d|lk|. Thus, the basis states {|wk}kZd are called quantum Fourier basis and the quantum measurement in Fourier basis is called quantum Fourier measurement [21,22]. Quantum Fourier measurement is usually used to measure a single-particle state over H=Cd.

In the quantum system H=Cd, the Bell states (EPR pair) are represented as follows:

|ϕ(M1,M2)=1dj=0d1e2πιjM1/d|j,jM2,M1,M2d.(5)

Hence, the basis states {|ϕ(M1,M2)}M1,M2Zd are called the Bell basis, and the quantum measurement in the Bell basis is called the Bell measurement. In general, Bell measurement is typically used to jointly measure a two-particle state over H=Cd.

3  A Quantum Remote Preparation Scheme Based on Quantum Network Coding

3.1 Protocol Specification

Suppose that the arbitrary k-qudit quantum state originally possessed at the source nodes s1,,sk or desired to be prepared at the sink nodes t1,,tk is written as

|ΨS=x1,,xkZdαx1,,xkeιθx1,,xk|x1S1|xkSk,(6)

where all the amplitude coefficient αx1,,xk and the phase coefficient θx1,,xk are real numbers such that x1,,xkZd|αx1,,xk|2=1, the Si(i{1,2,k}) represent the registers possessed by the source node si. And then suppose that the source nodes s1,,sk and the sink nodes t1,,tk initially share a 2k-qudit entangled GHZ state as

|ϕST=1dhZd|h,h,,hS1,,Sk,T1,,Tk,(7)

where for i{1,2,,k}, each quantum register Si is possessed by the source node si , while quantum register Ti is possessed by the sink node ti.

Thus, the whole quantum system now becomes as

|Ψ0=1dx1,,xk,hZdαx1,,xkeιθx1,,xk|x1,x2,,xkS1,,Sk|h,h,,hS1,,Sk,T1,,Tk.(8)

According to the task of RSP over the quantum k-pair network N, the coefficients of |ΨS(k) is known only for the source nodes s1,,sk and ultimately this desired k-qudit quantum should be prepared at the sink nodes t1,,tk. Now, the specific steps of the proposed RSP scheme based on QNC are described below in detail.

Step 1: At each source node si(i{1,2,,k}), ancillary registers Rii and Ri,i+1 are introduced, in which each quantum state is initialized to |0H. Then, the quantum operators ΛXSiRii and ΛXSiRii are applied to the registers Si , Si and Rii, the operator ΛRSiRi,i+1 is applied to the registers Si and Ri,i+1. Thus, the quantum state becomes

|Ψ1=1dx1,,xk,hZdαx1,,xkeιθx1,,xki=1k|xiSi|hSi|hTi|xihRii|xiRi,i+1.(9)

Then, for i{1,2,,k}, the quantum registers Rii are sent from each node si to node n1; for i{1,2,,k1}, registers Ri,i+1 are sent to the sink nodes ti+1; for i=k, register Ri,i+1 is sent to the sink nodes t1. And the registers Si and Si are maintained at the node si.

Step 2: At the intermediate node n1, the ancillary register Rn initialized to |0H is introduced. Afterwards, the quantum operators ΛXRiiRn are applied on the registers Rii(i=1,2,k) and Rn, we have the quantum state:

|Ψ2=1dx1,,xk,hZdαx1,,xkeιθx1,,xk|i=1kxikhRni=1k|xiSi|hSi|hTi|xihRii|xiRi,i+1.(10)

Then, the quantum register Rn is sent from the node n1 to the node n2 and the registers Rii(i=1,2,k) are kept at the node n1.

Step 3: At the intermediate node n2, quantum registers ri(i=1,2,,k) each initialized to |0H are introduced and then the quantum operator ΛXRnri is applied to the registers Rn and ri. Thus, the quantum state becomes

|Ψ3=1dx1,,xk,hZdαx1,,xkeιθx1,,xk|i=1kxikhRni=1k|i=1kxikhri|xiSi|hSi|hTi|xihRii|xiRi,i+1.(11)

Then, k quantum registers ri(i=1,2,,k) are transmitted from the node n2 to the sink nodes ti respectively, and the register Rn are maintained at the node n2.

Step 4: For each sink node ti(i{1,2,,k}), the quantum register Ti initialized to |0H is introduced. Remembering that node ti(i{2,,k}) has received the register Ri1,i and the node t1 has received the registers Rk,1 in Step 1, and register ri in Step 3, now the quantum operator ΛXriTi is applied to ri and Ti, ΛXRi1,iTi(i{2,,k}) is applied to Ri1,i and Ti( ΛXRk,1T1 is applied to Rk,1 and T1). And then the quantum operator ΛXTiTik is applied to Ti and Ti, hence the resulting state becomes

|Ψ4=1dx1,,xk,hZdαx1,,xkeιθx1,,xk|i=1kxikhRni=1k|i=1kxikhri|xiSi|hSi|xiTi|hTi|xihRii|xiRi,i+1.(12)

Step 5: At the intermediate node n1, quantum Fourier measurement is performed on Rii(i=1,2,k), giving measurement results mi. Because of

|l=1dk=0d1e2πιkl/d|k,(13)

we have the quantum state:

|Ψ5=1dx1,,xk,hZdαx1,,xkeιθx1,,xki=1ke2πι(xih)mi/d|i=1kxikhRni=1k|i=1kxikhri|xiSi|hSi|xiTi|hTi|xiRi,i+1.(14)

Then, klogd bits classical information mi is sent from node n1 to the node si.

Step 6: At each source node si(i{1,2,,k}), once receiving the information mi, the quantum unitary operator mapping of the state |xi to e2πιmixi/d|xi for each xiZd is applied on the register Si, and the quantum unitary operator mapping of the state |h to e2πιmih/d|h is applied on the register Si. Thus the phase caused by Bell measurement in step 5 is corrected. Afterward, considering the owned registers Si and Si, the quantum operation ΛXSiSi and then the Bell measurement are performed on this two qudits, providing the measurement result ui1ui2. Because of

|j,ju2=1du1=0d1e2πιju1/d|ϕ(u1,u2),(15)

we obtain the quantum state:

|Ψ6=1dx1,,xk,hZdαx1,,xkeιθx1,,xki=1ke2πι(i=1kxikh)ui1/d|i=1kxikhRni=1k|i=1kxikhri|xiTi|hTi|xiRi,i+1.(16)

Then, 2klogd bits classical information ui1ui2 are sent from the nodes si to the sink node ti+1. Here, the security of classical channels can be guaranteed by message authentication mechanism such as HMAC [32], UMAC [33], etc., preventing outside attackers from tampering the transmitted classical information. It is noted that the classical information transmission involved in the following steps is all the same and there will be no repeated mention.

Step 7: At the sink node ti(i{1,2,,k}), upon receiving the information ui1,1ui1,2, the quantum unitary operator mapping of the state |x to e2πιui1,1x/d|x for each xZd is applied on its register ri. Thus the phase caused by Bell measurement in step 5 is corrected. And then quantum Fourier measurement is performed on ri, giving measurement results li. The quantum state becomes

|Ψ7=1dx1,,xk,hZdαx1,,xkeιθx1,,xki=1ke2πι(i=1kxikh)li/d|i=1kxikhRni=1k|xiTi|hTi|xiRi,i+1.(17)

Afterwards, klogd bits classical information li is sent from node ti to the intermediate node n2.

Step 8: At the intermediate node n2, once receiving the information li, the quantum unitary operator mapping of the state |x to e2πιlix/d|x for each xiZd is applied on the register Rn to correct the phase. Following this, quantum Fourier measurement is performed on Rn, giving measurement results p. Thus, we have the quantum state

|Ψ8=1dx1,,xk,hZdαx1,,xkeιθx1,,xke2πι(i=1kxikh)p/di=1k|xiTi|hTi|xiRi,i+1.(18)

Then, 1logd bits classical information p are sent from the nodes n2 to the sink node ti.

Step 9: At the sink node ti(i{1,2,,k}), upon receiving the information p, the quantum unitary operator mapping of the state |h to e2πι(i=1kxikh)p|h for each xiZd is applied on the register Ti to correct the phase. Then, the Bell measurement is performed on the registers Ri1,i and Ti, giving measurement results q1q2. The quantum state becomes

|Ψ9=1dx1,,xk,hZdαx1,,xkeιθx1,,xke2πιxiq1/di=1k|xiTi.(19)

Next, the phase is corrected by performing the quantum unitary operator mapping of the state |x to e2πιq1|x for each xiZd on the register Ti. Thus, the final quantum state becomes the desired state, as follows:

|ΨT=x1,,xkZdαx1,,xkeιθx1,,xk|x1T1|xkTk,(20)

That is, the arbitrary k-qudit quantum state originally possessed by the source nodes is successfully prepared remotely at the sink nodes.

3.2 Example: The Butterfly Network Over H=C2

For the quantum k-pair network N illustrated in Fig. 1, when k = 2, the network becomes the typical bottleneck network—butterfly network as shown as Fig. 2. This subsection describes the techniques developed in the previous descriptions using the example of the butterfly network over Hilbert space H=C2.

images

Figure 2: Quantum butterfly network

Here, the arbitrary 2-qubit quantum state originally possessed at the source nodes s1,s2 and desired to be prepared at the sink nodes t1,t2 is written as

|ΨS(2)=(α00eιθ00|00+α01eιθ01|01+α10eιθ10|10+α11eιθ11|11)S1S2.(21)

And the source nodes s1,s2 and the sink nodes t1,t2 initially share a 4-qubit entangled GHZ state as

|ϕST(2)=12(|0000+|1111)S1S2T1T2.(22)

Thus, the initial quantum state of the whole system is

|Ψ0(2)=12(α00eιθ00|00+α01eιθ01|01+α10eιθ10|10+α11eιθ11|11)S1S2(|0000+|1111)S1S2T1T2.(23)

Hereafter, we proceed to the specific steps of the RSP scheme based on QNC. For step 1-step 4, it can be considered as the encoding process and the object is to make the particles in the quantum registers mutually entangled. The corresponding schematic diagram of quantum circuit can be shown in Fig. 3.

images

Figure 3: Schematic diagram of quantum circuit for steps 1–4

According to the specific calculations, after Step 1–4, the quantum states of the of the whole system becomes

|Ψ5(2)=12[α00eιθ00(|000Rnr1r2|00S1R12|00S2R21|0000S1S2T1T2|00T1T2+|000Rnr1r2|00S1R12|00S2R21|1111S1S2T1T2|00T1T2)+α01eιθ01(|111Rnr1r2|00S1R12|11S2R21|0000S1S2T1T2|01T1T2+|111Rnr1r2|00S1R12|11S2R21|1111S1S2T1T2|01T1T2)+α10eιθ10(|111Rnr1r2|11S1R12|00S2R21  |0000S1S2T1T2|10T1T2+|111Rnr1r2|11S1R12|00S2R21  |1111S1S2T1T2|10T1T2)+α11eιθ11(|000Rnr1r2|11S1R12|11S2R21  |0000S1S2T1T2|11T1T2+|000Rnr1r2|11S1R12|11S2R21  |1111S1S2T1T2|11T1T2),(24)

Then, For Step 5-Step 9, it can be considered as the decoding process and the object is to remove the particles in the unnecessary quantum registers. The corresponding schematic diagram of quantum circuit can be shown in Fig. 4.

images

Figure 4: Schematic diagram of quantum circuit for steps 5–9

According to the specific calculations, the quantum states of Step 5–9 are detailed as follows:

|Ψ5(2)=12[α00eιθ00(|000Rnr1r2|00S1R12|00S2R21|0000S1S2T1T2|00T1T2+|000Rnr1r2|00S1R12|00S2R21|1111S1S2T1T2|00T1T2)+α01eιθ01(|111Rnr1r2|00S1R12|11S2R21|0000S1S2T1T2|01T1T2+|111Rnr1r2|00S1R12|11S2R21|1111S1S2T1T2|01T1T2)+α10eιθ10(|111Rnr1r2|11S1R12|00S2R21  |0000S1S2T1T2|10T1T2+|111Rnr1r2|11S1R12|00S2R21  |1111S1S2T1T2|10T1T2)+α11eιθ11(|000Rnr1r2|11S1R12|11S2R21  |0000S1S2T1T2|11T1T2+|000Rnr1r2|11S1R12|11S2R21  |1111S1S2T1T2|11T1T2),(25)

|Ψ6(2)=12[α00eιθ00(|000Rnr1r2|0R12|0R21|00T1T2|00T1T2+|000Rnr1r2|0R12|0R21|11T1T2|00T1T2)+α01eιθ01(|111Rnr1r2|0R12|1R21|00T1T2|01T1T2+|111Rnr1r2|0R12|1R21|11T1T2|01T1T2)+α10eιθ10(|111Rnr1r2|1R12|0R21  |00T1T2|10T1T2+|111Rnr1r2|1R12|0R21  |11T1T2|10T1T2)+α11eιθ11(|000Rnr1r2|1R12|1R21  |00T1T2|11T1T2+|000Rnr1r2|1R12|1R21  |11T1T2|11T1T2),(26)

|Ψ7(2)=12[α00eιθ00(|0Rn|0R12|0R21|00T1T2|00T1T2+|0Rn|0R12|0R21|11T1T2|00T1T2)+α01eιθ01(|1Rn|0R12|1R21|00T1T2|01T1T2+|1Rn|0R12|1R21|11T1T2|01T1T2)+α10eιθ10(|1Rn|1R12|0R21  |00T1T2|10T1T2+|1Rn|1R12|0R21  |11T1T2|10T1T2)+α11eιθ11(|0Rn|1R12|1R21  |00T1T2|11T1T2+|0Rn|1R12|1R21  |11T1T2|11T1T2),(27)

|Ψ8(2)=12[α00eιθ00(|0R12|0R21|00T1T2|00T1T2+|0R12|0R21|11T1T2|00T1T2)+α01eιθ01(|0R12|1R21|00T1T2|01T1T2+|0R12|1R21|11T1T2|01T1T2)+α10eιθ10(|1R12|0R21  |00T1T2|10T1T2+|1R12|0R21  |11T1T2|10T1T2)+α11eιθ11(|1R12|1R21  |00T1T2|11T1T2+|1R12|1R21  |11T1T2|11T1T2),(28)

|Ψ9(2)=12(α00eιθ00|00T1T2+α01eιθ01|01T1T2+α10eιθ10|10T1T2+α11eιθ11|11T1T2).(29)

Here, the global phases 1/2 can be ignored during computation, so the final quantum state at the sink nodes t1,t2 becomes the desired state, i.e., |Ψ9(2)=|ΨS(2)=α00eιθ00|00+α01eιθ01|01+α10eιθ10|10+α11eιθ11|11.

That is, the arbitrary 2-qubit quantum state originally possessed by the source nodes is successfully prepared remotely at the sink nodes.

4  Scheme Analysis

4.1 Correctness

The correctness of the proposed RSP scheme based on QNC can be verified by the specific steps. From Section 2, in the Step 1–4, the particles at every network node are entangled to the whole quantum system by applying relevant quantum encoding operations. The resulting quantum state after the entanglement of each time is presented specifically. In the Step 5–9, by applying relevant quantum measurements called decoding operations, all the unnecessary particles are disentangled from the whole quantum system and leave alone the certain particles on the sink nodes. The resulting quantum state after the disentanglement of each time is also presented specifically. Thus, after all the encoding and decoding steps, the final quantum state at the sink nodes formed |ΨT=x1,,xkZdαx1,,xkeιθx1,,xk|x1T1|xkTk, is exactly equal to the initial source state |ΨS=x1,,xkZdαx1,,xkeιθx1,,xk|x1S1|xkSk, at the source nodes. Therefore, according to all the calculating procedure and numerical results, the correctness of the proposed RSP scheme is verified. What is worth mentioning, in this proposed scheme, the probability of successful preparation can always reach 1.

4.2 Security

In the existing RSP schemes [1218], the quantum state desired to be prepared remotely is known for the senders, i.e., the amplitude coefficient and the phase coefficient is known. However, in many actual scenarios, if the senders are not honest, then the final quantum state prepared remotely is likely to be mistaken. In this paper, the proposed RSP scheme is based on QNC, which means that the senders do not need to know the desired quantum state and finally it can be prepared remotely. Therefore, the security of the proposed RSP scheme here is higher.

4.3 Practicability

In the existing RSP schemes [1218], the point-to-point communication mode is used. With the development of quantum communication, quantum network communication containing more users has become a necessity. In this paper, the proposed RSP scheme based on QNC is established over the quantum k-pair network which is the typical bottleneck network model. Using this scheme, the quantum network congestion can be solved effectively and the communication efficiency is higher. Thus, the proposed scheme can be more applicable to the scenarios of large-scale quantum networks.

4.4 Achievable Rate Region

As is known, the communication rate [34] between si and ti in n network uses is defined as ri(n)=1nlog|Hi|, where Hi denotes the Hilbert space of the transmitted quantum state owned by si, and || denotes the dimension of the Hilbert space. Meanwhile, an edge capacity constraint [35], i.e., log|H(u,v)|nc((u,v)), exists when the quantum state is transmitted with the fidelity of one over the edge (u,v)E in n uses.

Accordingly, in the presented RSP scheme based on QNC above, the desired arbitrary unknown quantum state is finally prepared successfully over the quantum k-pair network in single use of the network. Thus, the 1-flow [34] value reaches

i=1kri(1)=i=1klog|Hi|i=1kc((u,v))=i=1k1=k,(30)

under the condition that the capacity c((u,v)) of each edge (u,v) always remains equal to 1 according to the quantum k-pair network N. In fact, the 1-max flow is the supremum of 1-flow over all achievable rate. Hence, 1-max flow of value k is achieved, and the achievable rate region [34,36] can be written as {(r1,,rk)|i=1krik}.

5  Conclusions

In this paper, we propose a novel RSP scheme based on QNC over the quantum k-pair network. In terms of the quantum state, an arbitrary unknown quantum state is finally prepared at the sink nodes; in terms of the success probability, this scheme can always achieve the success probability of 1; in terms of the network model, the quantum k-pair network is the expansion of the typical bottleneck network—butterfly network. Thus, the proposed scheme can effectively improve the security and communication efficiency, and is more applicable to the large-scale quantum networks, which can enrich the theory of quantum remote state preparation.

Acknowledgement: We express our heartfelt thanks to the Beijing Institute of Graphic Communication for funding this study, as well as to the State Key Laboratory of Networking and Switching Technology for offering technical support.

Funding Statement: This work is supported by the National Natural Science Foundation of China (Grant Nos. 61370188, 62176273, 61962009), the Scientific Research Common Program of Beijing Municipal Commission of Education (KM202010015009, KM202110015004), Initial Funding for the Doctoral Program of BIGC (27170121001/009), the Open Foundation of State key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) (SKLNST-2021-1-16), the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Grant No. SKLACSS-202101) , the Fundamental Research Funds for Beijing Municipal Commission of Education, Beijing Urban Governance Research Base of North China University of Technology, and the Natural Science Foundation of Inner Mongolia (2021MS06006).

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

 1.  H. K. Lo, “Classical communication cost in distributed quantum information processing-A generalization of quantum communication complexity,” Physical Review A, vol. 62, no. 1, pp. 012313, 2000. [Google Scholar]

 2.  Z. G. Qu, Y. M. Huang and M. Zheng, “A novel coherence-based quantum steganalysis protocol,” Quantum Information Processing, vol. 19, no. 362, pp. 1–19, 2020. [Google Scholar]

 3.  X. B. Chen, Y. R. Sun, G. Xu and Y. X. Yang, “Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing,” Information Sciences, vol. 501, pp. 172–181, 2019. [Google Scholar]

 4.  Z. G. Qu, H. R. Sun and M. Zheng, “An efficient quantum image steganography protocol based on improved EMD algorithm,” Quantum Information Processing, vol. 20, no. 53, pp. 1–29, 2021. [Google Scholar]

 5.  L. Sun, Y. L. Wang, Z. G. Qu and N. N. Xiong, “BeatClass: A sustainable ECG classification system in IoT-based eHealth,” IEEE Internet of Things Journal, 2021. DOI 10.1109/JIOT.2021.3108792. [Google Scholar] [CrossRef]

 6.  C. H. Bennett, D. P. DiVincenzo, P. W. Shor, J. A. Smolin, B. M. Terhal et al., “Remote state preparation,” Physical Review Letters, vol. 87, no. 7, pp. 077902, 2001. [Google Scholar]

 7.  A. K. Pati, “Minimum classical bit for remote preparation and measurement of a qubit,” Physical Review A, vol. 63, no. 1, pp. 014302, 2000. [Google Scholar]

 8.  I. Devetak and T. Berger, “Low-entanglement remote state preparation,” Physical Review Letters, vol. 87, no. 19, pp. 197901, 2001. [Google Scholar]

 9.  D. W. Berry and B. C. Sanders, “Optimal remote state preparation,” Physical Review Letters, vol. 90, no. 5, pp. 057901, 2003. [Google Scholar]

10. N. A. Peters, J. T. Barreiro, M. E. Goggin, T. C. Wei and P. G. Kwiat, “Remote state preparation: Arbitrary remote control of photon polarization,” Physical Review Letters, vol. 94, no. 15, pp. 150502, 2005. [Google Scholar]

11. X. Peng, X. Zhu, X. Fang, M. Feng, M. Liu et al., “Experimental implementation of remote state preparation by nuclear magnetic resonance,” Physics Letters A, vol. 306, no. 5-6, pp. 271–276, 2003. [Google Scholar]

12. D. W. Leung and P. W. Shor, “Oblivious remote state preparation,” Physical Review Letters, vol. 90, no. 12, pp. 127905, 2003. [Google Scholar]

13. Y. Xia, J. Song and H. S. Song, “Remote preparation of the N-particle GHZ state using quantum statistics,” Optics Communications, vol. 277, no. 1, pp. 219–222, 2007. [Google Scholar]

14. N. N. Wu and M. Jiang, “A highly efficient scheme for joint remote preparation of multi-qubit W state with minimum quantum resource,” Quantum Information Processing, vol. 17, no. 12, pp. 1–17, 2018. [Google Scholar]

15. K. Hou, “Joint remote preparation of four-qubit cluster-type states with multiparty,” Quantum Information processing,” vol. 12, no. 12, pp. 3821–3833, 2013. [Google Scholar]

16. S. Y. Ma, C. Gao, P. Zhang and Z. G. Qu, “Deterministic remote preparation via the brown state,” Quantum Information Processing, vol. 16, no. 4, pp. 1–22, 2017. [Google Scholar]

17. N. B. An, “Joint remote state preparation via W and W-type states,” Optics Communications, vol. 283, no. 20, pp. 4113–4117, 2010. [Google Scholar]

18. X. B. Chen, S. Y. Ma, Y. Su, R. Zhang and Y. X. Yang, “Controlled remote state preparation of arbitrary two and three qubit states via the brown state,” Quantum Information Processing, vol. 11, no. 6, pp. 1653–1667, 2012. [Google Scholar]

19. M. Hayashi, K. Iwama and H. Nishimura, “Quantum network coding,” in Proc. Symp. Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, Aachen, Germany, vol. 4393, pp. 610–621, 2006. [Google Scholar]

20. M. Hayashi, “Prior entanglement between senders enables perfect quantum network coding with modification,” Physical Review A, vol. 76, no. 4, pp. 040301(R2007. [Google Scholar]

21. H. Kobayashi, F. Le Gall, H. Nishimura and M. Roetteler, “General scheme for perfect quantum network coding with free classical communication,” in Proc. of the 36th Int. Colloquium on Automata, Languages and Programming, Lecture Note in Computer Science, Rhodes, Greece, pp. 622–633, 2009. [Google Scholar]

22. H. Kobayashi, F. Le Gall, H. Nishimura and M. Roetteler, “Constructing quantum network coding schemes from classical nonlinear protocols,” in Proc. of the 2011 IEEE Int. Symp. Information Theory (ISIT), St. Petersburg, Russia, pp. 109–113, 2011. [Google Scholar]

23. S. Chen, G. Xu, X. Chen, H. Ahmad and Y. Chen, “Measurement-based quantum repeater network coding,” Intelligent Automation & Soft Computing, vol. 30, no.1, pp. 273–284, 2021. [Google Scholar]

24. P. Pathumsoot, T. Matsuo, T. Satoh, M. Hajdušek, S. Suwanna et al., “Modeling of measurement-based quantum network coding on a superconducting quantum processor,” Physical Review A, vol. 101, no. 5, pp. 052301, 2020. [Google Scholar]

25. Z. Li, Z. Li, X. Chen, Z. Qu, X. Wang et al., “A practical quantum network coding protocol based on non-maximally entangled state,” Computers, Materials & Continua, vol. 68, no. 2, pp. 2651–2663, 2021. [Google Scholar]

26. X. Pan, X. Chen, G. Xu, H. Ahmad, T. Shang et al., “Controlled quantum network coding without loss of information,” Computers, Materials & Continua, vol. 69, no. 3, pp. 3967–3979, 2021. [Google Scholar]

27. T. Satoh, F. Le Gall and H. Imai, “Quantum network coding for quantum repeaters,” Physical Review A, vol. 86, no. 3, pp. 032331, 2012. [Google Scholar]

28. T. Satoh, K. Ishizaki, S. Nagayamaand and R. Van Meter, “Analysis of quantum network coding for realistic repeater networks,” Physical Review A, vol. 93, no. 3, 032302, 2016. [Google Scholar]

29. Z. X. Zhang and Z. G. Qu, “Anti-noise quantum network coding protocol based on bell states and butterfly network model,” Journal of Quantum Computing, vol. 1, no. 2, pp. 89–109, 2019. [Google Scholar]

30. M. A. Nielsen and I. L. Chuang, “Quantum Computation and Quantum Information,” Cambridge University Press, Cambridge, 2000. [Google Scholar]

31. G. Xu, Y. Cao, S. Xu, K. Xiao, X. Liu et al., “A novel post-quantum blind signature for log system in blockchain,” Computer Systems Science and Engineering, vol. 41, no. 3, pp. 945–958, 2022. [Google Scholar]

32. M. Bellare, R. Canetti and H. Krawczyk, “Message authentication using hash functions: The HMAC construction,” RSA Laboratories’ CryptoBytes, vol. 2, no. 1, pp. 12–15, 1996. [Google Scholar]

33. J. Black, S. Halevi, H. Krawczyk, T. Krovetz and P. Rogaway, “UMAC: Fast and secure message authentication,” in Proc. of Annual Int. Cryptology Conf., California, USA, pp. 216–233, 1999. [Google Scholar]

34. S. Akibue and M. Murao, “Network coding for distributed quantum computation over cluster and butterfly networks,” IEEE Transactions on Information Theory, vol. 62, no. 11, pp. 6620–6637, 2016. [Google Scholar]

35. A. Jain, M. Franceschetti and D. A. Meyer, “On quantum network coding,” Journal of Mathematical Physics, vol. 52, no. 3, pp. 032201, 2011. [Google Scholar]

36. H. Nishimura, “Quantum network coding–how can network coding be applied to quantum information?,” in Proceeding of the 2013 IEEE Int. Symposium on Network Coding, Calgary, AB, Canada, pp. 1–5, 2013. [Google Scholar]

images This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.