Managing the three-party entanglement challenge

被引:3
|
作者
Xie, Songbo [1 ]
Eberly, J. H.
机构
[1] Univ Rochester, Ctr Coherence & Quantum Sci, Rochester, NY 14627 USA
基金
美国国家科学基金会;
关键词
Qubit systems; multipartite entanglement; triangle measure; concurrence Fill; QUANTUM; TELEPORTATION; PAIR;
D O I
10.1080/00107514.2022.2104425
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We introduce the challenges of multi-party quantum entanglement and explain a recent success in learning to take its measure. Given the widely accepted reputation of entanglement as a counter-intuitive feature of quantum theory, we first describe pure-state entanglement itself. We restrict attention to multi-party qubit states. Then we introduce the features that have made it challenging for several decades to extend an entanglement measure beyond the 2-qubit case of Bell states. We finish with a description of the current understanding that solves the 3-qubit entanglement challenge. This necessarily takes into account the fundamental division of the 3-qubit state space into two completely independent sectors identified with the so-called GHZ and W states.
引用
收藏
页码:189 / 198
页数:10
相关论文
共 50 条
  • [41] Three-step three-party quantum secure direct communication
    Chen, Shan-Shan
    Zhou, Lan
    Zhong, Wei
    Sheng, Yu-Bo
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2018, 61 (09)
  • [42] Three-party competition in parliamentary democracy with proportional representation
    Seok-ju Cho
    Public Choice, 2014, 161 : 407 - 426
  • [43] A novel three-party encrypted key exchange protocol
    Chang, CC
    Chang, YF
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 471 - 476
  • [44] The British general election of 2010: a three-party contest - or three two-party contests?
    Johnston, Ron
    Pattie, Charles
    GEOGRAPHICAL JOURNAL, 2011, 177 : 17 - 26
  • [45] Cryptanalysis of simple three-party key exchange protocol
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 16 - 21
  • [46] A Security Patch for a Three-Party Key Exchange Protocol
    ZHAO Jianjie1
    2.Department of Computer Science and Engineering
    Wuhan University Journal of Natural Sciences, 2010, 15 (03) : 242 - 246
  • [47] On the Exact Round Complexity of Secure Three-Party Computation
    Arpita Patra
    Divya Ravi
    Journal of Cryptology, 2021, 34
  • [48] Cryptanalysis of a Simple Three-party Key Exchange Protocol
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (03): : 337 - 339
  • [49] Three-party Encrypted Key Exchange: Attacks and a Solution
    Lin, Chun-Li
    Sun, Hung-Min
    Hwang, Tzonelih
    Operating Systems Review (ACM), 2000, 34 (04): : 12 - 20
  • [50] Cryptanalysis of a simple three-party key exchange protocol
    Debiao, He
    Jianhua, Chen
    Jin, Hu
    Informatica (Ljubljana), 2010, 34 (03) : 337 - 339