Controlled quantum teleportation involves a third party as a controller for the teleportation of ... more Controlled quantum teleportation involves a third party as a controller for the teleportation of state. Here, we present the novel protocols for controlling teleportation of the arbitrary two-qubit and three-qubit states through five-qubit and seven-qubit cluster states respectively. In these schemes, Alice sends the arbitrary qubit states to the remote receiver Bob through the cluster states as quantum channels under the control of Charlie. Bob can recover the mentioned states by making appropriate unitary operations, and we point out that the efficiency in our schemes is 100%. In the process of our analysis, we find the classical communication cost in our protocols is remarkably reduced when compared to the previous protocols. We perform the experimental realization of the above protocols on “IBM 16 Melbourne” quantum computer and “IBM quantum simulator” and we calculate the fidelity. We also examine the security analysis against Charlie, and these schemes which we considered here...
The significance of sub‐Planck structures in relation to quantum metrology is explored, in close ... more The significance of sub‐Planck structures in relation to quantum metrology is explored, in close contact with experimental setups. It is shown that an entangled cat state can enhance the accuracy of parameter estimations. The possibilty of generating this state, in ...
Controlled quantum teleportation involves a third party as a controller for the teleportation of ... more Controlled quantum teleportation involves a third party as a controller for the teleportation of state. Here, we present the novel protocols for controlling teleportation of the arbitrary two-qubit and three-qubit states through five-qubit and seven-qubit cluster states respectively. In these schemes, Alice sends the arbitrary qubit states to the remote receiver Bob through the cluster states as quantum channels under the control of Charlie. Bob can recover the mentioned states by making appropriate unitary operations, and we point out that the efficiency in our schemes is 100%. In the process of our analysis, we find the classical communication cost in our protocols is remarkably reduced when compared to the previous protocols. We perform the experimental realization of the above protocols on “IBM 16 Melbourne” quantum computer and “IBM quantum simulator” and we calculate the fidelity. We also examine the security analysis against Charlie, and these schemes which we considered here...
The significance of sub‐Planck structures in relation to quantum metrology is explored, in close ... more The significance of sub‐Planck structures in relation to quantum metrology is explored, in close contact with experimental setups. It is shown that an entangled cat state can enhance the accuracy of parameter estimations. The possibilty of generating this state, in ...
Uploads
Papers by Abhijeet Kumar