Abstract
We propose a deterministic remote state preparation (RSP) scheme for preparing an arbitrary (including pure and mixed) qubit, where a partially entangled state and finite classical communication are used. To our knowledge, our scheme is the first RSP scheme that fits into this category. One other RSP scheme proposed by Berry shares close features, but can only be used to prepare an arbitrary pure qubit. Even so, our scheme saves classical communication by approximate 1 bit per prepared qubit under equal conditions. When using a maximally entangled state, the classical communication for our scheme is 2 bits, which agrees with Lo’s conjecture on the resource cost. Furthermore Alice can switch between our RSP scheme and a standard teleportation scheme without letting Bob know, which makes the quantum channel multipurpose.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
Relying on quantum entanglement [1], quantum communication protocols can present abilities that are unachievable by their classical counterparts. Notable examples include quantum key distribution [2–4], quantum teleportation [5, 6] and quantum secure direct communications [7–12]. By using two entangled qubits and 2 bits of classical communication as resources, quantum teleportation enables Alice to transmit an unknown qubit state to Bob without physically transporting it. A variation of teleportation is remote state preparation (RSP) [13–17], wherein Alice produces a known qubit state at Bob’s location by using entanglement and classical communication. Depending on the resource requirement, preparable state ensemble, and even successful rate, different kind of RSP scheme has been devised for carrying out the specific task.
In most RSP schemes, maximal entanglement, oftenest a Bell state, is assumed to be accessible. For example, the first RSP scheme proposed by Pati [14] uses a Bell state, realizing deterministic preparation of a qubit from a fixed great circle on the Bloch sphere. Other later proposed schemes extended the preparable ensembles to varying degrees for preparing more general qubits, like deterministic preparations of arbitrary pure qubits [18–20], probabilistic preparations of arbitrary qubits [20, 21], and more resently, schemes for deterministic preparations of arbitrary qubits were also implemented [22, 23]. Unfortunately, these mentioned schemes are unadaptable to partially entangled resource states, which may occur in the real world. To devise RSP schemes that work with partial entanglement, new ways must be found.
Although it is more difficult to devise RSP schemes employing partial entanglement, Ye et al. [24] proved that, at the expense of increased classical communication, it is possible to use a partially entangled state to perform deterministic RSP of an arbitrary pure state. Based on the proof, Berry [25] proposed an explicit scheme for performing such an RSP. Thus, the two-dimensional case of Berry’s scheme provides a complete technique for preparing an arbitrary pure qubit. In Ref. [26], we also proposed an optimization procedure that can be incorporated into Berry’s scheme to reduce unnecessary classical communication. Despite all these efforts, to our best knowledge, as yet there is no deterministic RSP scheme that use partial entanglement to prepare arbitrary (include pure and mixed) qubit states, which we reported here.
In Sect. 2, by utilizing the ensembles that can be prepared using partial entanglement with only two bits of classical communication, we give our RSP scheme which trades off classical communication against entanglement to implement the preparation of an arbitrary qubit. Our results agree with Lo’s conjecture on the resource cost for deterministic RSP. At the end of Sect. 2, we briefly summarize our scheme, and show Alice can switch between this RSP and a standard teleportation without letting Bob know. In Sect. 3, we introduce a geometrical tool called Voronoi diagram for the calculation of the classical communication requirement for our scheme. The calculation shows our scheme saves approximate 1 bit of classical communication when compared with Berry’s scheme for the preparation of an arbitrary pure qubit. The underlying cause of the resource saving will be explained. In Sect. 4, we draw our conclusions.
2 Deterministic remote preparation of an arbitrary qubit
In this section, we present a remote state preparation (RSP) scheme for Alice to prepare an arbitrary qubit state at Bob’s location deterministically. The resources for performing this task are a partially entangled two-qubit state and finite bits of classical communication from Alice to Bob. The qubit to be prepared is known to Alice but unknown to Bob. Furthermore, we restrict the scheme to be oblivious, where the state to be prepared is known to Alice but unknown to Bob.
The initial setup of our RSP scheme is as follows. Assume Alice and Bob have shared an entangled resource state in the form
or, equivalently,
where \(0\le r_1\le r_0\) and \(0\le \theta _r\le \pi \). Any entangled pure two-qubit state can be brought to this form via local unitary operations. The entanglement of is quantified by the Von Neumann entropy of either of ’s reduced states, namely,
The scheme starts by a positive operator valued measurement (POVM) [27, 28] on Alice’s system A. POVM is the most general kind of quantum measurements, it has some features that cannot be achieved within the context of projective measurement. The POVM operators Alice performs in our RSP scheme are given by
where the superscript T denotes the transposition, and the values of \(p_m\) and \(\rho _m\) are to be determined later. By implementing this POVM, Alice obtains a measurement outcome m with probability calculated as , and the corresponding state of Bob’s post-measurement system will be . Based on the nature of measurement on quantum system, Bob’s collapsed system is always interrelated with Alice’s measurement result, but intrinsically random. In order to transform Bob’s system to the state as Alice desired every time, Alice needs to instruct Bob to perform a unitary operation \(U_m\) chosen from \(\left\{ I\text {,}\sigma _3\text {,}\sigma _1\text {,}-\sigma _3 \sigma _1\right\} \) according her measurement outcome m. This can be done by sending to Bob 2 bits of classical information from Alice. The unitary operation set \(\left\{ I\text {,}\sigma _3\text {,}\sigma _1\text {,}-\sigma _3 \sigma _1\right\} \) is purposely duplicated from a standard teleportation scheme, as we will discuss at the end of the section. After the unitary operation, no matter which \(U_m\) Bob performs, all \(U_m \rho _m U_m^\dagger \) should lead to the same state.
Now, based on the above setup, we give the preparable ensemble of pure qubits in Theorem 1. This ensemble will be generalized to include mixed qubits by Corollary 1.
Theorem 1
Using a preshared resource state given by Eq. (1) and 2 bits of classical communication from Alice to Bob, any pure qubit from the ensemble
can be remotely prepared. Particularly if is a maximal entangled state, the above ensemble is represented by the entire Bloch sphere consisting of every pure qubit.
Proof
Assume the pure qubit that Alice wants to prepare is expressed as
Here \(\theta _i\) and \(\phi _i\) are the polar and azimuthal angles of in the Bloch sphere representation. For Bob, before he receives the 2 classical bits from Alice, his system is in the state
Substitute with \(U_m\in \left\{ I\text {,}\sigma _3\text {,}\sigma _1\text {,}-\sigma _3 \sigma _1\right\} \) into Eq. (4), we obtain
where \(P_1\equiv 2 p_0=2 p_1\) and \(P_2\equiv 2 p_2=2 p_3\). Moreover, for a legitimate POVM in Eq. (3), \(P_1, P_2\ge 0\) and \(P_1+P_2=1\) are implied. Equation (5) can be used as the necessary and sufficient condition for checking the preparablity of a pure qubit (also see Eq. (3) in Ref. [24]). It is easy to see, as long as \(r_0\le \max \left\{ i_0,i_1\right\} \), Eq. (5) is soluble for non-negative \(P_1\), \(P_2\) with \(P_1+P_2=1\). Except for \(r_0=i_0=\frac{1}{\sqrt{2}}\), where \(P_1\) can be any value in [0, 1], the universal solution to Eq. (5) is
For consistency, we only use the universal solution in the follow discussion.
On the Bloch sphere, the ensemble of states that satisfies \(r_0\le \max \left\{ i_0,i_1\right\} \) is represented by an antipodal pair of spherical caps with \(\theta _i\in [0,\theta _r]\cup [\pi -\theta _r,\pi ]\). Particularly when is maximally entangled, we have \(\theta _i\in [0,\pi /2]\cup [\pi /2,\pi ]\), which means the ensemble is represented by the entire Bloch sphere consisting of every pure qubit. \(\square \)
A mixed qubit describes a two-dimensional quantum system whose state is not completely known. One can suppose such a system is in a pure qubit state with probability p and in the maximally mixed qubit state with probability \(1-p\). The density matrix for such a mixed qubit can be expressed as
where
Here p, \(\theta _i\) and \(\phi _i\) uniquely identify the Bloch vector \(\varvec{r}_i=(p\sin \theta _i\cos \phi _i,p\sin \theta _i\sin \phi _i,p\cos \theta _i)\), which is related to the position of \(\rho _i\) in the Bloch ball. When \(p=1\), \(\rho _i\) degenerates into the pure qubit , while from the pure to the mixed \(\rho _i\), the Bloch vector shrinks by a factor p. One can verify, if Alice sends Bob totally random classical bits (00, 01, 10 or 11 each with probability 1/4), Bob’ s system will end up with the maximally mixed qubit represented by the density matrix I / 2. Therefore, if Alice wants to remotely prepare \(\rho _i\), she only needs to replace the bits used for preparing by totally random bits with probability \(1-p\). Obviously we have the following corollary.
Corollary 1
Using a preshared resource state given by Eq. (1) and 2 bits of classical communication from Alice to Bob, any qubit state from the ensemble
can be remotely prepared. Particularly if is maximally entangled, the above ensemble is represented by the entire Bloch ball consisting of every pure and mixed qubit.
Lo [13] conjectured that, with unlimited entanglement resource, deterministic preparation of an arbitrary pure qubit at Bob’s location requires 2 bits of classical communication. Bennet et al. [15] have proved in a more restricted condition, where Bob is restricted to perform a unitary operation and is oblivious to the prepared state, the RSP must use at least 2 bits of classical communication. Our setup meets this condition, because when is maximally entangled we have \(P_1=1/2\) from Eq. (6), which means Bob cannot extract from the classical communication any information about the prepared state (thus is oblivious). Now, by treating Theorem 1 and Corollary 1 as complements to Bennet et al.’s proof, we know 2 bits of classical communication are both necessary and sufficient (even for preparing an arbitrary qubit).
Due to the strictly increasing relation between \(\theta _r\) and , a less entangled will lead to smaller preparable ensembles in Theorem 1 and Corollary 1. In the following discussion, we will show how to trade off classical communication for reduced entanglement to enable preparation of an arbitrary target qubit \(\rho _t\).
We use \(C_1\) to denote the spherical cap lying at the north pole mentioned in Theorem 1, and \(C_{-1}\) the antipodal one. \(C_{1,-1}\) is used to denote the pair of \(C_1\) and \(C_{-1}\). The size of \(C_{1,-1}\) can be directly measured by the parameter \(\theta _r\). Obviously, if is partially entangled, \(C_{1,-1}\) will not cover the entire Bloch sphere. In order to prepare a target state \(\rho _t\) with Bloch vector \(\varvec{r}_t\) outside the convex hull of \(C_{1,-1}\), Alice and Bob need to proceed as follows. First, before the preparation begins, they need to determine a K-element rotation operation set \(\left\{ R_j\right\} _{j=1}^K\) which is -dependent. After \(\left\{ R_j\right\} _{j=1}^K\) is determined, Alice deliberately prepares the intermediate state \(\rho _i\) that is exactly \(R_j^{-1}\rho _t R_j\) and has a Bloch vector inside the convex hull of \(C_{1,-1}\). Lastly, by sending Bob \(\log {K}\) bits, Alice instructs him to choose \(R_j\) from \(\left\{ R_j\right\} _{j=1}^K\) to transform his system into the target state \(\rho _t\).
Visually, the effect of a rotation operation on a state is rotating the state’s Bloch vector by a fixed angle about some axis of the Bloch ball. Let’s suppose each \(R_j\) maps the spherical cap \(C_1\) to \(C_j\) (and thus \(C_{-1}\) to \(C_{-j}\)). Although the position of \(C_{j,-j}\) may vary, all of them are the same size as \(C_{1,-1}\) and the union of \(\left\{ C_{j,-j}\right\} _{j=1}^K\) must cover the entire Bloch sphere. As pointed out earlier, if decreases, the size of \(C_{j,-j}\) will decrease simultaneously. This generally results in an increased classical communication cost as K tends to become larger to ensure total coverage. The resource trade-off is inevitable for an RSP scheme of this type, but making \(\left\{ C_{j,-j}\right\} _{j=1}^K\) uniformly distributed can avoid overcommunication. The problem of how to uniformly distribute \(\left\{ C_{j,-j}\right\} _{j=1}^K\) can be rephrased as how to construct uniformly distributed 2K points with antipodal symmetry on the Bloch sphere, since we can use these points as the spherical caps’ centers. The points construction method we use has been put into Appendix.
Now we summarize our scheme for remote preparation of an arbitrary qubit \(\rho _t\) as the two-stage procedure below.
Stage 1. Using the POVM (3) and the unitary operations \(I\text {, }\sigma _3\text {, }\sigma _1\text {, }-\sigma _3 \sigma _1\) to prepare an intermediate state \(\rho _i=R_j^{-1}\rho _t R_j\) that belongs to the ensemble given in Corollary 1. The classical communication cost here is 2 bits. If is maximally entangled, by setting \(\left\{ R_j\right\} _{j=1}^K\equiv \{I\}\), \(\rho _t\) can be prepared within this stage.
Stage 2. If is non-maximally entangled, Bob performs \(R_j\) from the predefined set \(\left\{ R_j\right\} _{j=1}^K\) to transform \(\rho _i\) to \(\rho _t\). The classical communication cost in this stage is \(\log {K}\) bits, which is traded off against .
Different from RSP, teleportation can only be carried out when a maximally entangled resource state is available [5]. In a standard teleportation scheme, where a Bell state is used, Bob needs to apply a unitary operation chosen from \(\left\{ I\text {,}\sigma _3\text {,}\sigma _1\text {,}-\sigma _3 \sigma _1\right\} \) after he receives the outcome of Alice’s Bell basis measurement. The same unitary operation set is used in our RSP scheme. As we have said, this choice is made on purpose, because one can see when is maximally entangled, i.e., , regardless of the target state the probability that Bob uses any one of these unitary operations in both schemes is always 1/4. There is no chance for Bob to tell which scheme is being performed, and Alice can switch between teleportation and RSP unilaterally.
3 Classical communication cost
The total classical communication cost for our scheme is \(2+\log {K}\) bits. For a given K, the entanglement of the resource state cannot below a certain lower bound, otherwise there always exist some unpreparable qubit states for our scheme. To calculate the lower bound of , we need to make use of a geometry tool called Voronoi diagram. A Voronoi diagram is a partition of a space into regions based on distance to some specific points called sites. For each site, the corresponding region, called Voronoi cell, consists all points closer to this site than to any other. All Voronoi cells are polygon-shaped with edges equidistant from two sites and vertices equidistant from three or more sites. Figure 1 gives an illustration of the Voronoi diagram generated from uniformly distributed 64 (\(K=32\)) points with antipodal symmetry.
If we treat the centers of \(C_j\), \(j=\pm 1,\ldots ,\pm K\), as sites denoted by \(\varvec{s}_j\), a Voronoi diagram can be generated. The necessary and sufficient condition for the union of all \(C_j\)’s to cover the entire Bloch sphere is that every \(C_j\) covers the Voronoi cell corresponding to \(\varvec{s}_j\). We denote by \(\varvec{v}_{j,k}\) the kth vertex of the Voronoi cell based on \(\varvec{s}_j\). After obtaining the coordinates of all \(\varvec{v}_{i,j}\) numerically by computer [29], the lower bound of can be calculated from Eq. (2) and
In the extreme situation where the resource state is unentangled, i.e., \(\theta _r=0\), \(C_j\) is a point. In this situation, K needs to be infinite large if we want the union of all \(C_j\)’s to cover the entire Bloch sphere. For a finite K, using the point sets from Appendix, the results for \(K=2^n, n=1,2,\ldots ,10\) are presented both in Table 1 and in Fig. 2.
An earlier RSP scheme proposed by Berry [25] can be used for preparing arbitrary pure qubits. We find it also fits into our two-stage procedure summarized in Sect. 2, just by replacing mixed \(\rho _i\) and \(\rho _t\) with pure and , respectively. The main difference is the intermediate state ensemble in Berry’s scheme is represented by the spherical cap on Bloch sphere given by
which is only half-size of the intermediate state ensemble in the Theorem 1. So two classical bits of communication will not be sufficient for Berry’s scheme for preparing an arbitrary pure qubit, even when the resource state is maximally entangled. The double-sized intermediate state ensemble in our scheme reduces the number of elements in devising the unitary operation set \(\left\{ R_j\right\} _{j=1}^K\) to nearly half and eventually cut down the total classical communication cost by approximate 1 bit per pure qubit. The approximation is caused by the different symmetries employed in constructing uniformly distributed spherical caps in these two schemes. In Fig. 2, we include the result from [26] for comparison.
4 Conclusions
We have proposed an RSP scheme for remotely preparing a general qubit by using any pure entangled state and finite classical bits. Our scheme can be treated as a two-stage procedure. If a maximally entangled resource state is available, the target qubit can be directly prepared in the first stage with 2 bits of classical communication, which agrees with Lo’s conjecture on the resource cost for deterministic RSP. If the resource state is only partially entangled, an additional rotation operation will be performed in the second stage to transform the intermediate state prepared in the first stage to the final target state. The total classical communication cost is shown to be traded off against the resource state’s entanglement. To the best of our knowledge, our scheme is the first deterministic RSP scheme for preparing an arbitrary qubit using a partially entangled state and finite classical communication. Theoretically, Our technique can be generalized to a higher dimension, but the geometry of qudits \((d>2)\) may be hard to deal with.
Our scheme also shares the same unitary operation set with the standard teleportation scheme. The benefit is when the resource state is maximally entangled, Alice can switch between teleportation and RSP without letting Bob know, because no matter in which scheme Bob always performs a unitary operation \(U_m\in \left\{ I\text {,}\sigma _3\text {,}\sigma _1\text {,}-\sigma _3 \sigma _1\right\} \) with probability 1/4. This feature can make an entangled channel more versatile without sacrificing flexibility.
References
Horodecki, R., Horodecki, P., Horodecki, M., Horodecki, K.: Quantum entanglement. Rev. Mod. Phys. 81, 865 (2009)
Shor, Peter W., Preskill, John: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)
Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)
Zhang, C.M., Song, X.T., Treeviriyanupab, P., Li, M., Wang, C., Li, H.W., Yin, Z.Q., Chen, W., Han, Z.F.: Delayed error verification in quantum key distribution. Chin. Sci. Bull. 59, 2825 (2014)
Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)
Bouwmeester, D., Pan, J.W., Mattle, K., Eibl, M., Weinfurter, H., Zeilinger, A.: Experimental quantum teleportation. Nature 390, 575 (1997)
Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)
Zou, X.F., Qiu, D.W.: Three-step semiquantum secure direct communication protocol. Sci. Chin. Phys. Mech. Astron. 57, 1696 (2014)
Zheng, C., Long, G.F.: Quantum secure direct dialogue using Einstein–Podolsky–Rosen pairs. Sci. Chin. Phys. Mech. Astron. 57, 1238 (2014)
Chang, Y., Xu, C., Zhang, S., Yan, L.: Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Chin. Sci. Bull. 59, 2541 (2014)
Hassanpour, S., Houshmand, M.: Efficient controlled quantum secure direct communication based on GHZ-like states. Quantum Inf. Process. 14, 739 (2015)
Yadav, P., Srikanth, R., Pathak, A.: Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique. Quantum Inf. Process. 13, 2731 (2014)
Lo, H.K.: Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity. Phys. Rev. A 62, 012313 (2000)
Pati, A.K.: Minimum classical bit for remote preparation and measurement of a qubit. Phys. Rev. A 63, 014302 (2000)
Bennett, C.H., DiVincenzo, D.P., Shor, P.W., Smolin, J.A., Terhal, B.M., Wootters, W.K.: Remote state preparation. Phys. Rev. Lett. 87, 077902 (2001)
Devetak, I., Berger, T.: Low-entanglement remote state preparation. Phys. Rev. Lett. 87, 197901 (2001)
Luo, M.X., Deng, Y., Chen, X.B., Yang, Y.X.: The faithful remote preparation of general quantum states. Quantum Inf. Process. 12, 279 (2013)
Hayashi, A., Hashimoto, T., Horibe, M.: Remote state preparation without oblivious conditions. Phys. Rev. A 67, 052302 (2003)
Rosenfeld, W., Berner, S., Volz, J., Weber, M., Weinfurter, H.: Remote preparation of an atomic quantum memory. Phys. Rev. Lett. 98, 050504 (2007)
Liu, W.T., Wu, W., Ou, B.Q., Chen, P.X., Li, C.Z., Yuan, J.M.: Experimental remote preparation of arbitrary photon polarization states. Phys. Rev. A 76, 022308 (2007)
Peters, N.A., Barreiro, J.T., Goggin, M.E., Wei, T.C., Kwiat, P.G.: Remote state preparation: arbitrary remote control of photon polarization. Phys. Rev. Lett. 94, 150502 (2005)
Killoran, N., Biggerstaff, D.N., Kaltenbaek, R., Resch, K.J., Ltkenhaus, N.: Derivation and experimental test of fidelity benchmarks for remote preparation of arbitrary qubit states. Phys. Rev. A 81, 012334 (2010)
Wu, W., Liu, W.T., Chen, P.X., Li, C.Z.: Deterministic remote preparation of pure and mixed polarization states. Phys. Rev. A 81, 042301 (2010)
Ye, M.Y., Zhang, Y.S., Guo, G.C.: Faithful remote state preparation using finite classical bits and a nonmaximally entangled state. Phys. Rev. A 69, 022310 (2004)
Berry, D.W.: Resources required for exact remote state preparation. Phys. Rev. A 70, 062306 (2004)
Hua, C., Chen, Y.X.: A scheme for remote state preparation of a general pure qubit with optimized classical communication cost. Quantum Inf. Process. 14, 1069 (2014)
Ahnert, S.E., Payne, M.C.: General implementation of all possible positive-operator-value measurements of single-photon polarization states. Phys. Rev. A 71, 012330 (2005)
Paris, M.G.A.: The modern tools of quantum mechanics. Eur. Phys. J. Spec. Top. 203, 61 (2012)
Zheng, X., Ennis, R., Richards, G.P., Palffy-Muhoray, P.: A plane sweep algorithm for the Voronoi tessellation of the sphere. Electron.-Liq. Cryst. Commun. 1 (2001). http://www.e-lc.org/tmp/Xiaoyu__Zheng_2011_12_05_14_35_11.pdf
Optimal Ordering of Diffusion MRI Measurements and Related Problems—HI-SPEED Software Packets @ONLINE. https://sites.google.com/site/hispeedpackets/Home/optimalorderings
Koay, C.G.: A simple scheme for generating nearly uniform distribution of antipodally symmetric points on the unit sphere. J. Comput. Sci. 2, 377 (2011)
Acknowledgments
We thank Cheng Guan Koay and Lin Chen for valuable discussion. We also gratefully acknowledge the support by NNSF of China, Grant No. 11375150.
Author information
Authors and Affiliations
Corresponding author
Appendix: Uniform distribution of antipodally symmetric points on the unit sphere
Appendix: Uniform distribution of antipodally symmetric points on the unit sphere
On a sphere, point sets with antipodal symmetry have special importance in both scientific and engineering fields, many works has been published for generating such sets. The methods for generating a 2K-element set with antipodal symmetry usually contain a minimization procedure of electrostatic potential energy. For the number of elements within a few hundreds, the point sets are tabulated online [30]. However, for the number of points in these point sets beyond a few hundreds, the optimization procedure will become unwieldy. To solve this problem, we can use instead some constructive methods to generate nearly uniform point sets with antipodal symmetry, which give very close results especially when K is large. In this work for generating antipodally symmetric point sets with \(K\ge 256\) , we use a simple deterministic points construction scheme proposed by Koay [31]. For the unit sphere, the spherical coordinates \(\left( 1,\theta _i,\phi _{i,j}\right) \) of the points on the upper hemisphere are given by:
where N is the solution to \(N=\frac{K}{2}\sin {\frac{\pi }{4N}}\), \([\cdot ]\) is the function which gives the integer closest to the input, and
Rights and permissions
About this article
Cite this article
Hua, C., Chen, YX. Deterministic remote preparation of an arbitrary qubit state using a partially entangled state and finite classical communication. Quantum Inf Process 15, 4773–4783 (2016). https://doi.org/10.1007/s11128-016-1423-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-016-1423-8