1 Introduction

Entanglement is considered as the central resource for quantum information and computation, the multi-mode entanglement works have been studied experimentally and theoretically [14]. Since the first creation of quantum teleportation (QT) protocol by Bennett [5], research on quantum teleportation has been attracting much attention both in theoretical and experimental aspects, such as quantum teleportation (QT) [511], quantum secure direct communication (QSDC) [1218], quantum secret sharing (QSS) [1922], quantum key distribution (QKD) [2325], and so on. In 2000, Lo [26] presented an RSP protocol to fulfill the same goal. However, there are several differences between QT and RSP. In RSP, the sender must know the prepared state completely. Since then, many researchers have studied RSP from different aspects, including low-entanglement RSP [27], optimal RSP [28], generalized RSP [29], continuous variable RSP [30], etc. Recently, some researchers have paid close attention to controlled remote state preparation (CRSP) [3133]. Unlike common RSP protocol, CRSP can be completed if and only if the supervisor participates during the implementation of the protocol. Latter, another effective method of information processing, so-called joint remote state preparation (JRSP), has been explored [3449]. In JRSP, all senders share the information of the prepared state, the senders perform proper measurements on their particles according to their knowledge of the prepared state. The original state can be prepared by performing corresponding unitary operation on the receivers particle according to all the senders measurement results and the entangled state shared in advance. This feature is highly needed in confidential communication between agencies.

In 2005, Deng et al. introduced a symmetric multiparty controlled teleportation scheme for an arbitrary two particle entangled state [50]. In particular, in 2013, Zha et al. presented the first bidirectional quantum controlled teleportation (BQCT) protocol by employing five-qubit cluster state as the quantum channel [51]. Recently Cao Thi Bich. put forward a seven-qubit cluster state [52]. According to this inspiration, we present the tripartute quantum controlled teleporattion.

In this paper, in order to present a scheme of tripartute quantum controlled teleportation, we utilize the seven-qubit entangled state in which a seven-qubit cluster state quantum channel initially shared by the three sender Alice, Charlie, and Edison and three receiver Bob, David, Ford and supervisor Tom. Suppose Alice has particle a in an unknown state, she wants to transmit the state of particle a to Bob; while, Charlie has particle b in an unknown state, he wants to transmit the state of particle b to David. As same as two senders, Edison has particle c in an unknown state, he wants to transmit the state of particle c to Ford under the control of Tom. We display that if the senders make a Bell state measurement and receiver operate a felicitous unitary transformation on the receivers side with the cooperation of the supervisor Tom, the original state of each qubit will be restored by the receiver. At the same time, we will reveal the advantages of tripartute quantum controlled teleportation from the quantum resource consumption, operation complexity, classical resource consumption, success probability and efficiency.

2 Tripartite Quantum Controlled Teleportation via Seven-Qubit Cluster State

Let us assume that the quantum channel during the three senders (Alice, Charlie, and Edison), the three receivers (Bob, David, and Ford ), and the supervisor Tom, is a one-dimensional seven-qubit cluster state, which has the form [52]:

$$\begin{array}{@{}rcl@{}} \vert\psi\rangle_{TABCDEF}&=&\frac{1}{2\sqrt{2}}(|0000000\rangle+|1110000\rangle\\ &&+|1001100\rangle+|0111100\rangle\\ &&+|1000011\rangle+|0110011\rangle\\ &&+|0001111\rangle+|1111111\rangle)_{TABCDEF} \end{array} $$
(1)

Suppose that particle a which Alice has, is in an uncharted state:

$$ |\chi\rangle_{a}=(a_{0}|0\rangle+a_{1}|1\rangle)_{a} $$
(2)

Charlie has particle b in an unknown state:

$$ |\chi\rangle_{b}=(b_{0}|0\rangle+b_{1}|1\rangle)_{b} $$
(3)

And that Edison has particle c in an unknown state:

$$ |\chi\rangle_{c}=(c_{0}|0\rangle+c_{1}|1\rangle)_{c} $$
(4)

Alice wants to transmit the state of particle a to Bob, Charlie wants to transmit the state of particle b to David and Edison wants to transmit the state of particle c to Ford.

The system state of the ten particles can be expressed as:

$$\begin{array}{@{}rcl@{}} \vert\psi\rangle_{s}&=&|\chi\rangle_{a}\otimes|\chi\rangle_{b}\otimes|\chi\rangle_{c}\otimes|\psi\rangle_{TABCDEF} \\ &=&(a_{0}|0\rangle+a_{1}|1\rangle)_{a}(b_{0}|0\rangle+b_{1}|1\rangle)_{b}(c_{0}|0\rangle+c_{1}|1\rangle)_{c} \\ &&\otimes(|0000000\rangle+|1110000\rangle+|1001100\rangle \\ &&+|0111100\rangle+|1000011\rangle+|0110011\rangle \\ &&+|0001111\rangle+|1111111\rangle)_{TABCDEF} \end{array} $$
(5)

For the sake of realizing quantum state swapping, Alice has to perform Bell state measurement on her qubit pairs (A,a), and

$$ |\varphi^{1}\rangle_{aA}=\frac{1}{\sqrt{2}}(|00\rangle+|11\rangle)_{aA} $$
(6)
$$ |\varphi^{2}\rangle_{aA}=\frac{1}{\sqrt{2}}(|00\rangle-|11\rangle)_{aA} $$
(7)
$$ |\varphi^{3}\rangle_{aA}=\frac{1}{\sqrt{2}}(|01\rangle+|10\rangle)_{aA} $$
(8)
$$ |\varphi^{4}\rangle_{aA}=\frac{1}{\sqrt{2}}(|01\rangle-|10\rangle)_{aA} $$
(9)

Without loss of generality, if Alice’s measurement results is |φ 1〉, then the other particles are collapsed into the state

$$\begin{array}{@{}rcl@{}} \vert\varphi^{1}\rangle_{bcTBCDEF}&=&{~}_{aA}\langle\varphi|\psi\rangle_{s} \\ &=&(b_{0}|0\rangle+b_{1}|1\rangle)_{b}(c_{0}|0\rangle+c_{1}|1\rangle)_{c}a_{0}\frac{1}{2\sqrt{2}} \\ &&\otimes(|000000\rangle+|101100\rangle+|100011\rangle \\ &&+|001111\rangle)_{TBCDEF}+(b_{0}|0\rangle+b_{1}|1\rangle)_{b} \\ &&\otimes(c_{0}|0\rangle+c_{1}|1\rangle)_{c}a_{1}\frac{1}{2\sqrt{2}}(|110000\rangle \\ &&+|011100\rangle+|010011\rangle+|111111\rangle)_{TBCDEF} \end{array} $$
(10)

Subsequently, Charlie has to perform Bell state measurement on his qubit pairs (b,C), and

$$ |\varphi^{1}\rangle_{bC}=\frac{1}{\sqrt{2}}(|00\rangle+|11\rangle)_{bC} $$
(11)
$$ |\varphi^{2}\rangle_{bC}=\frac{1}{\sqrt{2}}(|00\rangle-|11\rangle)_{bC} $$
(12)
$$ |\varphi^{3}\rangle_{bC}=\frac{1}{\sqrt{2}}(|01\rangle+|10\rangle)_{bC} $$
(13)
$$ |\varphi^{4}\rangle_{bC}=\frac{1}{\sqrt{2}}(|01\rangle-|10\rangle)_{bC} $$
(14)

if Charlie’s measurement results is |φ 1 b C , then the other particles c,T,B,D,E and F is collapsed into the state

$$\begin{array}{@{}rcl@{}} \vert\varphi^{1,1}\rangle_{cTBDEF}&=&{~}_{bC}\langle\varphi^{1}|_{aA}\langle\varphi^{1}|\psi\rangle_{s} \\ &=&(c_{0}|0\rangle+c_{1}|1\rangle)_{c}a_{0}b_{0}\frac{1}{2\sqrt{2}}(|00000\rangle\\ &&+|10011\rangle)_{TBDEF}+(c_{0}|0\rangle+c_{1}|1\rangle)_{c} \\ &&\otimes{a_{0}b_{1}}\frac{1}{2\sqrt{2}}(|10100\rangle+|00111\rangle)_{TBDEF} \\ &&+(c_{0}|0\rangle+c_{1}|1\rangle)_{c}a_{1}b_{0}\frac{1}{2\sqrt{2}}(|11000\rangle\\ &&+|01011\rangle)_{TBDEF}+(c_{0}|0\rangle+c_{1}|1\rangle)_{c} \\ &&\otimes{a_{1}b_{1}}\frac{1}{2\sqrt{2}}(|01100\rangle+|11111\rangle)_{TBDEF} \end{array} $$
(15)

Third, Edison has to performs Bell state measurement on his qubit pairs (c,E) and

$$ |\varphi^{1}\rangle_{cE}=\frac{1}{\sqrt{2}}(|00\rangle+|11\rangle)_{cE} $$
(16)
$$ |\varphi^{2}\rangle_{cE}=\frac{1}{\sqrt{2}}(|00\rangle-|11\rangle)_{cE} $$
(17)
$$ |\varphi^{3}\rangle_{cE}=\frac{1}{\sqrt{2}}(|01\rangle+|10\rangle)_{cE} $$
(18)
$$ |\varphi^{4}\rangle_{cE}=\frac{1}{\sqrt{2}}(|01\rangle-|10\rangle)_{cE} $$
(19)

if Edison’s measurement results is |φ 1 c E , then the other particles TBDF is collapsed into the state

$$\begin{array}{@{}rcl@{}} \vert\varphi^{1,1,1}\rangle_{TBDF}&=&{~}_{cE}\langle\varphi^{1}|_{bC}\langle^{1}|_{aA}\langle\varphi^{1}|\psi\rangle_{s} \\ &=&\frac{1}{2\sqrt{2}}(a_{0}b_{0}c_{0}|0000\rangle+a_{0}b_{0}c_{1}|1001\rangle \\ &&+a_{0}b_{1}c_{0}|1010\rangle+a_{0}b_{1}c_{1}|0011\rangle \\ &&+a_{1}b_{0}c_{0}|1100\rangle+a_{1}b_{0}c_{1}|0101\rangle \\ &&+a_{1}b_{1}c_{0}|0110\rangle+a_{1}b_{1}c_{1}|1111\rangle_{TBDF} \end{array} $$
(20)

Finally, Tom have to perform Von Neumann measurement on his qubit T, with measurement base

$$ |\pm\rangle_{T}=\frac{1}{\sqrt{2}}(|0\rangle\pm|1\rangle)_{T} $$
(21)

For example, if David’s measurements result is |+〉 T , the corresponding collapsed state of

$$\begin{array}{@{}rcl@{}} \vert\varphi^{1,1,1,+}\rangle_{BDF}&=&{~}_{T}\langle+|_{cE}\langle\varphi^{1}|_{bC}\langle\varphi^{1}_{aA}\langle\varphi^{1}|\psi\rangle_{s} \\ &=&\frac{1}{4}(a_{0}b_{0}c_{0}|000\rangle+a_{0}b_{0}c_{1}|001\rangle+a_{0}b_{1}c_{0}|010\rangle \\ &&+a_{0}b_{1}c_{1}|011\rangle+a_{1}b_{0}c_{0}|100\rangle+a_{1}b_{0}c_{1}|101\rangle \\ &&+a_{1}b_{1}c_{0}|110\rangle+a_{1}b_{1}c_{1}|111\rangle_{BDF} \\ &=&\frac{1}{4}(a_{0}|0\rangle+a_{1}|1\rangle)_{B}\otimes(b_{0}|0\rangle+b_{1}|1\rangle)_{D} \\ &&\otimes(c_{0}|1\rangle+c_{1}|1\rangle)_{F} \end{array} $$
(22)

The tripartite quantum controlled teleportation is successfully realized. Analogously, for other cases, According to measurement result by Alice,Charlie, Edison and Tom, Bob, David, Ford can operate an appropriate unitary transformation; the tripartite quantum controlled teleportation is realized easily.

3 Discussions and Comparisons

As a communication protocol, we should briefly discuss our scheme from security. Before the implementation of our protocol, the Cluster state should be securely shared among Alice, Charlie, Edison, Bob, David, Ford, and supervisor Tom. Without loss of generality, suppose that Alice prepares the Cluster state |ψ T A B C D E F and sends particle(s) T(B C D E F) to Tom (Bob, Charlie, David, Edison, Ford). When sending the particles, the Alice inserts respectively a certain number of decoy-state particles which are randomly in one of four states |0〉,|1〉,|+〉,|−〉. After be confirmed that both Tom, Charlie, Edison, Bob, David and Ford have received the particles respectively, Alice announces the positions and measurement basis of the decoy particles. Then Tom, Charlie, Edison, Bob, David and Ford measure these particles under the given basis and announce the results. Next, Alice compares the measurement results with the initial states of the decoy particles. Because every eavesdroppers has a trace in the outcomes of the decoy sampling photons [53]. Several kinds of attacks from the outside attacker Eve, such as intercept-resend arrack, measurement-resend attack, entanglement-measure attack and denial-of-service (DOS) attack will be detected with nonzero probability during the security checking process. Obviously, this checking method is derived from the idea of the BB84 QKD protocol, which has been proven to be unconditionally secure by several groups [54].

let us make a comparisons between our scheme and other schemes [31, 46]. Comparisons are carried out from the five aspects: the quantum resource consumption. the necessary-operation complexity which include the operation difficulty and intensity, the classical resource consumption, transmitted quantum information bits, success probability and the intrinsic efficiency. And we will be summarized in Table 1.

Table 1 Comparison between three protocols

From the Table 1, one can see that, the quantum and classical resource consumption in our scheme are most. The operation complexities are almost same in the three schemes. Except for this, our scheme is overall better than the L and B schemes. In particular, comparison with the B and L schemes, our scheme transmit more quantum information bits and possess higher intrinsic efficiency. In a word, our scheme is more optimal and economic.

4 Conclusion

In summary, we have proposed a scheme for tripartite quantum controlled teleportation by seven cluster state. Namely, Alice, Charlie, and Edison can transmit their own particle a, b,c in an unknown state in cyclic via the control of the supervisor Tom. The three unknown states can be exchanged as long as sender make a Bell state measurement and receiver operate an appropriate unitary transformation on the receiver’s side with the cooperation of the supervisor Tom. However, if one agent does not cooperate, the receiver can not fully recover the original state of each qubit. Finally, we have compared the scheme with other schemes on quantum and classical resource consumption, operation complexities, quantum information bits transmitted, success probabilities and efficiencies. By the comparison, we think our scheme has more superior than others.