Next Article in Journal
Continuous Spatial Public Goods Game Based on Particle Swarm Optimization with Memory Stability
Next Article in Special Issue
Efficient Associate Rules Mining Based on Topology for Items of Transactional Data
Previous Article in Journal
Predicting Women with Postpartum Depression Symptoms Using Machine Learning Techniques
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree

School of Computer and Network Security, Chengdu University of Technology, Chengdu 610059, China
*
Author to whom correspondence should be addressed.
Mathematics 2022, 10(23), 4571; https://doi.org/10.3390/math10234571
Submission received: 11 October 2022 / Revised: 21 November 2022 / Accepted: 28 November 2022 / Published: 2 December 2022
(This article belongs to the Special Issue Artificial Intelligence and Data Science)

Abstract

:
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting. Based on the research of multiparticle state quantum information splitting, this paper innovatively combines the decision tree algorithm of machine learning with quantum communication to solve the problem of channel particle allocation in quantum communication, and experiments showed that the algorithm can make the optimal allocation scheme. Based on this scheme, we propose a two-particle state hierarchical quantum information splitting scheme based on the multi-particle state. First, Alice measures the Bell states of the particles she owns and tells the result to the receiver through the classical channel. If the receiver is a high-level communicator, he only needs the help of one of the low-level communicators and all the high-level communicators. After performing a single particle measurement on the z-basis, they send the result to the receiver through the classical channel. When the receiver is a low-level communicator, all communicators need to measure the particles they own and tell the receiver the results. Finally, the receiver performs the corresponding unitary operation according to the received results. In this regard, a complete hierarchical quantum information splitting operation is completed. On the basis of theoretical research, we also carried out experimental verification, security analysis, and comparative analysis, which shows that our scheme is reliable and has high security and efficiency.

1. Introduction

Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new form of communication. Its characteristic is to use the methods of quantum physics to transmit information safely and efficiently. As early as 1999, Hillery et al. [1] proposed the idea of quantum information splitting. After that, Murao, grudka et al. [2,3,4,5,6,7,8,9,10,11,12,13,14,15,16] improved the hierarchical quantum information splitting scheme by changing the particle state of the quantum information splitting channel, assigning different rights to communicators and expanding the hierarchical quantum information splitting scheme to probabilistic hierarchical quantum information splitting. It is worth noting that after 20 years of development, quantum information splitting has gradually moved from theory to reality. Literature [17,18,19,20,21] describes various experiments of quantum communication, such as the cavity QED experiment, ion trap experiment, and quantum critical distribution protocol experiment on an 80 km optical fiber, which was the first step to realizing the combination of quantum communication and digital technology. In 2020, Zhang et al. [22] proposed using artificial neural networks to quantify the controllability of quantum states, revealing the practical application of machine learning methods in exploring quantum steering. In the same year, wallnöfer et al. [23] proposed using machine learning to deal with environmental factors, making the quantum state more stable and improving the fidelity of communication. In 2021, lamata [24] proposed to use reinforcement learning to strengthen quantum communication and improve communication efficiency. The authors of [25,26] improved the existing quantum key distribution scheme. This scheme, combining machine learning and quantum key distribution, improves the transmission efficiency, but the current scheme still has problems, such as resource constraints, low efficiency, and poor information security. In 2020, Bebrov et al. [27] proposed the concept of quantum channel compression, which saves on the use of resources used in quantum secure-communication protocols. In 2021, verma [28] proposed an asymmetric two-way quantum teleportation protocol based on local CNOT gate operation. Compared with previous two-way quantum teleportation protocols, this protocol consumes less quantum and classical resources and has higher internal efficiency and less operational complexity. In the same year, Feng et al. [29] proposed a quantum dialogue protocol based on identity authentication, reducing quantum resource consumption by combining identity authentication with channel security detection. In 2022, Choudhury et al. [30] proposed a tripartite quantum conference scheme which solved the problem of exchanging information between multiple communicators and opened up a new research direction.
Based on the research of the above scheme and the relevant discussion of the decision tree algorithm in machine learning in literature [31,32,33,34,35,36], we innovatively combined machine learning with quantum communication technology and uses decision tree algorithm to optimize resource allocation and improve transmission efficiency. A hierarchical quantum information splitting of an arbitrary two-qubit state based on decision tree (HQSD) is proposed.
The rest of this paper consists of the following parts. Section 2 describes the process for the overall design of the scheme step by step. In Section 3, the process of the decision tree making the optimal allocation model of information particles is described. In Section 4, the quantum information splitting scheme based on eight particle-cluster states is described in detail, and the quantum channel is extended to multi-particle states. Section 5 is the experimental verification and analysis of the scheme. Section 6 and Section 7 summarize the full text and present prospects.

2. Overall Design of the Scheme

In this paper, to solve the problem of channel particle allocation for communicators in practical applications, we first use the decision tree algorithm and MATLAB to design experiments, which show that the decision tree algorithm can indeed solve the problem of channel particle allocation for communicators, and to determine the best allocation scheme. Then, we propose a hierarchical quantum information splitting scheme based on eight-qubit state. The hierarchical rules based on multi-particle states are summarized, and then the scheme is verified by experiments, proving the scheme’s feasibility. Finally, the security analysis and comparative analysis are presented, and it is concluded that the scheme has the characteristics of safety, effectiveness, and low energy consumption.
The overall frame diagram is shown in Figure 1, and the specific steps are as follows:
(1)
First, use the decision tree algorithm to make the optimal communication decision for channel particle allocation.
(2)
Then, we assume that Alice is the sender; and the communication participants are Bob1, Bob2, Charlie1, Charlie2, and Charlie3. According to the decision, Bob1 and Bob2 are high-level communicators, and Charlie1, Charlie2, and Charlie3 are low-level communicators. Different receivers have different particle distribution schemes.
(3)
Next, Alice conducts Bell-state measurement on the particle pair (A, 1), (B, 2). When the receiver is a high-level communicator, only one of Bob2 and a low-level communicator is required to perform a Z-based single particle measurement; after the measurement operation is performed, the result is reported to the receiver through the classical channel. When the receiver is a low-level communicator, all communication participants need to perform the measurement, and the low-level communicator needs to perform X-based single-particle measurements. Then, the communicator sends the result to the receiver.
(4)
Finally, after receiving all the measurement results, the receiver conducts a unitary operation on the collapsed state using the corresponding results. It can recover any two-qubit state information that Alice intends to send.

3. An Optimal Allocation Model of Channel Particles Based on a Decision Tree

In the scheme, we need to evaluate the levels of the communication participants and then assign the corresponding particle to the communicator according to its level. Since the number of people involved in communication may be quite large, the conditions for judging the level are too complicated, etc., it is difficult for us to evaluate the level of the communicator. Therefore, the decision tree algorithm can be adapted to solving the problem of hierarchical quantum information splitting channel particle allocation, and we can use another algorithm to decide on the best solution. In order to solve the problem of channel particle allocation, it is actually necessary to solve the problem of judging the levels of communicators. We should divide the communication participants into two categories, high-level communicators and low-level communicators. The decision tree can learn to generate a decision model that can deal with unknown examples according to the existing classification rules. We use this feature to make optimal decisions and used the existing decision tree function in MATLAB to design the model.

3.1. Data Preprocessing

We have set up four main factors for evaluating the levels of correspondents. These factors are also the characteristics of the data. They are the proportion of honesty in all communications, the number of honest communications in the last three communications, and the dishonesty judged by the third-party notary platform and availability. Among them, honesty means that the communicator will not interfere with the regular communication in the communication process; that is, the communicator will not communicate as the eavesdropper. Then, in order to facilitate the learning of the decision tree algorithm, all the data were represented by numbers. We evaluated whether the communicator is honest according to the characteristics and use numbers to express it. Finally, the total sample size of all the collected data was 1131, and the data were organized into the proportions greater than or equal to 0.5 and less than 0.5. The probability of being honest was 0. There were 409 high-level correspondents and 722 low-level correspondents. These are model 1’s data.

3.2. Model Establishment and Evaluation Analysis

First, the decision tree will generate a decision model after learning the dataset, and then to avoid loss of generality, to avoid the phenomenon of overfitting, we need to optimize the generated decision model. The commonly used method is to limit or prune the decision model according to cross-validation results. In order to make the generated decision model not limited to one dataset, we introduce a resampling error. We calculated the cross-validation error and resampling error of the decision model before and after optimization, and compared and analyze whether the decision model reached the expectation. In addition, to avoid contingency, we reorganized the data and divided the levels of correspondents according to the participating in all communications or not, the proportion of honest communication and the possibility of dishonesty judged by the third-party notary platform. Correspondents with a ratio greater than or equal to 0.5 and a probability of dishonesty of 0 were considered high-level. Compared with the previously compiled data, the prominence of the feature of listing or not was reduced, and the proportion of the feature of the number of times of honesty in the last three communications was considered. The sample was 1131, with 689 for the low and 442 for the high levels. Finally, we repeatedly checked the model by evaluation and analysis, classified all experimental data, and evaluated them separately to evaluate the capability of decision model and whether the decision plan is reliable and efficient.

3.3. Optimal Allocation Model of Channel Particles

According to the previous content, we first designed model 1, as shown in Figure 2. In Figure 2, ×1 is the proportion of the number of occasions of honesty among all communications, ×3 is the possibility of being dishonesty judged by the third-party notary platform, ×4 is whether to go public; the classification standard of its tree structure and our pre-established classification standard are the same. The generated decision model no longer needs to be pruned. It achieved the desired effect and can be well adapted to the new dataset from the performance test results. There will be no over-fitting phenomenon, so we only need to restrict the decision model, and the result is shown in Figure 3.
In terms of the resampling error combined with the cross-validation error, the restricted decision model slightly increases the error value compared to the previous one.As shown in Table 1.
For model 2, similarly, we first train and then test. After the algorithm learns, it will generate the decision model, as evinced in Figure 4. Compared with the decision model in model 1, the decision model is more complex, indicating that the classification rules of the decision model changed after data sorting. We can see the ×2 feature, that is, the number of honest messages in the last three communications, reflected in the tree structure, to achieve the expected effect we want, and after modeling many times, the decision tree continues to learn and the accuracy continues to improve and approaches 100%. We can conclude that under ideal conditions, it can eventually be improved to 100%, proving the decision tree algorithm can decide on the optimal solution. The results are evinced in Figure 5.
Next, the capability of the decision model was evaluated, and the method of setting the minimum number of samples and pruning was used to enhance the generalization ability of the decision model and avoid overfitting. First, the influence of the number of samples on the performance of the decision model was calculated. After the cross-validation error succeeded in diminishing with the increase of the number of samples, after reaching the lowest point, it began to increase. According to the principle of minimum parameters, a model with a cross-validation error value of 0.015 was selected, and its resampling error was calculated, as evinced in Figure 6.
Then, using the pruning method, we also found that the pruning result is 0, and no pruning is needed. We calculated the resampling and cross-validation errors and compared them with mode 2 and the decision tree with the minimum number of sample leaf nodes at the beginning, model 2(a). The results of the decision model calculation of the number of leaf nodes are compared; see Table 2. From the comparison of the resampling results and cross-validation errors of the three decision models, the resampling error value and cross-validation error value of model 2(a) are larger than those of the original decision model, but the difference is minimal.
Without changing the dataset, we kept running and repeating modeling, and the accuracy rate was constantly improving. Model 3 had an accuracy rate of 98.6301% for low-level samples and a rate of 100% for high-level samples, as shown in Figure 7a. Compare it with Figure 3; there is no difference in the tree structure. However, the classification value of the node changed. Similarly, we also optimized it. After calculating the cross-validation error, the number of leaf nodes in the decision model was 16. For the cross-validation error value of 0.02, which is the minimum value, the decision model is evinced in Figure 7b. The pruned decision model is evinced in Figure 7c. The pruning result is one, indicating that the first layer of the original decision model has been pruned. The resampling error values and cross-validation error values of the above three decision models are shown in Table 3.
Comparing the results of model 2 and model 3, it is not the case that the higher the accuracy, the better the performance of the decision model. Furthermore, comparing the pruned decision model and the decision model with the lowest number of leaf nodes, it is evident that the tree structure of the decision model with the fewest leaf nodes is simpler. However, the error values are relatively large. It cannot be ruled out that the optimized decision model is more suitable for application due to the limitation of the set dataset. According to all the evaluations obtained for the model, there are specific errors in the results due to the limitations of the dataset and the existence of certain influencing factors in the simulation. However, these error values are minimal and negligible. We can conclude that the decision tree algorithm can solve the channel problem. Moreover, the algorithm achieved the set goal in our preset dataset, which verifies that the decision tree algorithm can decide on the optimal allocation scheme. The generated model has good generalization ability and can adapt to a more completely random dataset environment; that is, it works better in practice.

4. Hierarchical Quantum Information Splitting Scheme for Arbitrary Two-Qubit State Based on Multi-Qubit State

After obtaining the best plan according to the above, according to the assigned strategy, in the specific hierarchical quantum information splitting plan, we assume that there are five participants, namely Alice, Bob1, Bob2, Charlie1, Charlie2, and Charlie3. Among them, Alice is the sender, and the information to be sent is any two-qubit state | ψ A B = 1 2 ( α | 00 + β | 01 + γ | 10 + σ | 11 ) A B . Here, α , β , γ , σ are coefficients, which are in complex form and satisfy | α | 2 + | β | 2 + | γ | 2 + | σ | 2 = 1 . Correspondents Bob1 and Bob2 are seniors; and Charlie1, Charlie2, and Charlie3 are low-level communicators. They share an eight-qubit cluster state channel, as in Equation (1).
| ϕ 12345678 = 1 2 ( | 00000000 + | 00000111 + | 00001000 + | 00001111 + | 01010000 + | 01010111 + | 01011000 + | 01011111 + | 10100000 | 10100111 + | 10101000 | 10101111 + | 11110000 | 11110111 + | 11111000 | 11111111 ) 12345678
In addition to any two-qubit state | ψ A B , Alice also has particle 1 and particle 2 of the channel particle; and the receiver of information has particle 3 and particle 4. Other communication participants have only one particle. Before communicating, we rewrite the channel particle as follows:
| ϕ 12345678 = 1 2 [ | 00 ( | ψ 0 + | ψ 1 ) + | 01 ( | ψ 2 + | ψ 3 ) + | 10 ( | ψ 4 + | ψ 5 ) + | 11 ( | ψ 6 + | ψ 7 ) ] 12345678
| ψ 0 = 1 2 | 000 ( | 000 + | 111 ) | ψ 1 = 1 2 | 001 ( | 000 + | 111 ) | ψ 2 = 1 2 | 010 ( | 000 + | 111 ) | ψ 3 = 1 2 | 011 ( | 000 + | 111 ) | ψ 4 = 1 2 | 100 ( | 000 | 111 ) | ψ 5 = 1 2 | 101 ( | 000 | 111 ) | ψ 6 = 1 2 | 110 ( | 000 | 111 ) | ψ 7 = 1 2 | 111 ( | 000 | 111 )
The original system state of the entire system can be described as:
| ψ = | ϕ A B | ϕ 12345678 = 1 2 2 [ α | 0000 ( | ψ 0 + | ψ 1 ) + α | 0001 ( | ψ 2 + | ψ 3 ) + α | 0010 ( | ψ 4 + | ψ 5 ) + α | 0011 ( | ψ 6 + | ψ 7 ) + β | 0100 ( | ψ 0 + | ψ 1 ) + β | 0101 ( | ψ 2 + | ψ 3 ) + β | 0110 ( | ψ 4 + | ψ 5 ) + β | 0111 ( | ψ 6 + | ψ 7 ) + γ | 1000 ( | ψ 0 + | ψ 1 ) + γ | 1001 ( | ψ 2 + | ψ 3 ) + γ | 1010 ( | ψ 4 + | ψ 5 ) + γ | 1011 ( | ψ 6 + | ψ 7 ) + σ | 1100 ( | ψ 0 + | ψ 1 ) + σ | 1101 ( | ψ 2 + | ψ 3 ) + σ | 1110 ( | ψ 4 + | ψ 5 ) + σ | 1111 ( | ψ 6 + | ψ 7 ) ] A B 12345678
In order to realize the hierarchical quantum information splitting of a two-qubit state, Alice first operates Bell-state measurement on the particle pair (A, 1), (B, 2). After the measurement, other particles will collapse into one of 16 states. Each probability is equal, and Alice’s measurement results and the collapsed state of the rest particles are shown in Table 4. The Bell-state measurement expression is as follows:
| ψ = 1 2 ( | 00 ± | 11 ) | ϕ = 1 2 ( | 01 ± | 10 )
As the scheme is a hierarchical quantum information splitting scheme, the communication participants are divided into high-level and low-level. Next, we describe the process of reconstructing any two-qubit state when the receivers of different levels communicate.

4.1. Information Splitting When Receiver Authority Is High

Assuming that Bob1 is the receiver, he has particle 3 and particle 4; Bob2 has particle 5; and Charlie1, Charlie2, and Charlie3 have particle 6, particle 7, and particle 8, respectively. Let us illustrate with an example that when Alice’s measurement is | ψ + | ϕ + , other particles will collapse into
| ψ 1 345678 = 1 4 2 [ α ( | ϕ 0 + | ϕ 1 ) + β ( | ϕ 2 + | ϕ 3 ) + γ ( | ϕ 4 + | ϕ 5 ) + σ ( | ϕ 6 + | ϕ 7 ) ] 345678 = 1 8 [ ( α | 00 + β | 01 + γ | 10 + σ | 11 ) | 0 | 000 + ( α | 00 + β | 01 γ | 10 σ | 11 ) | 0 | 111 + ( α | 00 + β | 01 + γ | 10 + σ | 11 ) | 1 | 000 + ( α | 00 + β | 01 γ | 10 σ | 11 ) | 1 | 111 ] 345678
Then Bob2, Charlie1, Charlie2, and Charlie3 perform Z-based single particle measurement, respectively, and tell Bob1 the results through the classical channel, and Bob1 can rebuild the original two-particle state by operating a unitary operation following the corresponding measurement result. We can find from Equation (6) that since the channel particle we constructed is symmetric, the results of Charlie1, Charlie2, and Charlie3 are always correlated. When the measurement result of one of them is known, the other communicators can be inferred, so we only need to perform Z-based single particle measurement on any of Charlie1, Charlie2, and Charlie3.
Therefore, when the receiver is high-level, we only need one low-level communicator to perform Z-based single particle measurement, and the measurement results of other communicators can be deduced from the obtained results. They are sent to the receiver. Due to the corresponding measurement result, the receiver operates the relevant unitary operation to reconstruct any two-qubit state sent by the sender. The relevant results are shown in Table 5. The four unitary operations are:
I = I = | 0 0 | + | 1 1 | σ z = Z = | 0 0 | | 1 1 | σ x = X = | 0 1 | + | 1 0 | i σ y = Y = | 0 1 | | 1 0 |

4.2. Information Splitting When Receiver Authority Is Low

We assume that Charlie1 is the receiver. Charlie1 will be assigned to have two particles, particle 3 and particle 4; Bob1 and Bob2 have particle 5 and particle 6, respectively; and Charlie2 and Charlie3 have particle 7 and particle 8, respectively. Similarly, we take Alice’s measurement as an example to illustrate then the collapsed state of the rest particle is rewritten as
| ψ 1 567834 = [ 1 16 | 00 ( | + + + | + + | + + | ) ( α | 00 + β | 01 + γ | 10 + σ | 11 ) + 1 16 | 01 ( | + + | + | + + | ) ( α | 00 + β | 01 γ | 10 σ | 11 ) + 1 16 | 10 ( | + + + | + + | + + | ) ( α | 00 + β | 01 + γ | 10 + σ | 11 ) + 1 16 | 11 ( | + + | + | + + | ) ( α | 00 + β | 01 γ | 10 σ | 11 ) ] 567834
Among them, | + = 1 2 ( | 0 + | 1 ) , | = 1 2 ( | 0 | 1 ) . From Equation (8), we can see that the results of Charlie2 and Charlie3 are not correlated with each other at this time, so when the low-level communicator receives a message, all the communicating participants need to perform measurements on the particles they own, the low-level communicator. The communicator ought to perform an X-based single particle measurement and inform Charlie1 of the result through the classical channel, and then Charlie1 can restore the original information through the corresponding unitary operation. The results are shown in Table 6.

4.3. The Hierarchical Quantum Information Splitting Protocol Based on N-Party

In the previous section, we proposed a hierarchical quantum information splitting protocol for a two-qubit state based on an eight-qubit state. In terms of hierarchical quantum information splitting characteristics combined with the ideas proposed in this paper, we can extend this scheme to multi-party communication. In the multi-party protocol, it is assumed that Alice is the sender; Bob1, Bob2, ..., Bobx are high-level communicators, Charlie1, Charle2, ..., Charliey are low-level communicators; and the number of communication participants increases, which means that as the number of channel particles increases, then Alice needs to prepare a multi-qubit state channel. The channel particle is written as
ϕ N = 1 2 [ ( | 0000 + | 0101 ) ( | 00 00 + | 00 11 + | 11 00 + | 11 11 ) + ( | 1010 + | 1111 ) ( | 00 00 | 00 11 + | 11 00 | 11 11 ) ]
Among them, the last half of the multi-qubit state channels, for instance, | 00 00 , | 00 11 , | 11 00 , | 11 11 , represent the qubits of Charlie1, Charle2, ..., Charliey, respectively; and then we discard the two-qubit owned by the receiver, and the rest are the particles owned by Bob1, Bob2, ..., Bobx, respectively. Alice still wants to send any two-qubit state, so the system state is
| ζ = | ψ A B | ϕ N = 1 2 ( α | 00 + β | 01 + γ | 10 + σ 11 ) A B 1 2 [ ( | 0000 + | 0101 ) ( | 00 00 + | 00 11 + | 11 00 + | 11 11 ) + ( | 1010 + | 1111 ) ( | 00 00 | 00 11 + | 11 00 | 11 11 ) ]
We can easily deduce that after Alice conducts the Bell-state measurement of the particle pair (A, 1), (B, 2), the remaining particles will collapse into collapsed states, and the receiver needs to know the information sent by Alice. The other particles and different levels of receivers need further help. When the receiver is a high-level communicator, the measurement results of Charlie1, Charle2, ..., Charliey—that is, the low-level communicator—can be deduced from each other, so only one person in the low-level communicator ought to perform Z-based single-particle measurement, except the receiver. All high-level communicators must perform single particle measurement and inform the information receiver of the results. Then, the high-level receivers in the communication need to perform relevant unitary operations in order to rebuild the information; when the receivers are low-level communicators, Charlie1, Charle2, ..., Charliey’s results cannot be deduced from each other, then the low-level communicators other than the receiver must perform X-based single-particle measurement on the particles they own, and high-level communicators perform Z-based single-particle measurement on the particles. The receiver is told through the classical channel that after receiving all the results, the receiver conducts the related unitary operation according to the collapsed state.

5. Experiment and Analysis

5.1. Experiments on Hierarchical Quantum Information Splitting Schemes

We used the IBM quantum composer platform to perform the experimental simulation based on the eight-qubit cluster state quantum information separation scheme. The complete process of the experiment is shown in Figure 8, where q0 q7 is the eight-qubit cluster state’s quantum channel, q8 and q9 are a two-qubit state, the initial state is | 0 , the red square is the H gate operation icon, and the symbol with a plus sign is the CNOT gate. The two X connected symbols are the swap gate. I is the preparation process. Firstly, the eight-qubit cluster state was prepared. Since the phase angle of some particle states in the eight-qubit cluster state was | ϕ 12345678 , we used two H gates and one control, a not gate operation, to change their phase. Then, a two-qubit state was prepared. It can be prepared by performing two H gate operations on particle 1 and particle 2. U gate is the parameter gate for constructing any particle, II is the transmission process, Alice performs Bell-state measurement to transmit information, and III is the measurement process. Since the IBM platform cannot provide calculation results for quantum circuit diagrams with more than seven particles, we used the simulator to simulate the results. Obviously, our scheme successfully realized the hierarchical quantum information splitting of any two-qubit state so that the receiver receives the information.
For our experimental verification, the theoretical value of the two-qubit state prepared by the IBM platform is | ϕ A B = 1 2 ( | 00 + | 01 + | 10 + | 11 ) A B , and the simulated state | ϕ 34 = ( 0.253 | 00 + 0.244 | 01 + 0.258 | 10 + 0.245 | 11 ) 34 is calculated according to the actual transmission results in Table 7. Since the formula of quantum fidelity is Equation (11), ρ = | ϕ 34 ϕ | , the fidelity of this scheme is about 0.999, indicating that the experimental verification of the hierarchical quantum information splitting scheme based on an eight-qubit cluster state and any two-qubit state is successful.
F = A B ϕ | ρ | ϕ A B

5.2. Security Analysis

Generally, quantum attacks include individual attacks and collective attacks. The typical feature of individual attack is to assume that there is an attacker, Eve. Eve tries to use his probe to detect the information of the unknown quantum state, and the collective attack is when the attacker Eve uses multiple probes to detect the quantum state at the same time. Assuming that when the high-level communicator is the receiver, Eve exists and Alice, Bob1, Bob2, Charlie1, Charlie2, and Charlie3 do not know that Eve is trying to eavesdrop on the information, Eve | ϕ E = 1 2 ( | 0 + | 1 ) E successfully entangles his particle on the particle bit of Charlie3. After the particle pair performs the Bell-state measurement, we assume that the measurement result is | ϕ + | ϕ + , and the collapsed state of the remaining particles is:
| Ψ 1 345678 E = 1 8 [ α ( | ψ 0 + | ψ 1 ) | 0 + β ( | ψ 2 + | ψ 3 ) | 0 + γ ( | ψ 4 + | ψ 5 ) | 0 + σ ( | ψ 6 + | ψ 7 ) | 0 + α ( | ψ 0 + | ψ 1 ) | 1 + β ( | ψ 2 + | ψ 3 ) | 1 + γ ( | ψ 4 + | ψ 5 ) | 1 + σ ( | ψ 6 + | ψ 7 ) | 1 ] 345678 E = 1 8 2 [ ( α | 00 + β | 01 + γ | 10 + σ | 11 ) | 0 | 0000 + ( α | 00 + β | 01 + γ | 10 + σ | 11 ) | 0 | 0001 + ( α | 00 + β | 01 γ | 10 σ | 11 ) | 0 | 1110 + ( α | 00 + β | 01 γ | 10 σ | 11 ) | 0 | 1111 + ( α | 00 + β | 01 + γ | 10 + σ | 11 ) | 1 | 0000 + ( α | 00 + β | 01 + γ | 10 + σ | 11 ) | 1 | 0001 + ( α | 00 + β | 01 γ | 10 σ | 11 ) | 1 | 1110 + ( α | 00 + β | 01 γ | 10 σ | 11 ) | 1 | 1111 ] 345678 E
Next, Bob1 needs the help of other communicators. After Bob2 and Charlie1 perform single particle measurement, the state will collapse again. Assuming that the results of Bob2 and Charlie1 are both | 0 , as in Equation (13), due to Eve’s attack, there is no change in the quantum state. We can infer that Eve has not detected any message, and the scheme is safe. Similarly, when Eve entangles multiple particle bits, | ϕ E will not change, and the collective attack is invalid.
| ϕ 34 E = 1 4 ( α | 00 + β | 01 + γ | 10 + σ | 11 ) 34 1 2 ( | 0 + | 1 ) E
In addition to this, there is also a man-in-the-middle attack, in which the attacker, Eve, pretends to be a member of the communication team, tries to intercept the conversation in the communication, and after intercepting the message, sends the message he prepared to the receiver and convinces him that it is a message to be sent to him by a participant in the communication. However, since the receiver ought to perform the relevant unitary operation according to the received measurement result to restore the original information, the message sent by Eve is a fake message, which is not in the result, so the receiver cannot find the corresponding response according to Eve’s message. The operation performed cannot reconstruct any two-particle state, so the communication is found to be abnormal and terminated. To sum up, none of these attacks can be effective in the scheme we designed, and the eavesdropper cannot eavesdrop on the information, which shows that the scheme can resist the attack and has strong security.

5.3. Scheme Comparison Analysis

To further demonstrate that our scheme (OS) is efficient, we compare this scheme with those in [7,19,21,22]. We compare them with the four aspects of quantum resource consumption (QS), quantum bits transmitted (QT), transmission efficiency, and the number of communication participants (NC). Quantum resource consumption refers to the number of particles in the quantum channel used, the number of qubits transmitted is the number of particles that the scheme can transmit, and the transmission efficiency is calculated based on the number of quanta transmitted and the number of channel particles used to transmit these quantum states. The calculation formula for transmission efficiency is as follows:
η = c q + t
where c is the number of qubits transmitted, q is the number of bits used by the quantum channel, and t is the number of classical bits, which is the number of bits transmitted through the classical channel. According to Equation (14), the number of particles transmitted in reference [19] is one, and the transmission efficiency is η 1 = 1 4 + 4 = 1 8 using the four-qubit entangled state as the quantum channel. Three schemes are listed in reference [7]. According to its protocol rules, we conclude that when the number of communication participants is five, the number of channel particles used is ten. The transmitted quantum state is any two-qubit state, and then the transmission efficiency is η 1 = 2 10 + 10 = 1 10 . Similarly, the transmission efficiency of other schemes can be calculated, and the results are evinced in Table 8.
In addition to the above four aspects, other schemes have never used machine learning to solve the specific allocation problem of channel particles. We combined machine learning with quantum communication. After data preprocessing, we comprehensively evaluated the decision tree algorithm’s prediction model and allocated quantum resources for communication according to the determined scheme. Moreover, this scheme takes many operations, especially when preparing the quantum channel; the various gate operations taken make the quantum state change more complicated. It is safer when transmitting the particle state. The scheme does not need to perform operations like those in [21] and the POVM measurements in reference [22], which can utilize limited quantum resources to enable more communicators to participate in communication, so our scheme has the characteristics of high efficiency and low consumption of quantum resources.

6. Discussion

The results of this article prove that quantum communication can be effectively combined with a machine learning algorithms, and the latter can improve the efficiency of quantum communication, which will bring great benefit to the practical application of quantum communication. In the future, we will continue to study the effective combination of quantum communication and machine learning to take quantum communication from theory to reality as soon as possible.

7. Conclusions

This paper proposed a two-qubit hierarchical quantum information splitting scheme using eight particle states as quantum channels and extends it to multi-particle states. In the early stage, we introduced the decision tree algorithm of machine learning into quantum communication and proved by experiments that the decision tree algorithm can determine the optimal allocation strategy, and then formulated the corresponding hierarchical quantum information splitting scheme according to this strategy. Assuming Alice is the sender, Bob1, Bob2, Charlie1, Charlie2, and Charlie3 are divided into high-level and low-level communicators. Alice selects one of them to communicate. After Alice performs Bell-state measurement on particle pairs, different receivers need different communicators to perform single-particle measurement and tell the results to the receiver through the classical channel. The receiver can perform the unitary operation to reconstruct a two-qubit state according to the corresponding results. Compared with the previous hierarchical quantum information splitting scheme [7,19,21,22], our advantage is to design the scheme according to the decision, which makes the scheme more effective in practical applications and can transmit more particle information with fewer particles. We also carried out experimental verification, security analysis, and comparative analysis of the scheme, showing that the scheme has high security and reliability. We will continue researching cross-quantum informatics and quantum physics with more disciplines in future work. This part of the theoretical research content and experiment will also become more and more mature.

Author Contributions

Conceptualization, D.L., Y.Z. and M.L.; methodology, D.L. and Y.Z.; software, Y.Z.; validation, D.L. and Y.Z.; formal analysis, J.Z.; investigation, X.L., X.Y.; resources, D.L.; data curation, Y.Z., J.Z. and Y.T.; writing—original draft preparation, Y.Z.; writing—review and editing, D.L., Y.Z., J.Z., Y.T. and X.Y.; supervision, D.L. and M.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China (62172060), Key R&D Project of Sichuan Province Science and Technology Plan (2020YFS0445), Sichuan Science and Technology Program (2022YFG0316).

Data Availability Statement

Not applicable.

Acknowledgments

Thank you to the editor reviewers for reviewing this article in their busy schedules, and thank the teachers for their careful guidance and help.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hillery, M.; Buzek, V. Secret sharing via quantum entanglement. Acta Phys. Slovaca 1999, 49, 533–540. [Google Scholar]
  2. Murao, M.; Jonathan, D.; Plenio, M.; Vedral, V. Quantum telecloning and multiparticle entanglement. Phys. Rev. 1999, 59, 156. [Google Scholar] [CrossRef] [Green Version]
  3. Grudka, A.; Wójcik, A. Multiparty d-dimensional quantum information splitting. arXiv 2002, arXiv:quant-ph/0205111. [Google Scholar] [CrossRef]
  4. Brádler, K.; Dušek, M. Secret-message sharing via direct transmission. J. Opt. Quantum Semiclassical Opt. 2003, 6, 63. [Google Scholar] [CrossRef]
  5. Xu, G.; Wang, C.; Yang, Y.X. Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state. Quantum Inf. Process. 2014, 13, 43–57. [Google Scholar] [CrossRef]
  6. Panigrahi, P.K.; Karumanchi, S.; Muralidharan, S. Minimal classical communication and measurement complexity for quantum information splitting of a two-qubit state. Pramana 2009, 73, 499–504. [Google Scholar] [CrossRef] [Green Version]
  7. Zhang, W.; Liu, Y.m.; Zhang, Z.j.; Cheung, C.Y. Splitting a qudit state via Greenberger–Horne–Zeilinger states of qubits. Opt. Commun. 2010, 283, 628–632. [Google Scholar] [CrossRef]
  8. Bai, M.Q.; Mo, Z.W. Hierarchical quantum information splitting with eight-qubit cluster states. Quantum Inf. Process. 2013, 12, 1053–1064. [Google Scholar] [CrossRef]
  9. Shukla, C.; Pathak, A. Hierarchical quantum communication. Phys. Lett. 2013, 377, 1337–1344. [Google Scholar] [CrossRef] [Green Version]
  10. Ma, P.C.; Chen, G.B.; Li, X.W.; Zhan, Y.B. Hierarchical controlled remote state preparation by using a four-qubit cluster state. Int. J. Theor. Phys. 2018, 57, 1748–1755. [Google Scholar] [CrossRef]
  11. Zha, X.W.; Miao, N.; Wang, H.F. Hierarchical quantum information splitting of an arbitrary two-qubit using a single quantum resource. Int. J. Theor. Phys. 2019, 58, 2428–2434. [Google Scholar] [CrossRef]
  12. Wang, X.W.; Zhang, D.Y.; Tang, S.Q.; Zhan, X.G.; You, K.M. Hierarchical quantum information splitting with six-photon cluster states. Int. J. Theor. Phys. 2010, 49, 2691–2697. [Google Scholar] [CrossRef]
  13. Zhang, Q.Y.; Zhan, Y.B. Quantum information splitting by using asymmetric multi-particle state. Int. J. Theor. Phys. 2012, 51, 3037–3044. [Google Scholar] [CrossRef]
  14. Xu, G.; Shan, R.T.; Chen, X.B.; Dong, M.; Chen, Y.L. Probabilistic and hierarchical quantum information splitting based on the non-maximally entangled cluster state. Cmc-Comput. Mater. Contin. 2021, 69, 339–349. [Google Scholar] [CrossRef]
  15. Guo, W.M.; Qin, L.R. Hierarchical and probabilistic quantum information splitting of an arbitrary two-qubit state via two cluster states. Chin. Phys. B 2018, 27, 110302. [Google Scholar] [CrossRef]
  16. Li, S.W.; Jiang, M.; Jiang, F.; Chen, X.P. Multi-qudit information splitting with multiple controllers. Quantum Inf. Process. 2014, 13, 1057–1066. [Google Scholar] [CrossRef]
  17. Huang, G.Q.; Luo, C.L. Splitting Quantum Information with Five-Atom Cluster State in Cavity QED. Int. J. Theor. Phys. 2011, 50, 401–406. [Google Scholar] [CrossRef]
  18. Li, Y.h.; Li, X.l.; Sang, M.h.; Nie, Y.y. Splitting unknown two-qubit state using five-qubit entangled state. Int. J. Theor. Phys. 2014, 53, 111–115. [Google Scholar] [CrossRef]
  19. Jouguet, P.; Kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 2013, 7, 378–381. [Google Scholar] [CrossRef] [Green Version]
  20. Boaron, A.; Boso, G.; Rusca, D.; Vulliez, C.; Autebert, C.; Caloz, M.; Perrenoud, M.; Gras, G.; Bussières, F.; Li, M.J.; et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 2018, 121, 190502. [Google Scholar] [CrossRef] [Green Version]
  21. Yin-Ju, L. A novel practical quantum secure direct communication protocol. Int. J. Theor. Phys. 2021, 60, 1159–1163. [Google Scholar] [CrossRef]
  22. Zhang, Y.Q.; Yang, L.J.; He, Q.L.; Chen, L. Machine learning on quantifying quantum steerability. Quantum Inf. Process. 2020, 19, 263. [Google Scholar] [CrossRef]
  23. Wallnöfer, J.; Melnikov, A.A.; Dür, W.; Briegel, H.J. Machine learning for long-distance quantum communication. PRX Quantum 2020, 1, 010301. [Google Scholar] [CrossRef]
  24. Lamata, L. Quantum reinforcement learning with quantum photonics. Photonics 2021, 8, 33. [Google Scholar] [CrossRef]
  25. Al-Mohammed, H.A.; Al-Ali, A.; Yaacoub, E.; Qidwai, U.; Abualsaud, K.; Rzewuski, S.; Flizikowski, A. Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios. IEEE Access 2021, 9, 136994–137004. [Google Scholar] [CrossRef]
  26. Ren, Z.A.; Chen, Y.P.; Liu, J.Y.; Ding, H.J.; Wang, Q. Implementation of machine learning in quantum key distributions. IEEE Commun. Lett. 2020, 25, 940–944. [Google Scholar] [CrossRef]
  27. Bebrov, G.; Dimova, R. Efficient quantum secure direct communication protocol based on Quantum Channel compression. Int. J. Theor. Phys. 2020, 59, 426–435. [Google Scholar] [CrossRef]
  28. Verma, V. Bidirectional quantum teleportation by using two GHZ-states as the quantum channel. IEEE Commun. Lett. 2020, 25, 936–939. [Google Scholar] [CrossRef]
  29. Feng, Z.J.; Tang, L.; Xiang, Y.; Mo, Z.W.; Bai, M.Q. Authenticated quantum dialogue protocol based on four-particle entangled states. Mod. Phys. Lett. 2021, 36, 2150189. [Google Scholar] [CrossRef]
  30. Choudhury, B.S.; Samanta, S. A Controlled Asymmetric Quantum Conference. Int. J. Theor. Phys. 2022, 61, 14. [Google Scholar] [CrossRef]
  31. Wang, P.; Yan, Z.; Han, G.; Yang, H.; Zhao, Y.; Lin, C.; Wang, N.; Zhang, Q. A2E2: Aerial-assisted energy-efficient edge sensing in intelligent public transportation systems. J. Syst. Archit. 2022, 129, 102617. [Google Scholar] [CrossRef]
  32. Liang, J.; Qin, Z.; Xiao, S.; Ou, L.; Lin, X. Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1632–1644. [Google Scholar] [CrossRef]
  33. Yan, X.; Cui, B.; Xu, Y.; Shi, P.; Wang, Z. A method of information protection for collaborative deep learning under GAN model attack. IEEE/ACM Trans. Comput. Biol. Bioinform. 2019, 18, 871–881. [Google Scholar] [CrossRef] [PubMed]
  34. Kamiński, B.; Jakubczyk, M.; Szufel, P. A framework for sensitivity analysis of decision trees. Cent. Eur. J. Oper. Res. 2018, 26, 135–159. [Google Scholar] [CrossRef] [Green Version]
  35. Wang, P.; Zhao, Y.; Obaidat, M.S.; Wei, Z.; Qi, H.; Lin, C.; Xiao, Y.; Zhang, Q. Blockchain-Enhanced Federated Learning Market with Social Internet of Things. IEEE J. Sel. Areas Commun. 2022. [Google Scholar] [CrossRef]
  36. Wang, P.; Pan, Y.; Lin, C.; Qi, H.; Ren, J.; Wang, N.; Yu, Z.; Zhou, D.; Zhang, Q. Graph Optimized Data Offloading for Crowd-AI Hybrid Urban Tracking in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2022. [Google Scholar] [CrossRef]
Figure 1. Overall framework.
Figure 1. Overall framework.
Mathematics 10 04571 g001
Figure 2. Model 1.
Figure 2. Model 1.
Mathematics 10 04571 g002
Figure 3. Model 1(a) limiting the number of leaf node samples.
Figure 3. Model 1(a) limiting the number of leaf node samples.
Mathematics 10 04571 g003
Figure 4. Model 2.
Figure 4. Model 2.
Mathematics 10 04571 g004
Figure 5. Test set sample accuracy.
Figure 5. Test set sample accuracy.
Mathematics 10 04571 g005
Figure 6. Decision tree model 2(b) with minimum cross-validation error.
Figure 6. Decision tree model 2(b) with minimum cross-validation error.
Mathematics 10 04571 g006
Figure 7. Model 3. From left to right are (a) the generated decision model, (b) the decision model with the least value for the leaf node, (c) the decision model after pruning.
Figure 7. Model 3. From left to right are (a) the generated decision model, (b) the decision model with the least value for the leaf node, (c) the decision model after pruning.
Mathematics 10 04571 g007
Figure 8. The complete process of the experiment.
Figure 8. The complete process of the experiment.
Mathematics 10 04571 g008
Table 1. Decision model resampling error and cross-validation error values.
Table 1. Decision model resampling error and cross-validation error values.
ModelResampling ErrorCross-Validation Error
Model 100
Model 1(a)0.0020.002
Table 2. The resampling error and cross-validation error values of decision model 2.
Table 2. The resampling error and cross-validation error values of decision model 2.
ModelResampling ErrorCross-Validation Error
Model 20.0070.009
Model 2(a)0.0150.015
Model 2(b)0.0070.01
Table 3. The resampling error and cross-validation error values of decision model 3.
Table 3. The resampling error and cross-validation error values of decision model 3.
ModelResampling ErrorCross-Validation Error
Model 3(a)0.0090.015
Model 3(b)0.0180.021
Model 3(c)0.010.016
Table 4. Collapse of the remaining particles after Alice performed the measurement.
Table 4. Collapse of the remaining particles after Alice performed the measurement.
The Measurement of AliceThe Collapse State after Measurement
| ψ + | ψ + | Ψ 1 345678 = 1 4 2 [ α ( | ψ 0 + | ψ 1 ) + β ( | ψ 2 + | ψ 3 ) + γ ( | ψ 4 + | ψ 5 ) + σ ( | ψ 6 + | ψ 7 ) ]
| ψ + | ψ | Ψ 2 345678 = 1 4 2 [ α ( | ψ 0 + | ψ 1 ) β ( | ψ 2 + | ψ 3 ) + γ ( | ψ 4 + | ψ 5 ) σ ( | ψ 6 + | ψ 7 ) ]
| ψ + | ϕ + | Ψ 3 345678 = 1 4 2 [ α ( | ψ 2 + | ψ 3 ) + β ( | ψ 0 + | ψ 1 ) + γ ( | ψ 6 + | ψ 7 ) + σ ( | ψ 4 + | ψ 5 ) ]
| ψ + | ϕ | Ψ 4 345678 = 1 4 2 [ α ( | ψ 2 + | ψ 3 ) β ( | ψ 0 + | ψ 1 ) + γ ( | ψ 6 + | ψ 7 ) σ ( | ψ 4 + | ψ 5 ) ]
| ψ | ψ + | Ψ 5 345678 = 1 4 2 [ α ( | ψ 0 + | ψ 1 ) + β ( | ψ 2 + | ψ 3 ) γ ( | ψ 4 + | ψ 5 ) σ ( | ψ 6 + | ψ 7 ) ]
| ψ | ψ | Ψ 6 345678 = 1 4 2 [ α ( | ψ 0 + | ψ 1 ) β ( | ψ 2 + | ψ 3 ) γ ( | ψ 4 + | ψ 5 ) + σ ( | ψ 6 + | ψ 7 ) ]
| ψ | ϕ + | Ψ 7 345678 = 1 4 2 [ α ( | ψ 2 + | ψ 3 ) β ( | ψ 0 + | ψ 1 ) γ ( | ψ 6 + | ψ 7 ) + σ ( | ψ 4 + | ψ 5 ) ]
| ψ | ϕ | Ψ 8 345678 = 1 4 2 [ α ( | ψ 2 + | ψ 3 ) β ( | ψ 0 + | ψ 1 ) γ ( | ψ 6 + | ψ 7 ) + σ ( | ψ 4 + | ψ 5 ) ]
| ϕ + | ψ + | Ψ 9 345678 = 1 4 2 [ α ( | ψ 4 + | ψ 5 ) + β ( | ψ 6 + | ψ 7 ) + γ ( | ψ 0 + | ψ 1 ) + σ ( | ψ 2 + | ψ 3 ) ]
| ϕ + | ψ | Ψ 10 345678 = 1 4 2 [ α ( | ψ 4 + | ψ 5 ) β ( | ψ 6 + | ψ 7 ) + γ ( | ψ 0 + | ψ 1 ) σ ( | ψ 2 + | ψ 3 ) ]
| ϕ + | ϕ + | Ψ 11 345678 = 1 4 2 [ α ( | ψ 6 + | ψ 7 ) + β ( | ψ 4 + | ψ 5 ) + γ ( | ψ 2 + | ψ 3 ) + σ ( | ψ 0 + | ψ 1 ) ]
| ϕ + | ϕ | Ψ 12 345678 = 1 4 2 [ α ( | ψ 6 + | ψ 7 ) β ( | ψ 4 + | ψ 5 ) + γ ( | ψ 2 + | ψ 3 ) σ ( | ψ 0 + | ψ 1 ) ]
| ϕ | ψ + | Ψ 13 345678 = 1 4 2 [ α ( | ψ 4 + | ψ 5 ) + β ( | ψ 6 + | ψ 7 ) γ ( | ψ 0 + | ψ 1 ) σ ( | ψ 2 + | ψ 3 ) ]
| ϕ | ψ | Ψ 14 345678 = 1 4 2 [ α ( | ψ 4 + | ψ 5 ) β ( | ψ 6 + | ψ 7 ) γ ( | ψ 0 + | ψ 1 ) + σ ( | ψ 2 + | ψ 3 ) ]
| ϕ | ϕ + | Ψ 15 345678 = 1 4 2 [ α ( | ψ 6 + | ψ 7 ) + β ( | ψ 4 + | ψ 5 ) γ ( | ψ 2 + | ψ 3 ) σ ( | ψ 0 + | ψ 1 ) ]
| ϕ | ϕ | Ψ 16 345678 = 1 4 2 [ α ( | ψ 6 + | ψ 7 ) β ( | ψ 4 + | ψ 5 ) γ ( | ψ 2 + | ψ 3 ) + σ ( | ψ 0 + | ψ 1 ) ]
Table 5. The measurement results after Bob2, Charlie1, Charlie2, and Charlie3 performing the measurement, the state obtained by Bob1 and the corresponding unitary operation.
Table 5. The measurement results after Bob2, Charlie1, Charlie2, and Charlie3 performing the measurement, the state obtained by Bob1 and the corresponding unitary operation.
Measurement Results of Bob2, Charlie1, Charlie2 and Charlie3 1The State Obtained by Bob1Unitary Operation
( | 0000 , | 1000 ) o r ( | 0111 , | 1111 ) 1 4 ( α | 00 + β | 01 + γ | 10 + σ | 11 ) I 3 I 4
( | 0111 , | 1111 ) o r ( | 0000 , | 1000 ) 1 4 ( α | 00 + β | 01 γ | 10 σ | 11 ) z 3 I 4
( | 0000 , | 1000 ) o r ( | 0111 , | 1111 ) 1 4 ( α | 00 β | 01 + γ | 10 σ | 11 ) I 3 z 4
( | 0111 , | 1111 ) o r ( | 0000 , | 1000 ) 1 4 ( α | 00 β | 01 γ | 10 + σ | 11 ) Z 3 Z 4
( | 0000 , | 1000 ) o r ( | 0111 , | 1111 ) 1 4 ( α | 01 + β | 00 + γ | 11 + σ | 10 ) I 3 X 4
( | 0111 , | 1111 ) o r ( | 0000 , | 1000 ) 1 4 ( α | 01 + β | 00 γ | 11 σ | 10 ) Z 3 X 4
( | 0000 , | 1000 ) o r ( | 0111 , | 1111 ) 1 4 ( α | 01 β | 00 + γ | 11 σ | 10 ) I 3 X 4 Z 4
( | 0111 , | 1111 ) o r ( | 0000 , | 1000 ) 1 4 ( α | 01 β | 00 γ | 11 + σ | 10 ) Z 3 Y 4
| 0000 , | 1000 1 4 ( α | 10 + β | 11 + γ | 00 + σ | 01 ) X 3 I 4
| 0111 , | 1111 1 4 ( α | 10 β | 11 + γ | 00 + σ | 01 ) z 3 X 3 I 4
| 0000 , | 1000 1 4 ( α | 10 β | 11 + γ | 00 σ | 01 ) X 3 Z 4
| 0111 , | 1111 1 4 ( α | 10 + β | 11 + γ | 00 σ | 01 ) Z 3 X 3 Z 4
| 0000 , | 1000 1 4 ( α | 10 + β | 11 γ | 00 σ | 01 ) Z 3 X 3 I 4
| 0111 , | 1111 1 4 ( α | 10 β | 11 γ | 00 σ | 01 ) Z 3 X 3 Z 3 I 4
| 0000 , | 1000 1 4 ( α | 10 β | 11 γ | 00 + σ | 01 ) Y 3 Z 4
| 0111 , | 1111 1 4 ( α | 10 + β | 11 γ | 00 + σ | 01 ) Z 3 X 3 Z 3 Z 4
| 0000 , | 1000 1 4 ( α | 11 + β | 10 + γ | 01 + σ | 00 ) X 3 X 4
| 0111 , | 1111 1 4 ( α | 11 β | 10 + γ | 01 + σ | 00 ) Z 3 X 3 X 4
| 0000 , | 1000 1 4 ( α | 11 β | 10 + γ | 01 σ | 00 ) X 3 X 4 Z 4
| 0111 , | 1111 1 4 ( α | 11 + β | 10 + γ | 01 σ | 00 ) Z 3 X 3 X 4 Z 4
| 0000 , | 1000 1 4 ( α | 11 + β | 10 γ | 01 σ | 00 ) X 3 X 4 Z 3
| 0111 , | 1111 1 4 ( α | 11 β | 10 γ | 01 σ | 00 ) Z 3 X 3 X 4 Z 3
| 0000 , | 1000 1 4 ( α | 11 β | 10 γ | 01 + σ | 00 ) X 3 X 4 Z 3 Z 4
| 0111 , | 1111 1 4 ( α | 11 + β | 10 γ | 01 + σ | 00 ) Z 4 X 3 X 4
1 The parentheses in the first column represent what Bob and Charlie might have obtained in a collapsed state after Alice’s measurement.
Table 6. Alice, Bob1, Bob2, Charlie2, and Charlie3 perform the measurement and the corresponding unitary operation of Charlie1.
Table 6. Alice, Bob1, Bob2, Charlie2, and Charlie3 perform the measurement and the corresponding unitary operation of Charlie1.
Alice’s MeasurementsMeasurement Results of Bob1 and Bob2Measurement Results of Charlie2 and Charlie3Unitary Operation
| Ψ 1 ( | Ψ 5 ) | 00 , | 10 ( | 10 , | 11 ) | + + , | + ,
| + , |
I 3 I 4
| 10 , | 11 ( | 00 , | 10 ) Z 3 I 4
| Ψ 2 ( | Ψ 6 ) | 00 , | 10 ( | 10 , | 11 ) | + + , | + ,
| + , |
I 3 Z 4
| 10 , | 11 ( | 00 , | 10 ) Z 3 Z 4
| Ψ 3 ( | Ψ 7 ) | 00 , | 10 ( | 10 , | 11 ) | + + , | + ,
| + , |
I 3 X 4
| 10 , | 11 ( | 00 , | 10 ) Z 3 X 4
| Ψ 4 ( | Ψ 8 ) | 00 , | 10 ( | 10 , | 11 ) | + + , | + ,
| + , |
Z 3 Y 4
| 10 , | 11 ( | 00 , | 10 ) Z 3 Y 4
| Ψ 9 ( | Ψ 10 ) | 00 , | 10 | + + , | + ,
| + , |
X 3 I 4 ( Z 4 )
| 10 , | 11 Z 3 X 3 I 4 ( Z 4 )
| Ψ 11 ( | Ψ 12 ) | 00 , | 10 | + + , | + ,
| + , |
X 3 X 4 I 4 ( Z 4 )
| 10 , | 11 Z 3 X 3 X 4 I 4 ( Z 4 )
| Ψ 13 ( | Ψ 14 ) | 00 , | 10 | + + , | + ,
| + , |
Y 3 I 4 ( Z 4 )
| 10 , | 11 Z 3 Y 3 I 4 ( Z 4 )
| Ψ 15 ( | Ψ 16 ) | 00 , | 10 | + + , | + ,
| + , |
Y 3 X 4 ( Y 4 )
| 10 , | 11 Z 3 Y 3 X 4 ( Y 4 )
Table 7. Transmission result.
Table 7. Transmission result.
StatesShotsFrequency (%)
| 00 207225.3%
| 01 199924.4%
| 10 211425.8%
| 11 200724.5%
Table 8. Resampling error value vs. cross validation error value.
Table 8. Resampling error value vs. cross validation error value.
SchemesQSQTTransmission Efficiency (%)NC
Ref. [7]10210%5
Ref. [19]4112.5%4
Ref. [21]4112.5%4
Ref. [22]8212.5%4
OS8214.5%5
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, D.; Zheng, Y.; Liu, X.; Zhou, J.; Tan, Y.; Yang, X.; Liu, M. Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree. Mathematics 2022, 10, 4571. https://doi.org/10.3390/math10234571

AMA Style

Li D, Zheng Y, Liu X, Zhou J, Tan Y, Yang X, Liu M. Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree. Mathematics. 2022; 10(23):4571. https://doi.org/10.3390/math10234571

Chicago/Turabian Style

Li, Dongfen, Yundan Zheng, Xiaofang Liu, Jie Zhou, Yuqiao Tan, Xiaolong Yang, and Mingzhe Liu. 2022. "Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree" Mathematics 10, no. 23: 4571. https://doi.org/10.3390/math10234571

APA Style

Li, D., Zheng, Y., Liu, X., Zhou, J., Tan, Y., Yang, X., & Liu, M. (2022). Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree. Mathematics, 10(23), 4571. https://doi.org/10.3390/math10234571

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop