On Quantum Dense Coding for Bipartite Systems

Research Article
Open access

On Quantum Dense Coding for Bipartite Systems

Yaokun Liu 1*
  • 1 Zhixin School    
  • *corresponding author 16624788161@163.com
Published on 24 September 2025 | https://doi.org/10.54254/2753-8818/2025.GL27041
TNS Vol.136
ISSN (Print): 2753-8818
ISSN (Online): 2753-8826
ISBN (Print): 978-1-80590-375-8
ISBN (Online): 978-1-80590-376-5

Abstract

Quantum communication, as a vital area of quantum information science, aims to leverage quantum phenomena—particularly entanglement—to achieve tasks that are impossible or inefficient in classical systems. It plays a key role in the development of secure communication protocols and advanced information processing. This paper focuses on one such protocol, dense coding, which enables the transmission of two classical bits using only one entangled quantum particle.”We introduce the mathematical and physical foundations of quantum communication, such as the entangled state and Kronecker product. Then we propose the quantum communication protocol, namely dense coding using Bell states. It offer unique advantages that are beyond the classical parts. For this purpose, we in detail analyze the quantum measurements using Pauli gates and identity matrix, as well as the transmission of particle from Alice to Bob. They are necessary steps for dense coding. Then we analyze how Bob finishes the protocol using measurement over two qubits.

Keywords:

Quantum Entanglement, Dense Coding, Quantum Communication Protocol, Quantum Teleportation, Remote-Controlled Operations

Liu,Y. (2025). On Quantum Dense Coding for Bipartite Systems. Theoretical and Natural Science,136,9-20.
Export citation

1. Introduction

Quantum entanglement has been applied to various quantum protocols such as teleportation and dense coding assisted by classical channels [1, 2]. References [3, 4] showed showed the operational principles and mathematical foundations of several existing quantum communication protocols. Besides, quantum protocols can also be applied to classical computers [5]. Currently existing classical encryption methods are no longer entirely secure, as methods for rapidly breaking classical encryption have been proposed [6]. After addressing issues such as decoherence and noise [7, 8], the unique advantages of quantum encryption are gradually becoming apparent [9,10]. Subsequently, researchers investigated practical steps for quantum information transmission protocols, aiming to reduce costs and enhance efficiency [11]. Next, the quantum cost of dense coding and teleportation protocols has been evaluated in terms of CNOT gates [12]. Authors in [13] showed that the quantum remote control may be applied to realize the teleportation unitary gates. Furthermore, a similar technique has been used to teleport angles in a secure manner [14]. Further, multi partite scenarios have been considered for a deterministic single qubit. That is, recent advancements in the field of remote implementation of partially unknown quantum operations on multiple qubits have led to significant breakthroughs, rendering practical operations feasible. These developments have substantially propelled the potential applications of quantum communication and networking forward [15]. Besides, operation sharing with five-qubit cluster state has been established [16,17]. These operations and protocols provide a good foundation for realizing more complex protocols of transmitting information securely.

In this paper, we extend the above protocols by constructing a multi-party quantum security protocol based on the so-called remote-controlled implementation of operations. In Section II, we delve into the entangled state, inner product, and the Kronecker product. In Section III, we discuss a quantum communication protocol in which Bob sends messages to Charlie, and Alice has the ability to control the message transmission. By redesigning the communication protocol, we achieve the controlled communication among Alice and Bob. Alice measures her qubit and then sends it to the receiver Bob. As a result, Bob can perform a local measurement as a projection, and he manages to decode the secret from Alice. We finally conclude in Section V.

2. Preliminaries

We define the inner product of two n-dimensional vectors  |a . and  |b⟩ . If  |a = [a1,..., an]T and  \b⟩ = [b1,..., bn]T, then their inner product is

a|b:=j=1najbj(1)

Next we present the Bell state used in the protocol of quantum dense coding. The state is

|ϕ+=12(|00+|11)(2)

Where  |00⟩:=|0⟩⊗|0⟩=[1000] , because we use the standard orthonormal qubits

 |0⟩=[10] and |1⟩=[01] . The following are some basics on complex numbers, namely  e+1=0,e+1=0 and 

 cos−1θ; sin−1θ ;

e=cosθ+isinθ(3)

A general complex number x = a + bi with real a, b can be written as

x=a+bi=|x|e=|x|(cosθ+isinθ)=a2+b2(cosθ+isinθ)(4)

2.1. Kronecker product and the vec operator

Definition 1. Let A be an n × p matrix and B an m × q matrix. The mn × pq matrix

AB=[a1,1Ba1,2Ba1,pBa2,1Ba2,2Ba2,pBan,1Ban,2Ban,pB](5)

is called the Kronecker product of A and B. It is also called the direct product or the tensor product.

In=[1000010000100001](6)

diag(x1,,xn)=[x10000x20000x30000xn](7)

diag(x1,,xn)=Indiag(x1,,xn)=[100010001000⋯1][x10000x20000x30000xn](8)

Indiag(x1,,xn)=diag(x1,,xn)(9)

2.2. Gates and states

We introduce the Hadamard gate as follows.

H=12[111−1](10)

The Hadamard operation can transform the qubits |0〉and |1〉into their superposition with equal weights. The specific formulas are as follows.

H|0=|0+|12(11)

H|1=|0|12(12)

Next, the CNOT gate is a quantum gate capable of transforming quantum states in the form of |a, b〉into |a, a ⊕ b〉where a, b = 0, 1. The operating principle of the CNOT gate is to take the first qubit as the control qubit, and perform the opposite transformation on the second qubit based on the state of the control qubit. It is important to note that the CNOT gate cannot operate on individual quantum states, as it automatically considers the first qubit as the decision maker. The CNOT gate has the matrix form as follows.

CNOT=[1000010000010010](13)

There are four forms of Bell states, each of which is a maximally entangled state of two quantum bits. The properties of entanglement are used to transfer information in the following quantum communication. The specific formula of four Bell states are as follows.

|Φ+=12(|00+|11)(14)

|Φ=12(|00|11)(15)

|Ψ+=12(|01+|10)(16)

|Ψ=12(|01|10)(17)

3. Result on dense coding

In this section, we introduce the basics of quantum dense coding protocol, see a simple description in Figure 1. As the first step, we generate a pair of entangled EPR states through the source S, shared between Alice and Bob. The state of the EPR pair can be represented as the Bell state (37). To obtain the Bell state |ϕ〉, a Hadamard gate is first applied to the initial state |0〉, namely on the first qubit. This is followed by a controlled-NOT (CNOT) operation. Mathematically, this process is as follows:

图片
Figure 1. A quantum circuit that performs a dense coding scheme

In the computational basis |00〉, |01〉, |10〉, and |11〉, the EPR pair and the gate operations can be represented using matrices. The result shows that the obtained |ϕ〉can be expressed in matrix form as,

|ϕ1=12[1001](18)

In the computational basis |00〉, |01〉, |10〉, and |11〉, (Note: The first digit refers to Alice’s half of the EPR pair, and the second digit refers to Bob’s half), the transformation (4.20) has the following matrix representation,

[1000010000010010][1010010101−10010−1][1000]=12[1001](19)

The value of U is determined by the classical comparison of the two bits that Alice wants to transmit to Bob. If she wants to transmit |00〉, she performs the following operation on her half of the EPR pair,

(II)|ϕ+=|ϕ+(20)

If she wants to transmit |01〉, she applies the Pauli matrix σx on her half of the EPR pair,

(IσxI)|ϕ+=|ψ+(21)

In the computational basis, the state is represented as follows,

[0010000110000100]12[101]=12[1001](22)

If she wants to transmit |10〉, she applies σz on her half of the EPR pair,

(IσzI)|ϕ+=|ϕ+(23)

and the matrix form is shown as,

[1000010000−10000−1]12[1001]=12[100−1](24)

Finally, if she wants to transmit |11〉, she applies  iσy  on her half of the EPR pair,

(iσyI)|ϕ+=|ψ(25)

and the matrix form is shown as,

[00100001−10000−100]12[1001]=12[01−10](26)

We calculate the tensor products  σxσy  and  I⊗σx .

σxσy=[0110][0−ii0]=[000−i00i00−i00i000](27)

Iσx=[1001][0110]=[0100100000010010](28)

Since

A=A; B=B(29)

we have

{i[A,B]}={iABiBA}=iBA+iAB=i[A,B](30)

σxσy=[0110][0−ii0][000−i00i00−i00i000](31)

Iσx=[1001][0110][0100100000010010](32)

We also need decode the message by inverse operation. That is,

(CNOT(HI))−1=(HI)CNOT(33)

We record this operator as B. By taking the decoding operator, Bob can finally obtain the correct message.

B|ψ+=|01,B|ψ=|11,B|ϕ+=|00,B|ϕ=|10(34)

Any unitary operator U is orthogonal and thus can be diagonalized. Therefore, its spectral decomposition can be written as

U=jλjjj|(35)

Since a unitary operator preserves the inner product of vectors, we have

j|UU|j=λjλj=1(36)

This implies that | λj | = 1, so Equation (19) can be rewritten as,

U=jeiαj|jj|(37)

where  αj  are real numbers. Now, we define the operator

A=jαjjj|(38)

Since A is already in diagonal form, the operator  eiA  can be directly written as

eiA=jeiαj|j⟩⟨j|(39)

Thus,  eiA = U. Next, we prove that A is Hermitian. First, we have

U=n=0(iA)nn!(40)

U=n=0[(iA)nn!]=n=0(−iA)nn!=e−iA(41)

Thus, the condition  U  = U-1 is satisfied only if  A = A, i.e., A is a Hermitian operator.

ΔσxΔσy12|0|[[σx,σy]]0|(42)

Computing the commutator  [σx,σy] , we obtain

ΔσxΔσy12[10][2i00−2i][1]=1(43)

The first instrument measures the final state |+⟩z = |1⟩. The particle in state |1⟩ then enters the second instrument and is prepared in the state

|+y=12(i|0+|1)(44)

Finally, the third instrument analyzes the state |+⟩y, measuring σx. With equal probabilities p0 and p1, the two possible output states |0⟩x = |0⟩ and |1⟩x = |1⟩ are obtained,

p0=|0|+|y|2=12, p1=|1|+|y|2=12(45)

The solution to the Schrodinger equation is given by

|ψ(t)=U(t)|ψ(0)(46)

where the unitary time evolution operator is

U(t)=exp(iHt)(47)

and

H=μσ(48)

Expanding U(t), we obtain

U(t)=eiαn⋅σ=cosαI+isinα(nσ)(49)

Finally, in matrix representation,

U(t)=[cosα+isinαnzsinα(ny+inx)sinα(−ny+inx)cosα−isinαnz](50)

4. Quantium teleportation

Quantum invisible transmission of states through quantum entanglement of Bell states allows the transmission of quantum information at both ends solely through the classical channel. The principles and methods are as follows. Suppose Alice wants to convey to Bob the two-energy-level quantum information that is in a superposition state  α|0⟩+β|1⟩ . She can use the second method which is shown as follows.

Step 1. We build the EPR pair.

The source S generates an EPR pair namely a Bell state, and sends the first half to Alice and the second half to Bob. Make sure the pair of quanta is in an entangled state  |ψ+⟩=12(|01⟩+|10⟩).  To build this EPR pair, S should carry out the physical operation as follows.

CNOT(HI)|00=|ψ+(51)

By sending the EPR pair to Alice and Bob, Alice has two particles, which are respectively half of the EPR pair and the message qubit she wants to transmit to Bob. On the other hand, Bob only has one qubit, namely the other half of EPR pair.

The state of the three qubits are given by the tensor product of  |ψ⟩ and  |ψ+ as follows.

|ψ⟩⊗|ψ+=(α|0⟩+β|1⟩)⊗12(|01⟩+|10⟩)=α2(|001⟩+|010⟩)+β2(|101⟩+|110⟩).(52)

Step 2. Joint measurement by Alice.

The reason why Alice needs to do the joint measurement is that if Alice only determines message qubit, this quantum will collapse to |0〉or |1〉. The way out of this problem is to make measurements on the Bell state, i.e.,  ϕ+⟩,⟨ϕ⟩,⟨ψ+⟩,⟨ψ 

{|00⟩=12(|ϕ+⟩+|ϕ),|11⟩=12(|ϕ+⟩−|ϕ),|01⟩=12(|ψ+⟩+|ψ),|10⟩=12(|ψ+⟩−|ψ).(53)

Then we insert Eq. (37) into (36), by transforming the computational basis into the Bell basis.

|ψ⟩⊗|ψ+=α2(|ϕ+|+|ϕ)|1⟩+α2(|ψ+|+|ψ)|0⟩+β2(|ψ+⟩−|ψ⟩)|1⟩+β2(|ϕ+⟩−|ϕ⟩)|0⟩=12|ψ+)(α|0)+β|1) + 12|ψ)(α|0)−β|1)+12|ϕ+⟩(α|1⟩+β|0⟩)+12|ϕ⟩(α|1⟩−β|0⟩) .(54)

In this case, if Alice does a Bell Measurement, she has the same chance to obtain every state of  ϕ+⟩,⟨ϕ⟩,⟨ψ+⟩,⟨ψ . By using suitable unitary operation (see the next subsection), Alice can change these four measurement results to some message which can be sent by classical channels.

12|01⟩(α|0⟩+β|1⟩)+12|11⟩(α|0⟩−β|1⟩)+12|⟨00⟩(α⟨1⟩+β⟨0⟩)+12|⟨10⟩(α⟨1⟩−β⟨0⟩)⟩ .(55)

Step 3. Unitary operation is carried out by Bob.

Alice sends the result of the Bell measurements to Bob by classical messages. Bob can use this message to determine which of the quantum states is this message corresponds to.

|00(α|1+β|0)σx(56)

|10(α|1β|0)iσy(57)

|01(α|0+β|1)I(58)

|11(α|0β|1)σz(59)

By taking this operation, Bob can obtain the message qubit α|0〉+β|1〉. So we have completed the protocol of quantum teleportation.

5. Conclusions

We have shown the dense coding protocol of controlled remote implementation of operations in two participants. They show the quantum security guaranteed by the basic rules of quantum mechanics by using entanglement and measurement. An open problem unsolved in this paper is to extend the results to implementation of operations of many parties. Whether entanglement in this protocol could be decreased is also an interesting issue for the next step.


References

[1]. Bennett, Brassard, Crepeau, Jozsa, Peres, and Wootters. Teleporting an un- known quantum state via dual classical and einstein-podolsky-rosen channels. Phys- ical review letters, 70(13): 1895–1899, 1993.

[2]. Bennett and Wiesner. Communication via one- and two-particle operators on einstein-podolsky-rosen states. Physical review letters, 69(20): 2881–2884, 1992.

[3]. Nicolas Gisin, Gr ´egoire Ribordy, Wolfgang Tittel, and Hugo Zbinden. Quan- tum cryptography. Reviews of Modern Physics, 74: 145–195, 2002.

[4]. Christopher Portmann and Renato Renner. Security in quantum cryptography. Reviews of Modern Physics, 94: 025008, 2022.

[5]. Deutsch D. and Jozsa R. Rapid solution of problems by quantum computation. Proceedings of the Royal Society A: Mathematical, 439(1907): 553–558, 1992.

[6]. Peter W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. Siam Journal on Computing, 1997.

[7]. Yuri Alexeev. Quantum computer systems for scientific discovery. PRX Quantum, 2: 017001, 2021.

[8]. J. I. Cirac, A. K. Ekert, S. F. Huelga, and C. Macchiavello. Distributed quantum computation over noisy channels. Physical Review A, 59: 4249–4254, 1999.

[9]. Alessio Serafini, Stefano Mancini, and Sougato Bose. Distributed quantum computation via optical fibers. Physical Review Letters, 96: 010503, 2006.

[10]. Dik Bouwmeester, Jian-Wei Pan, Klaus Mattle, Manfred Eibl, Harald We- infurter, and Anton Zeilinger. Experimental quantum teleportation. Nature, 390(6660): 575–579, 1997.

[11]. Iulia Georgescu. 25 years of experimental quantum teleportation. Nature Reviews Physics, 2022.

[12]. Xinyu Qiu and Lin Chen. Quantum cost of dense coding and teleportation. Physical Review A, 105: 062451, 2022.

[13]. S. F. Huelga, J. A. Vaccaro, A. Chefles, and M. B. Plenio. Quantum remote control: Teleportation of unitary operations. Physical Review A, 63(4), 2001.

[14]. S. F. Huelga, M. B. Plenio, and J. A. Vaccaro. Remote control of restricted sets of operations: Teleportation of angles. Physical Review A, 65(4), 2002.

[15]. An Min Wang. Combined and controlled remote implementations of par- tially unknown quantum operations of multiqubits using greenberger-horne-zeilinger states. Physical Review A, 75(6), 2007.

[16]. M. A. Nielsen and I. L. Chuang. Quantum Computation and Quantum In- formation. Cambridge University Press, Cambridge, 2000.

[17]. Shengfang Wang, Yimin Liu, Jianlan Chen, Xiansong Liu, and Zhanjun Zhang. Deterministic single-qubit operation sharing with five-qubit cluster state. Quantum Information Processing, 12(7): 2497-2507, 2013.


Cite this article

Liu,Y. (2025). On Quantum Dense Coding for Bipartite Systems. Theoretical and Natural Science,136,9-20.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of CONF-APMM 2025 Symposium: Multi-Qubit Quantum Communication for Image Transmission over Error Prone Channels

ISBN:978-1-80590-375-8(Print) / 978-1-80590-376-5(Online)
Editor:Anil Fernando
Conference website: https://2025.confapmm.org/
Conference date: 29 August 2025
Series: Theoretical and Natural Science
Volume number: Vol.136
ISSN:2753-8818(Print) / 2753-8826(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).

References

[1]. Bennett, Brassard, Crepeau, Jozsa, Peres, and Wootters. Teleporting an un- known quantum state via dual classical and einstein-podolsky-rosen channels. Phys- ical review letters, 70(13): 1895–1899, 1993.

[2]. Bennett and Wiesner. Communication via one- and two-particle operators on einstein-podolsky-rosen states. Physical review letters, 69(20): 2881–2884, 1992.

[3]. Nicolas Gisin, Gr ´egoire Ribordy, Wolfgang Tittel, and Hugo Zbinden. Quan- tum cryptography. Reviews of Modern Physics, 74: 145–195, 2002.

[4]. Christopher Portmann and Renato Renner. Security in quantum cryptography. Reviews of Modern Physics, 94: 025008, 2022.

[5]. Deutsch D. and Jozsa R. Rapid solution of problems by quantum computation. Proceedings of the Royal Society A: Mathematical, 439(1907): 553–558, 1992.

[6]. Peter W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. Siam Journal on Computing, 1997.

[7]. Yuri Alexeev. Quantum computer systems for scientific discovery. PRX Quantum, 2: 017001, 2021.

[8]. J. I. Cirac, A. K. Ekert, S. F. Huelga, and C. Macchiavello. Distributed quantum computation over noisy channels. Physical Review A, 59: 4249–4254, 1999.

[9]. Alessio Serafini, Stefano Mancini, and Sougato Bose. Distributed quantum computation via optical fibers. Physical Review Letters, 96: 010503, 2006.

[10]. Dik Bouwmeester, Jian-Wei Pan, Klaus Mattle, Manfred Eibl, Harald We- infurter, and Anton Zeilinger. Experimental quantum teleportation. Nature, 390(6660): 575–579, 1997.

[11]. Iulia Georgescu. 25 years of experimental quantum teleportation. Nature Reviews Physics, 2022.

[12]. Xinyu Qiu and Lin Chen. Quantum cost of dense coding and teleportation. Physical Review A, 105: 062451, 2022.

[13]. S. F. Huelga, J. A. Vaccaro, A. Chefles, and M. B. Plenio. Quantum remote control: Teleportation of unitary operations. Physical Review A, 63(4), 2001.

[14]. S. F. Huelga, M. B. Plenio, and J. A. Vaccaro. Remote control of restricted sets of operations: Teleportation of angles. Physical Review A, 65(4), 2002.

[15]. An Min Wang. Combined and controlled remote implementations of par- tially unknown quantum operations of multiqubits using greenberger-horne-zeilinger states. Physical Review A, 75(6), 2007.

[16]. M. A. Nielsen and I. L. Chuang. Quantum Computation and Quantum In- formation. Cambridge University Press, Cambridge, 2000.

[17]. Shengfang Wang, Yimin Liu, Jianlan Chen, Xiansong Liu, and Zhanjun Zhang. Deterministic single-qubit operation sharing with five-qubit cluster state. Quantum Information Processing, 12(7): 2497-2507, 2013.