Orthogonal-state-based deterministic secure quantum communication without actual transmission of the message qubits

被引:18
|
作者
Shukla, Chitra [1 ]
Pathak, Anirban [1 ,2 ,3 ]
机构
[1] Jaypee Inst Informat Technol, Noida 201307, UP, India
[2] Palacky Univ, Joint Lab Opt, RCPTM, Olomouc 77146, Czech Republic
[3] Palacky Univ, Fac Sci, Inst Phys, Acad Sci Czech Republ, Olomouc 77146, Czech Republic
关键词
Quantum cryptography; Entanglement swapping; Direct quantum communication; MAXIMALLY ENTANGLED STATES; CRYPTOGRAPHY; TELEPORTATION;
D O I
10.1007/s11128-014-0792-0
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, an orthogonal-state-based protocol of direct quantum communication without actual transmission of particles is proposed by Salih et al. (Phys Rev Lett 110:170502, 2013) using chained quantum Zeno effect. The counterfactual condition (claim) of Salih et al. is weakened here to the extent that transmission of particles is allowed, but transmission of the message qubits (the qubits on which the secret information is encoded) is not allowed. Remaining within this weaker (non-counterfactual) condition, an orthogonal-state-based protocol of deterministic secure quantum communication is proposed using entanglement swapping, where actual transmission of the message qubits is not required. Further, it is shown that there exists a large class of quantum states that can be used to implement the proposed protocol. The security of the proposed protocol originates from monogamy of entanglement. As the protocol can be implemented without using conjugate coding, its security is independent of non-commutativity.
引用
收藏
页码:2099 / 2113
页数:15
相关论文
共 50 条
  • [31] Deterministic Secure Quantum Communication with Cluster State and Bell-Basis Measurements
    Yuan Hao
    He Qin
    Hu Xiao-Yuan
    Hou Kui
    Han Lian-Fang
    Shi Shou-Hua
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2008, 50 (05) : 1105 - 1108
  • [32] Deterministic Secure Quantum Communication with Mutual Authentication Based on Bell Measurement
    Liu, Zhihao
    Chen, Hanwu
    Xu, Juan
    Li, Wenqian
    Li, Zhigang
    2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
  • [33] Quantum Secure Direct Communication Protocol Based on Entangled State and an Quantum State
    Liu, Xiaohui
    Nie, Min
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 828 - 831
  • [34] A revised controlled deterministic secure quantum communication with five-photon entangled state
    Xiu, Xiao-Ming
    Dong, Li
    Gao, Ya-Jun
    Chi, Feng
    Ren, Yuan-Peng
    Liu, Hui-Wei
    OPTICS COMMUNICATIONS, 2010, 283 (02) : 344 - 347
  • [35] Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad
    Chang, Yan
    Zhang, Shibin
    Yan, Lili
    Li, Jian
    CHINESE SCIENCE BULLETIN, 2014, 59 (23): : 2835 - 2840
  • [36] Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad
    Li, Na
    Li, Jian
    Li, Lei-Lei
    Wang, Zheng
    Wang, Tao
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (08) : 3579 - 3587
  • [37] Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad
    Yan Chang
    Shibin Zhang
    Lili Yan
    Jian Li
    Chinese Science Bulletin, 2014, 59 (23) : 2835 - 2840
  • [38] Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad
    Na Li
    Jian Li
    Lei-Lei Li
    Zheng Wang
    Tao Wang
    International Journal of Theoretical Physics, 2016, 55 : 3579 - 3587
  • [39] On the "Deterministic Secure Quantum Communication using Four-Particle Entangled State and Entanglement Swapping"
    Tseng, Hsinyi
    Hwang, Tzonelih
    Lin, Chingying
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (03) : 471 - 478
  • [40] Multiparty Bidirectional Quantum Secure Communication Based on Closed Qubit Transmission
    Yin, Xunru
    PROCEEDINGS OF THE 5TH INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, 2015, 80 : 116 - 119