Skip to main content
Top
Published in: Quantum Information Processing 11/2020

01-11-2020

High-dimensional measurement-device-independent quantum secure direct communication

Authors: Lu Liu, Jia-Lei Niu, Chen-Rui Fan, Xue-Ting Feng, Chuan Wang

Published in: Quantum Information Processing | Issue 11/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Quantum secure direct communication is an important communication mode of quantum communications. Its development and application are mainly limited by the channel capacity and channel loss. Here, in this paper, a high-dimensional measurement-device-independent quantum secure direct communication protocol is proposed. The quantum information is encoded on the spatial mode of the photons which enlarges the coding Hilbert space and results in the high efficiency, feasibility with existing technique, and tolerance of channel noise. Based on realistic experimental parameters, the efficiency of communications is analytically derived and numerically discussed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennett, C.H.B.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, IEEE, New York, p. 175 (1984) Bennett, C.H.B.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, IEEE, New York, p. 175 (1984)
2.
3.
go back to reference Bruß, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998)ADSCrossRef Bruß, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998)ADSCrossRef
4.
go back to reference Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)ADSCrossRef Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)ADSCrossRef
5.
go back to reference Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef
7.
go back to reference Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)ADSCrossRef Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)ADSCrossRef
8.
go back to reference Acín, A., Brunner, N., Scarani, V.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007)ADSCrossRef Acín, A., Brunner, N., Scarani, V.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007)ADSCrossRef
9.
go back to reference Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)ADSCrossRef Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)ADSCrossRef
10.
go back to reference Ferreira da Silva, T., Vitoreti, D., von der Weid, J.P.: Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits. Phys. Rev. A 88, 052303 (2013)ADSCrossRef Ferreira da Silva, T., Vitoreti, D., von der Weid, J.P.: Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits. Phys. Rev. A 88, 052303 (2013)ADSCrossRef
11.
go back to reference Lucamarini, M., Yuan, Z.L., Dynes, J.F., Shields, A.J.: Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 557, 400 (2018)ADSCrossRef Lucamarini, M., Yuan, Z.L., Dynes, J.F., Shields, A.J.: Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 557, 400 (2018)ADSCrossRef
14.
go back to reference Long, G.-L., Liu, X.-S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)ADSCrossRef Long, G.-L., Liu, X.-S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)ADSCrossRef
15.
go back to reference Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)ADSCrossRef Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)ADSCrossRef
16.
go back to reference Zhang, W., Ding, D.-S., Sheng, Y.-B., Zhou, L., Shi, B.-S., Guo, G.-C.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017) ADSCrossRef Zhang, W., Ding, D.-S., Sheng, Y.-B., Zhou, L., Shi, B.-S., Guo, G.-C.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017) ADSCrossRef
17.
go back to reference Zhou, Z.R., Sheng, Y.B., PengHao, N., Yin, L.G., Long, G.L., Hanzo, L.: Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron. 63, 230362 (2020)CrossRef Zhou, Z.R., Sheng, Y.B., PengHao, N., Yin, L.G., Long, G.L., Hanzo, L.: Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron. 63, 230362 (2020)CrossRef
18.
go back to reference Zhou, L., Sheng, Y.-B., Long, G.-L.: Device-independent quantum secure direct communication against collective attacks. Sci. Bull. 65, 12 (2020)CrossRef Zhou, L., Sheng, Y.-B., Long, G.-L.: Device-independent quantum secure direct communication against collective attacks. Sci. Bull. 65, 12 (2020)CrossRef
19.
go back to reference Pan, D., Lin, Z., Wu, J., Sun, Z., Ruan, D., Yin, L., Long, G.: Experimental free-space quantum secure direct communication and its security analysis. arXiv:2005.05102 Pan, D., Lin, Z., Wu, J., Sun, Z., Ruan, D., Yin, L., Long, G.: Experimental free-space quantum secure direct communication and its security analysis. arXiv:​2005.​05102
20.
go back to reference Deng, F.-G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)ADSCrossRef Deng, F.-G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)ADSCrossRef
21.
go back to reference Wang, C., Deng, F.-G., Li, Y.-S., Liu, X.-S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71, 044305 (2005)ADSCrossRef Wang, C., Deng, F.-G., Li, Y.-S., Liu, X.-S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71, 044305 (2005)ADSCrossRef
22.
go back to reference Hu, J.-Y., Bo, Yu., Jing, M.-Y., Xiao, L.-T., Jia, S.-T., Qin, G.-Q., Long, G.-L.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016)CrossRef Hu, J.-Y., Bo, Yu., Jing, M.-Y., Xiao, L.-T., Jia, S.-T., Qin, G.-Q., Long, G.-L.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016)CrossRef
23.
go back to reference Zhu, F., Zhang, W., Sheng, Y., Huang, Y.: Experimental long-distance quantum secure direct communication. Sci. Bull. 62, 1519 (2017)CrossRef Zhu, F., Zhang, W., Sheng, Y., Huang, Y.: Experimental long-distance quantum secure direct communication. Sci. Bull. 62, 1519 (2017)CrossRef
24.
go back to reference Qi, R., Sun, Z., Lin, Z., Niu, P., Hao, W., Song, L., Huang, Q., Gao, J., Yin, L., Long, G.-L.: Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 8, 1 (2019)CrossRef Qi, R., Sun, Z., Lin, Z., Niu, P., Hao, W., Song, L., Huang, Q., Gao, J., Yin, L., Long, G.-L.: Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 8, 1 (2019)CrossRef
25.
go back to reference Fung, C.-H.F., Qi, B., Tamaki, K., Lo, H.-K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75, 032314 (2007)ADSCrossRef Fung, C.-H.F., Qi, B., Tamaki, K., Lo, H.-K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75, 032314 (2007)ADSCrossRef
26.
go back to reference Zhao, Y., Fung, C.-H.F., Lo, H.-K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008)ADSCrossRef Zhao, Y., Fung, C.-H.F., Lo, H.-K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008)ADSCrossRef
27.
go back to reference Lydersen, L., Wiechers, C., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4, 686 (2010)ADSCrossRef Lydersen, L., Wiechers, C., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4, 686 (2010)ADSCrossRef
28.
go back to reference Feihu, X., Qi, B., Lo, H.-K.: Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12, 113026 (2010)CrossRef Feihu, X., Qi, B., Lo, H.-K.: Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12, 113026 (2010)CrossRef
29.
go back to reference Biham, E., Mor, T.: Security of quantum cryptography against collective attacks. Phys. Rev. Lett. 78, 2256 (1997)ADSCrossRef Biham, E., Mor, T.: Security of quantum cryptography against collective attacks. Phys. Rev. Lett. 78, 2256 (1997)ADSCrossRef
31.
go back to reference Bennett, C.H.B.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)ADSMathSciNetCrossRef Bennett, C.H.B.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)ADSMathSciNetCrossRef
32.
go back to reference Reck, M., Zeilinger, A., Bernstein, H.J., Bertani, P.: Experimental realization of any discrete unitary operator. Phys. Rev. Lett. 73, 58 (1994)ADSCrossRef Reck, M., Zeilinger, A., Bernstein, H.J., Bertani, P.: Experimental realization of any discrete unitary operator. Phys. Rev. Lett. 73, 58 (1994)ADSCrossRef
33.
go back to reference Renner, R., Nicolas, G., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)ADSCrossRef Renner, R., Nicolas, G., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)ADSCrossRef
34.
go back to reference Nielsen, M.A., Chuang, I.L.: Quantum information and quantum computation, vol. 2. Cambridge University Press, Cambridge (2000)MATH Nielsen, M.A., Chuang, I.L.: Quantum information and quantum computation, vol. 2. Cambridge University Press, Cambridge (2000)MATH
35.
go back to reference Dellantonio, L., Sørensen, A.S., Bacco, D.: High-dimensional measurement-device-independent quantum key distribution on two-dimensional subspaces. Phys. Rev. A 98, 062301 (2018)ADSCrossRef Dellantonio, L., Sørensen, A.S., Bacco, D.: High-dimensional measurement-device-independent quantum key distribution on two-dimensional subspaces. Phys. Rev. A 98, 062301 (2018)ADSCrossRef
Metadata
Title
High-dimensional measurement-device-independent quantum secure direct communication
Authors
Lu Liu
Jia-Lei Niu
Chen-Rui Fan
Xue-Ting Feng
Chuan Wang
Publication date
01-11-2020
Publisher
Springer US
Published in
Quantum Information Processing / Issue 11/2020
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-020-02908-x

Other articles of this Issue 11/2020

Quantum Information Processing 11/2020 Go to the issue