Skip to main content
Top
Published in: Quantum Information Processing 7/2013

01-07-2013

Three-particle deterministic secure and high bit-rate direct quantum communication protocol

Authors: Soudeh Jahanshahi, Alireza Bahrampour, Mohammad Hossein Zandi

Published in: Quantum Information Processing | Issue 7/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A scheme for deterministic secure and high bit-rate direct communication without resorting to a distinct control interval is proposed. It utilizes three entangled qubits, and presents higher bit transfer rate of information and higher security. The security of protocol is asserted by introducing a security control for each transferred bit. The protocol is investigated for a class of individual attacks and it is explicitly showed that the protocol has a high security even in the presence of channel loss.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennet, C.H., Brassard, G.: Quantum Cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and, Signal Processing (1984) Bennet, C.H., Brassard, G.: Quantum Cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and, Signal Processing (1984)
4.
go back to reference Lin, J., Hwang, T.: Bell state entanglement swappings over collective noises and their applications on quantum cryptography. Quantum Inf. Process., 1–19 (2012). doi:10.1007/s11128-012-0456-x Lin, J., Hwang, T.: Bell state entanglement swappings over collective noises and their applications on quantum cryptography. Quantum Inf. Process., 1–19 (2012). doi:10.​1007/​s11128-012-0456-x
5.
go back to reference Beige, A., Englert, B.G., Kurtsiefer, C., Weinfurter, H.: Secure communication with a publicly known key. Acta Phys. Pol. A 101(3), 357–368 (2002)ADS Beige, A., Englert, B.G., Kurtsiefer, C., Weinfurter, H.: Secure communication with a publicly known key. Acta Phys. Pol. A 101(3), 357–368 (2002)ADS
6.
go back to reference Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)ADSCrossRef Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)ADSCrossRef
7.
go back to reference Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), 109801 (2003) Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), 109801 (2003)
11.
go back to reference Deng, F.-G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)ADSCrossRef Deng, F.-G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)ADSCrossRef
12.
go back to reference Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005) Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)
13.
go back to reference Kye, W.-H., Kim, C.-M., Kim, M.S., Park, Y.-J.: Quantum key distribution with blind polarization bases. Phys. Rev. Lett. 95(4), 040501 (2005)MathSciNetADSCrossRef Kye, W.-H., Kim, C.-M., Kim, M.S., Park, Y.-J.: Quantum key distribution with blind polarization bases. Phys. Rev. Lett. 95(4), 040501 (2005)MathSciNetADSCrossRef
15.
go back to reference Shimizu, K., Tamaki, K., Fukasaka, H.: Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair. Phys. Rev. A 80(2), 022323 (2009)MathSciNetADSCrossRef Shimizu, K., Tamaki, K., Fukasaka, H.: Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair. Phys. Rev. A 80(2), 022323 (2009)MathSciNetADSCrossRef
17.
go back to reference Cai, Q.-Y., Li, B.-W.: Improving the capacity of the Boström-Felbinger protocol. Phys. Rev. A 69(5), 054301 (2004)ADSCrossRef Cai, Q.-Y., Li, B.-W.: Improving the capacity of the Boström-Felbinger protocol. Phys. Rev. A 69(5), 054301 (2004)ADSCrossRef
20.
go back to reference Qin, S.-J., Gao, F., Guo, F.-Z., Wen, Q.-Y.: Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”. Phys. Rev. A 82(3), 036301 (2010)MathSciNetADSCrossRef Qin, S.-J., Gao, F., Guo, F.-Z., Wen, Q.-Y.: Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”. Phys. Rev. A 82(3), 036301 (2010)MathSciNetADSCrossRef
21.
go back to reference Lin, S., Wen, Q.-Y., Gao, F., Zhu, F.-C.: Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks. Phys. Rev. A 79(5), 054303 (2009)ADSCrossRef Lin, S., Wen, Q.-Y., Gao, F., Zhu, F.-C.: Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks. Phys. Rev. A 79(5), 054303 (2009)ADSCrossRef
22.
go back to reference Lu, H., Fung, C.-H.F., Ma, X., Cai, Q.-Y.: Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel. Phys. Rev. A 84(4), 042344 (2011)ADSCrossRef Lu, H., Fung, C.-H.F., Ma, X., Cai, Q.-Y.: Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel. Phys. Rev. A 84(4), 042344 (2011)ADSCrossRef
23.
go back to reference Fung, C.-H.F., Ma, X., Chau, H.F., Cai, Q.-Y.: Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol. Phys. Rev. A 85(3), 032308 (2012)ADSCrossRef Fung, C.-H.F., Ma, X., Chau, H.F., Cai, Q.-Y.: Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol. Phys. Rev. A 85(3), 032308 (2012)ADSCrossRef
24.
go back to reference Wojcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90(15), 157901 (2003)ADSCrossRef Wojcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90(15), 157901 (2003)ADSCrossRef
26.
27.
go back to reference Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dusek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Modern Phys. 81(3), 1301–1350 (2009)ADSCrossRef Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dusek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Modern Phys. 81(3), 1301–1350 (2009)ADSCrossRef
28.
go back to reference Clerk, A.A., Devoret, M.H., Girvin, S.M., Marquardt, F., Schoelkopf, R.J.: Introduction to quantum noise, measurement, and amplification. Rev. Modern Phys. 82(2), 1155–1208 (2010)MathSciNetADSMATHCrossRef Clerk, A.A., Devoret, M.H., Girvin, S.M., Marquardt, F., Schoelkopf, R.J.: Introduction to quantum noise, measurement, and amplification. Rev. Modern Phys. 82(2), 1155–1208 (2010)MathSciNetADSMATHCrossRef
29.
go back to reference Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Modern Phys. 74(1), 145–195 (2002)ADSCrossRef Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Modern Phys. 74(1), 145–195 (2002)ADSCrossRef
30.
go back to reference Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)ADSCrossRef Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)ADSCrossRef
Metadata
Title
Three-particle deterministic secure and high bit-rate direct quantum communication protocol
Authors
Soudeh Jahanshahi
Alireza Bahrampour
Mohammad Hossein Zandi
Publication date
01-07-2013
Publisher
Springer US
Published in
Quantum Information Processing / Issue 7/2013
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-013-0543-7

Other articles of this Issue 7/2013

Quantum Information Processing 7/2013 Go to the issue