Skip to main content
Log in

Controlled Deterministic Secure Quantum Communication Based on Quantum Search Algorithm

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

In this study, we propose a controlled deterministic secure quantum communication (CDSQC) protocol based on the idea of Grover’s quantum search algorithm (QSA). The proposed protocol has the following two advantages over the existing CDSQC protocols: (1) high qubit frequency and (2) less quantum memory. Moreover, the security analysis of the proposed protocol shows that any eavesdropper will be detected with a very high probability under both ideal and noisy quantum channel conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179 (1984)

    Google Scholar 

  2. Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)

    Article  ADS  Google Scholar 

  3. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)

    Article  MathSciNet  ADS  Google Scholar 

  4. Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A, Math. Theor. 42, 055305 (2009)

    Article  MathSciNet  ADS  Google Scholar 

  5. Gao, T., Yan, F.-L., Wang, Z.-X.: Controlled quantum teleportation and secure direct communication. Chin. Phys. 14(5), 893 (2005)

    Article  ADS  Google Scholar 

  6. Dong, L., Xiu, X.-M., Gao, Y.-J., Ren, Y.-P., Liu, H.-W.: Controlled three-party communication using GHZ-like state and imperfect Bell-state measurement. Opt. Commun. 284(3), 905–908 (2011)

    Article  ADS  Google Scholar 

  7. Yang, Y.-G., Chai, H.-P., Teng, Y.-W., Wen, Q.-Y.: Improving the security of controlled quantum secure direct communication by using four particle cluster states against an attack with fake entangled particles. Int. J. Theor. Phys. 50(2), 395–400 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  8. Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)

    Article  ADS  Google Scholar 

  9. Hsu, L.-Y.: Quantum secret sharing protocol based on Grover’s algorithm. Phys. Rev. A 68(2), 022306 (2003)

    Article  ADS  Google Scholar 

  10. Hao, L., Li, J.-L., Long, G.-L.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China, Phys. Mech. Astron. 53(3), 491–495 (2010)

    Article  ADS  Google Scholar 

  11. Wang, C., Hao, L., Song, S.-Y., Long, G.-L.: Quantum direct communication based on quantum search algorithm. Int. J. Quantum Inf. 8(3), 443–450 (2010)

    Article  MATH  Google Scholar 

  12. Wang, J., Zhang, Q., Tang, C.-J.: Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 266(2), 732–737 (2006)

    Article  MathSciNet  ADS  Google Scholar 

  13. Lin, J., Tseng, H.-Y., Hwang, T.: Intercept-resend attacks on Chen et al.’s quantum private comparison protocol and the improvements. Opt. Commun. 284(9), 2412–2414 (2011)

    Article  ADS  Google Scholar 

  14. Yang, C.-W., Tsai, C.-W., Hwang, T.: Thwarting intercept-and-resend attack on Zhang’s quantum secret sharing using collective rotation noises. Quantum Inf. Process. 11(1), 113–122 (2012)

    Article  MATH  Google Scholar 

  15. Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.-J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)

    Article  ADS  Google Scholar 

  16. Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)

    Article  ADS  MATH  Google Scholar 

  17. Chong, S.-K., Luo, Y.-P., Hwang, T.: On “Arbitrated quantum signature of classical messages against collective amplitude damping noise”. Opt. Commun. 284(3), 893–895 (2011)

    Article  ADS  Google Scholar 

  18. Hughes, R.J., Nordholt, J.E., Derkacs, D., Peterson, C.G.: Practical free-space quantum key distribution over 10 km in daylight and at night. New J. Phys. 4(43), 1–43 (2002)

    Google Scholar 

  19. Gobby, C., Yuan, Z.-L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84(19), 3762 (2004)

    Article  ADS  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the National Science Council of the Republic of China and the Research Center of Quantum Communication and Security, National Cheng Kung University, Taiwan, R.O.C. for financially supporting this research under Contract Nos. NSC 100-2221-E-006-152-MY3 and D100-36002, respectively.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzonelih Hwang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tseng, HY., Tsai, CW. & Hwang, T. Controlled Deterministic Secure Quantum Communication Based on Quantum Search Algorithm. Int J Theor Phys 51, 2447–2454 (2012). https://doi.org/10.1007/s10773-012-1125-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-012-1125-7

Keywords

Navigation