Abstract
In this study, we propose a controlled deterministic secure quantum communication (CDSQC) protocol based on the idea of Grover’s quantum search algorithm (QSA). The proposed protocol has the following two advantages over the existing CDSQC protocols: (1) high qubit frequency and (2) less quantum memory. Moreover, the security analysis of the proposed protocol shows that any eavesdropper will be detected with a very high probability under both ideal and noisy quantum channel conditions.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179 (1984)
Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)
Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)
Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A, Math. Theor. 42, 055305 (2009)
Gao, T., Yan, F.-L., Wang, Z.-X.: Controlled quantum teleportation and secure direct communication. Chin. Phys. 14(5), 893 (2005)
Dong, L., Xiu, X.-M., Gao, Y.-J., Ren, Y.-P., Liu, H.-W.: Controlled three-party communication using GHZ-like state and imperfect Bell-state measurement. Opt. Commun. 284(3), 905–908 (2011)
Yang, Y.-G., Chai, H.-P., Teng, Y.-W., Wen, Q.-Y.: Improving the security of controlled quantum secure direct communication by using four particle cluster states against an attack with fake entangled particles. Int. J. Theor. Phys. 50(2), 395–400 (2011)
Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)
Hsu, L.-Y.: Quantum secret sharing protocol based on Grover’s algorithm. Phys. Rev. A 68(2), 022306 (2003)
Hao, L., Li, J.-L., Long, G.-L.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China, Phys. Mech. Astron. 53(3), 491–495 (2010)
Wang, C., Hao, L., Song, S.-Y., Long, G.-L.: Quantum direct communication based on quantum search algorithm. Int. J. Quantum Inf. 8(3), 443–450 (2010)
Wang, J., Zhang, Q., Tang, C.-J.: Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 266(2), 732–737 (2006)
Lin, J., Tseng, H.-Y., Hwang, T.: Intercept-resend attacks on Chen et al.’s quantum private comparison protocol and the improvements. Opt. Commun. 284(9), 2412–2414 (2011)
Yang, C.-W., Tsai, C.-W., Hwang, T.: Thwarting intercept-and-resend attack on Zhang’s quantum secret sharing using collective rotation noises. Quantum Inf. Process. 11(1), 113–122 (2012)
Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.-J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)
Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)
Chong, S.-K., Luo, Y.-P., Hwang, T.: On “Arbitrated quantum signature of classical messages against collective amplitude damping noise”. Opt. Commun. 284(3), 893–895 (2011)
Hughes, R.J., Nordholt, J.E., Derkacs, D., Peterson, C.G.: Practical free-space quantum key distribution over 10 km in daylight and at night. New J. Phys. 4(43), 1–43 (2002)
Gobby, C., Yuan, Z.-L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84(19), 3762 (2004)
Acknowledgements
The authors would like to thank the National Science Council of the Republic of China and the Research Center of Quantum Communication and Security, National Cheng Kung University, Taiwan, R.O.C. for financially supporting this research under Contract Nos. NSC 100-2221-E-006-152-MY3 and D100-36002, respectively.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tseng, HY., Tsai, CW. & Hwang, T. Controlled Deterministic Secure Quantum Communication Based on Quantum Search Algorithm. Int J Theor Phys 51, 2447–2454 (2012). https://doi.org/10.1007/s10773-012-1125-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-012-1125-7