Skip to main content
Log in

Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

In 2010, Xiu et al. (Optics Communications 284:2065–2069, 2011) proposed several applications based on a new secure four-site distribution scheme using χ-type entangled states. This paper points out that one of these applications, namely, supervisory asymmetric deterministic secure quantum communication, is subject to an information leakage problem, in which the receiver can extract two bits of a three-bit secret message without the supervisor’s permission. An enhanced protocol is proposed to resolve this problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Kim, B., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)

    Article  Google Scholar 

  2. Cai, Q.-Y., Li, B.-W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601 (2004)

    Article  ADS  Google Scholar 

  3. Gao, T., et al.: Deterministic secure direct communication using GHZ states and swapping quantum entanglement. J. Phys. A, Math. Gen. 38, 5761 (2005)

    Article  ADS  MATH  Google Scholar 

  4. Man, Z.-X., et al.: Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations. Chin. Phys. Lett. 22, 18 (2005)

    Article  ADS  Google Scholar 

  5. Tsai, C.-W., Hwang, T.: New deterministic quantum communication via symmetric W state. Opt. Commun. 283, 4397–4400 (2010)

    Article  ADS  Google Scholar 

  6. Tsai, C.-W., et al.: Dense coding using cluster states and its application on deterministic secure quantum communication. Eur. Phys. J., D, At. Mol. Opt. Phys. 61, 779–783 (2011)

    ADS  Google Scholar 

  7. Xiu, X.-M., et al.: Controlled deterministic secure quantum communication using five-qubit entangled states and two-step security test. Opt. Commun. 282, 333–337 (2009)

    Article  ADS  Google Scholar 

  8. Xiu, X.-M., et al.: A revised controlled deterministic secure quantum communication with five-photon entangled state. Opt. Commun. 283, 344–347 (2010)

    Article  ADS  Google Scholar 

  9. Xiu, X.-M., et al.: Secure four-site distribution and quantum communication of [chi]-type entangled states. Opt. Commun. 284, 2065–2069 (2011)

    Article  ADS  Google Scholar 

  10. Lin, S., et al.: Quantum secure direct communication with χ-type entangled states. Phys. Rev. A, Gen. Phys. 78, 064304 (2008)

    Article  ADS  Google Scholar 

  11. Wang, X.-W., Yang, G.-J.: Generation and discrimination of a type of four-partite entangled state. Phys. Rev. A, Gen. Phys. 78, 024301 (2008)

    Article  ADS  Google Scholar 

  12. Yeo, Y., Chua, W.K.: Teleportation and dense coding with genuine multipartite entanglement. Phys. Rev. Lett. 96, 060502 (2006)

    Article  ADS  Google Scholar 

  13. Deng, F.-G., et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A, Gen. Phys. 72, 044302 (2005)

    Article  ADS  Google Scholar 

  14. Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006)

    Article  ADS  MATH  Google Scholar 

  15. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948). 623–656

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their valuable comments, which greatly enhanced the clarity of this paper. This research is partially supported by the National Science Council of Republic of China and the Research Center of Quantum Communication and Security, National Cheng Kung University, Taiwan, R.O.C., under the Contract No. NSC 100-2221-E-006-152-MY3 and D100-36002, respectively.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzonelih Hwang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kao, SH., Tsai, CW. & Hwang, T. Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication. Int J Theor Phys 51, 3868–3875 (2012). https://doi.org/10.1007/s10773-012-1273-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-012-1273-9

Keywords

Navigation