Abstract
In 2010, Xiu et al. (Optics Communications 284:2065–2069, 2011) proposed several applications based on a new secure four-site distribution scheme using χ-type entangled states. This paper points out that one of these applications, namely, supervisory asymmetric deterministic secure quantum communication, is subject to an information leakage problem, in which the receiver can extract two bits of a three-bit secret message without the supervisor’s permission. An enhanced protocol is proposed to resolve this problem.
Similar content being viewed by others
References
Kim, B., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)
Cai, Q.-Y., Li, B.-W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601 (2004)
Gao, T., et al.: Deterministic secure direct communication using GHZ states and swapping quantum entanglement. J. Phys. A, Math. Gen. 38, 5761 (2005)
Man, Z.-X., et al.: Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations. Chin. Phys. Lett. 22, 18 (2005)
Tsai, C.-W., Hwang, T.: New deterministic quantum communication via symmetric W state. Opt. Commun. 283, 4397–4400 (2010)
Tsai, C.-W., et al.: Dense coding using cluster states and its application on deterministic secure quantum communication. Eur. Phys. J., D, At. Mol. Opt. Phys. 61, 779–783 (2011)
Xiu, X.-M., et al.: Controlled deterministic secure quantum communication using five-qubit entangled states and two-step security test. Opt. Commun. 282, 333–337 (2009)
Xiu, X.-M., et al.: A revised controlled deterministic secure quantum communication with five-photon entangled state. Opt. Commun. 283, 344–347 (2010)
Xiu, X.-M., et al.: Secure four-site distribution and quantum communication of [chi]-type entangled states. Opt. Commun. 284, 2065–2069 (2011)
Lin, S., et al.: Quantum secure direct communication with χ-type entangled states. Phys. Rev. A, Gen. Phys. 78, 064304 (2008)
Wang, X.-W., Yang, G.-J.: Generation and discrimination of a type of four-partite entangled state. Phys. Rev. A, Gen. Phys. 78, 024301 (2008)
Yeo, Y., Chua, W.K.: Teleportation and dense coding with genuine multipartite entanglement. Phys. Rev. Lett. 96, 060502 (2006)
Deng, F.-G., et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A, Gen. Phys. 72, 044302 (2005)
Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006)
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948). 623–656
Acknowledgements
The authors would like to thank the anonymous reviewers for their valuable comments, which greatly enhanced the clarity of this paper. This research is partially supported by the National Science Council of Republic of China and the Research Center of Quantum Communication and Security, National Cheng Kung University, Taiwan, R.O.C., under the Contract No. NSC 100-2221-E-006-152-MY3 and D100-36002, respectively.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kao, SH., Tsai, CW. & Hwang, T. Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication. Int J Theor Phys 51, 3868–3875 (2012). https://doi.org/10.1007/s10773-012-1273-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-012-1273-9