首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
A novel quantum secure direct communication scheme based on four-qubit cluster states is proposed. In this scheme, the quantum channel between the sender Alice and the receiver Bob consists of an ordered sequence of cluster states which are prepared by Alice. After ensuring the security of quantum channel, Alice prepares the encoded Bell-state sequence, and performs Bell-basis measurements on the qubits at hand. Then Alice tells the measured results to Bob, and Bob also performs Bell-basis measurements on his own qubits. Finally Bob can get the secret information through the analysis of their measured results. In our scheme, the qubits carrying the secret message do not need to be transmitted in public channel. We show this scheme is determinate and secure.  相似文献   

2.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitarytransformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication.  相似文献   

3.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

4.
A scheme for secure direct communication using EPR pairs and teleportation   总被引:7,自引:0,他引:7  
A novel scheme for secure direct communication between Alice and Bob is proposed, where there is no need for establishing a shared secret key. The communication is based on Einstein-Podolsky-Rosen (EPR) pairs and teleportation between Alice and Bob. After insuring the security of the quantum channel (EPR pairs), Bob encodes the secret message directly on a sequence of particle states and transmits them to Alice by teleportation. In this scheme teleportation transmits Bobs message without revealing any information to a potential eavesdropper. Alice can read out the encoded messages directly by the measurement on her qubits. Because there is not a transmission of the qubit which carries the secret message between Alice and Bob, it is completely secure for direct secret communication if perfect quantum channel is used.Received: 17 March 2004, Published online: 30 September 2004PACS: 03.67.Dd Quantum cryptography - 03.67.Hk Quantum communicationF.L. Yan: Present address: Department of Physics, Hebei Normal University, Shijiazhuang 050016, P.R. China  相似文献   

5.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks toauthenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.  相似文献   

6.
Quantum secure direct communication via partially entangled states   总被引:1,自引:0,他引:1       下载免费PDF全文
满忠晓  夏云杰 《中国物理》2007,16(5):1197-1200
We present in this paper a quantum secure direct communication (QSDC) protocol by using partially entangled states. In the scheme a third party (Trent) is introduced to authenticate the participants. After authentication, Alice can directly, deterministically and successfully send a secret message to Bob. The security of the scheme is also discussed and confirmed.  相似文献   

7.
A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large.  相似文献   

8.
We present a quantum secure direct communication (QSDC) scheme via Greenberger-Horne-Zeilinger state in driven cavity QED. The user can receive different secret messages, and the communication attendant Alice encodes the secret message directly onto a particle which then can be faithfully teleported to Bob using the shared Greenberger-Horne-Zeilinger states. Our scheme is insensitive to the cavity decay. The necessary time for the scheme is much shorter than the Rydberg-atom, therefore atom decays do not need to be considered. The protocol is simple and realizable with present technology. The security of the present scheme is also discussed,and the scheme is secure.  相似文献   

9.
We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired unitary operations in two degrees of freedom. In this protocol, a party can synchronously obtain the other two parties' messages. Compared with previous three-party QSDC protocols, our protocol has several advantages. First, the single photons in our protocol are only required to transmit for three times. This advantage makes this protocol simple and useful. Second, Alice and Bob can send different secret messages to Charlie, respectively. Finally, with hyperentanglement, this protocol has a higher information capacity than other protocols.  相似文献   

10.
An efficient high-capacity quantum secret sharing scheme is proposed following some ideas in quantum dense coding with two-photon entanglement. The message sender, Alice prepares and measures the two-photon entangled states, and the two agents, Bob and Charlie code their information on their photons with four local unitary operations, which makes this scheme more convenient for the agents than others. This scheme has a high intrinsic efficiency for qubits and a high capacity.  相似文献   

11.
This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits.Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication.The QSDC protocol has good applications in the future quantum communication because of all these features.  相似文献   

12.
This work proposes two fault tolerant quantum secure direct communication (QSDC) protocols which are robust against two kinds of collective noises: the collective-dephasing noises and the collective-rotation noises, respectively. The two QSDC protocols are constructed from four-qubit DF states which consist of two logical qubits. The receiver simply performs two Bell state measurements (rather than four-qubit joint measurements) to obtain the secret message. The protocols have qubit effciency twice that of ...  相似文献   

13.
Jia-Wei Ying 《中国物理 B》2022,31(12):120303-120303
The one-step quantum secure direct communication (QSDC) (Sci. Bull. 67, 367 (2022)) can effectively simplify QSDC's operation and reduce message loss. For enhancing its security under practical experimental condition, we propose two measurement-device-independent (MDI) one-step QSDC protocols, which can resist all possible attacks from imperfect measurement devices. In both protocols, the communication parties prepare identical polarization-spatial-mode two-photon hyperentangled states and construct the hyperentanglement channel by hyperentanglement swapping. The first MDI one-step QSDC protocol adopts the nonlinear-optical complete hyperentanglement Bell state measurement (HBSM) to construct the hyperentanglement channel, while the second protocol adopts the linear-optical partial HBSM. Then, the parties encode the photons in the polarization degree of freedom and send them to the third party for the hyperentanglement-assisted complete polarization Bell state measurement. Both protocols are unconditionally secure in theory. The simulation results show the MDI one-step QSDC protocol with complete HBSM attains the maximal communication distance of about 354 km. Our MDI one-step QSDC protocols may have potential applications in the future quantum secure communication field.  相似文献   

14.
A deterministic secure quantum communication against collective-dephasing noise is proposed. Alice constructs two sets of three-photon bases with EPR (Einstein-Podolsky-Rosen) pairs in the state |Ψ+〉 or |Ψ-〉 and auxiliary single photons in the state |H〉. And then she sends them to Bob. Bob can get the secret message by his single-photon measurement outcomes and two public message strings from Alice if the quantum channel is secure. The scheme does not need photon storing technique and only single-photon measurement is necessary.  相似文献   

15.
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73:042305, 2006] were recently proposed by Lee, Lim and Yang, based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states. However, Zhang et al. showed that in the two protocols the authenticator Trent can eavesdrop the secret message by subtle strategies [Phys. Rev. A 75:026301, 2007]. In this paper, we propose two authenticated quantum direct communication (AQDC) protocols using Bell states. Users can identify each other by checking the correlation of Bell states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining Bell states after authentication. The two proposed AQDC protocols are implemented under the condition that there is a quantum link between Alice and Bob and that there is no quantum link between Alice and Bob respectively, similar to the ones proposed by Lee, Lim and Yang [Phys. Rev. A 73:042305, 2006]. The proposed AQDC protocols not only fix the leaks in the AQDC protocols proposed by Lee, Lim and Yang, but also economize the quantum resource.  相似文献   

16.
In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.  相似文献   

17.
A novel scheme for realizing dense coding with χ-type entangled states in linear optical system is proposed. In this protocol, Alice encodes her classical information on photons by linear optical elements and sends these photons to Bob. Then Bob performs a sequent single-qubit measurement on all photons in the χ-type entangled state by employing linear optical elements. According to the outcomes of his measurement, Bob can determine what operation Alice performed. The scheme is based on linear optical elements, which is feasible with existing experimental technology.  相似文献   

18.
黄伟  温巧燕  贾恒越  秦素娟  高飞 《中国物理 B》2012,21(10):100308-100308
We present two novel quantum secure direct communication(QSDC) protocols over different collective-noise channels.Different from the previous QSDC schemes over collective-noise channels,which are all source-encrypting protocols,our two protocols are based on channel-encryption.In both schemes,two authorized users first share a sequence of EPR pairs as their reusable quantum key.Then they use their quantum key to encrypt and decrypt the secret message carried by the decoherence-free states over the collective-noise channel.In theory,the intrinsic efficiencies of both protocols are high since there is no need to consume any entangled states including both the quantum key and the information carriers except the ones used for eavesdropping checks.For checking eavesdropping,the two parties only need to perform two-particle measurements on the decoy states during each round.Finally,we make a security analysis of our two protocols and demonstrate that they are secure.  相似文献   

19.
Higher channel capacity and security are difficult to reach in a noisy channel. The loss of photons and the distortion of the qubit state are caused by noise. To solve these problems, in our study, a hyperentangled Bell state is used to design faithful deterministic secure quantum communication and authentication protocol over collective-rotation and collective-dephasing noisy channel, which doubles the channel capacity compared with using an ordinary Bell state as a carrier; a logical hyperentangled Bell state immune to collective-rotation and collective-dephasing noise is constructed. The secret message is divided into several parts to transmit, however the identity strings of Alice and Bob are reused. Unitary operations are not used.  相似文献   

20.
In this paper, a quantum authencryption protocol is proposed by using the two-photon entangled states as the quantum resource. Two communicants Alice and Bob share two private keys in advance, which determine the generation of two-photon entangled states. The sender Alice sends the two-photon entangled state sequence encoded with her classical bits to the receiver Bob in the manner of one-step quantum transmission. Upon receiving the encoded quantum state sequence, Bob decodes out Alice’s classical bits with the two-photon joint measurements and authenticates the integrity of Alice’s secret with the help of one-way hash function. The proposed protocol only uses the one-step quantum transmission and needs neither a public discussion nor a trusted third party. As a result, the proposed protocol can be adapted to the case where the receiver is off-line, such as the quantum E-mail systems. Moreover, the proposed protocol provides the message authentication to one bit level with the help of one-way hash function and has an information-theoretical efficiency equal to 100 %.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号