共查询到18条相似文献,搜索用时 125 毫秒
1.
Two simple quantum broadcast communication schemes are proposed.A central party can broadcast his secret message to all the legitimate receivers simultaneously.Compared with the three schemes proposed recently (Wang et al.2007 Chin.Phys.16 1868),the proposed schemes have the advantages of consuming fewer quantum and classical resources,lessening the difficulty and intensity of necessary operations,and having higher efficiency. 相似文献
2.
A Simultaneous Quantum Secure Direct Communication Scheme between the Central Party and Other M Parties 总被引:7,自引:0,他引:7 下载免费PDF全文
We propose a simultaneous quantum secure direct communication scheme between one party and other three parties via four-particle GHZ states and swapping quantum entanglement. In the scheme, three spatially separated senders, Alice, Bob and Charlie, transmit their secret messages to a remote receiver Diana by performing a series of local operations on their respective particles according to the quadripartite stipulation. From Alice, Bob, Charlie and Diana's Bell measurement results, Diana can infer the secret messages. Ira perfect quantum channel is used, the secret messages are faithfully transmitted from Alice, Bob and Charlie to Diana via initially shared pairs of four-particle GHZ states without revealing any information to a potential eavesdropper. As there is no transmission of the qubits carrying the secret message in the public channel, it is completely secure for the direct secret communication. This scheme can be considered as a network of communication parties where each party wants to communicate secretly with a central party or server. 相似文献
3.
Quantum secure direct communication with Greenberger-Horne-Zeilinger-type state (GHZ state) over noisy channels 下载免费PDF全文
We propose a quantum error-rejection scheme for direct communication
with three-qubit quantum codes based on the direct communication of
secret messages without any secret key shared in advance. Given the
symmetric and independent errors of the transmitted qubits, our
scheme can tolerate a bit of error rate up to 33.1%, thus the
protocol is deterministically secure against any eavesdropping
attack even in a noisy channel. 相似文献
4.
As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. 相似文献
5.
GUO Ying CHEN Zhi-Gang HUANG Da-Zu ZENG Gui-Hua 《理论物理通讯》2008,49(1):93-99
Exploiting the encoding process of the stabilizer quantum code [[n, k, d]], a deterministic quantum communication scheme, in which n - 1 photons are distributed forward and backward in two-way channel, is proposed to transmit the secret messages with unconditional security. The present scheme can be implemented to distribute the secret quantum (or classical) messages with great capacity in imperfect quantum channel since the utilized code encodes k-qubit messages for each scheme run. 相似文献
6.
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each receiver keeps a share secretly. If the sender wants to send a secret message M to the receivers, he en-codes the information of K and M on a single photon sequence and sends it to one of the receivers. According to the secret shares, the t receivers sequentially per-form the corresponding unitary operations on the single photon sequence and ob-tain the secret message M. The shared shares may be reusable if it can be judged that there is no eavesdropper in line. We discuss that our protocol is feasible with current technology. 相似文献
7.
In this paper, we present a two-way quantum dense key distribution protocol.
With double check modes, our scheme is secure regardless of the
presence of noises. And with a quantum teleportation process, secret
message can be encoded deterministically even if the quantum channel is highly
lossy. Therefore, our scheme can be used in a realistic quantum channel
regardless of the presence of noises and channel losses. 相似文献
8.
Capacity of a Simultaneous Quantum Secure Direct Communication Scheme between the Central Party and Other M Parties 下载免费PDF全文
We analyse the capacity of a simultaneous quantum secure direct communication scheme between the central party and other M parties via M+1-particle GHZ states and swapping quantum entanglement. It is shown that the encoding scheme should be secret if other M parties wants to transmit M + 1 bit classical messages to the centre party secretly. However, when the encoding scheme is announced publicly, we prove that the capacity of the scheme in transmitting the secret messages is 2 bits, no matter how large M is. 相似文献
9.
Controlled Bidirectional Quantum Direct Communication by Using a GHZ State 总被引:5,自引:0,他引:5 下载免费PDF全文
A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed. 相似文献
10.
The security of the quantum secret key plays a critical role in quantum communications.Thus far,one problem that still exists in existing protocols is the leakage of the length of the secret key.In this letter,based on variable quantum encoding algorithms,we propose a secure quantum key distribution scheme,which can overcome the security problem involving the leakage of the secret key.Security analysis shows that the proposed scheme is both secure and effective. 相似文献
11.
12.
We present an (n,n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation.After ensuring the security of the quantum channel,the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation.The receivers can recover the secret message by combining their measurement results with the sender's result.If a perfect quantum channel is used,our scheme is completely secure because the transmitting particle sequence does not carry the secret message.We also show our scheme is secure for noise quantum channel. 相似文献
13.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitarytransformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication. 相似文献
14.
Quantum secure direct communication with quantum encryption based on pure entangled states 总被引:3,自引:0,他引:3 下载免费PDF全文
This paper presents a scheme for quantum secure direct communication
with quantum encryption. The two authorized users use repeatedly a
sequence of the pure entangled pairs (quantum key) shared for
encrypting and decrypting the secret message carried by the
travelling photons directly. For checking eavesdropping, the two
parties perform the single-photon measurements on some decoy
particles before each round. This scheme has the advantage that the
pure entangled quantum signal source is feasible at present and any
eavesdropper cannot steal the message. 相似文献
15.
Quantum secure direct communication(QSDC) is an important branch of quantum cryptography. It can transmit secret information directly without establishing a key first, unlike quantum key distribution which requires this precursory event. Here we propose a QSDC scheme by applying the frequency coding technique to the two-step QSDC protocol, which enables the two-step QSDC protocol to work in a noisy environment. We have numerically simulated the performance of the protocol in a noisy channel, and the results show that the scheme is indeed robust against channel noise and loss. We also give an estimate of the channel noise upper bound. 相似文献
16.
提出基于三粒子GHZ态的双向量子可控隐形传态方案.方案中,使用两个三粒子GHZ态作为量子通道.而根据在量子通道中发送者,接收者和控制者所拥有的粒子的不同以及所采用的测量基的不同,设计出了三方参与的双向可控量子隐形传态方案和四方参与的双向可控量子隐形传态方案.在方案中,Alice和Bob对所拥有的粒子做合适的投影测量,并将其测量结果通知对方和控制者.若控制者同意此次传态,则会对自己所拥有的粒子做投影测量,并将结果告知接收者.接收者根据发送者和控制者的测量信息,做出相对应的幺正操作来重建发送者的量子态.同时三方参与和四方参与的量子可控隐形传态方案提高了通信的安全性. 相似文献
17.
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。 相似文献
18.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks toauthenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed. 相似文献