共查询到20条相似文献,搜索用时 46 毫秒
1.
提出一个受控的量子确定性安全通信方案,在通信过程中,纠缠GHZ态用作量子信道,秘密信息的编码和破解是通过受控的量子纠缠交换和局域酉变换实现的.此方案是安全的.关于此方案安全性的证明和两步方案[Phys.Rev.A 68 042317]的安全性是一样的.此方案也可以推广到有多方控制者参与的情形. 相似文献
2.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since these states are unchanged through the collective dephasing noisy channel, the effect of the channel noise can be perfectly overcome. Simultaneously, the security against some usual attacks can be ensured by utilizing the various checking procedures. Furthermore, these two schemes are feasible with present-day technique. 相似文献
3.
4.
We propose two schemes for quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) over collective dephasing noisy channel. In our schemes, four special two-qubit states are used as the quantum channel. Since
these states are unchanged through the collective dephasing noisy
channel, the effect of the channel noise can be perfectly overcome.
Simultaneously, the security against some usual attacks can be
ensured by utilizing the various checking procedures. Furthermore,
these two schemes are feasible with present-day technique. 相似文献
5.
By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the "two-step" transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. 相似文献
6.
By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the ``two-step" transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. 相似文献
7.
XIA Yan SONG Jie SONG He-Shan 《理论物理通讯》2008,49(4):919-924
We present a controlled secure quantum communication protocol using non-maximally (pure) entangled W states first, and then discuss the basic requirements for a real quantum communication. We show that the authorized two users can exchange their secret messages with the help of the controller after purifying the non-maximally entangled states quantum channel unconditionally securely and simultaneously. Our quantum communication protocol seems even more feasible within present technologies. 相似文献
8.
XIA Yan SONG Jie NIE Jing SONG He-Shan 《理论物理通讯》2007,48(5):841-846
We present a controlled secure quantum dialogue protocol using a non-maximally (pure) entangled Greenberger-Horne-Zeibinger (GHZ) states at first, and then discuss the requirements for a real quantum dialogue. We show that the authorized two users can exchange their secret messages after purifying the non-maximally entangled GHZ states quantum channel unconditionally securely and simultaneously under the control of a third party. 相似文献
9.
We propose a quantum secure communication protocol by using three-particle GHZ states. In this protocol, we utilize the ideas of the rearranging orders and the sequence transmission. The sender of messages, Alice, first disturbs the particle orders in an initial sequence, and then sends the sequence of the disturbed orders to the receiver of messages, Bob. Under Alice's introduction, Bob rearranges the sequence back to the initial sequence. By making a GHZ state measurement on each of the three particles in turn, Bob can attain Alice's secret messages. In addition, we still calculate the efficiency of our three-particle GHZ protocol and generalize it to the case using multi-particle GHZ state. 相似文献
10.
YUAN Hao LIU Yin-Min ZHANG Wen ZHANG Zhan-Jun 《理论物理通讯》2008,49(1):103-106
Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channel noise. The eavesdropping scheme is presented, which reveals that the C-S QSDC protocol is not secure if the quantum bit error rate (QBER) caused by quantum channel noise is higher than 4.17%. Our eavesdropping scheme induces about 4.17% QBER for those check qubits. However, such QBER can be hidden in the counterpart induced by the noisy quantum channel if the eavesdropper Eve replaces the original noisy channel by an ideal one. Furthermore, if the QBER induced by quantum channel noise is lower than 4.17%, then in the eavesdropping scheme Eve still can eavesdrop part of the secret messages by safely attacking a fraction of the transmitted qubits. Finally, an improvement on the C-S QSDC protocol is put forward. 相似文献
11.
We propose a quantum superdense coding secure communication scheme by using GHZ state. This scheme combines the ideas of quantum superdense coding and sequence transmission. Its distinct advantage is high source capacity. In addition, in checking eavesdropping, we need not to destroy quantum entanglement. 相似文献
12.
We propose a quantum superdense coding secure communication scheme
by using GHZ state. This scheme combines the ideas of quantum
superdense coding and sequence transmission. Its distinct
advantage is high source capacity. In addition, in checking eavesdropping, we
need not to destroy quantum entanglement. 相似文献
13.
Secure Communication Based on Quantum Key 总被引:1,自引:0,他引:1
SONG Jie XIA Yan SONG He-Shan 《理论物理通讯》2008,49(3):635-638
We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient. 相似文献
14.
LIU Yi-Min WANG Zhang-Yin LIU Jun ZHANG Zhan-Jun 《理论物理通讯》2008,49(2):359-364
We propose a remote state preparation (RSP) scheme of three-particle Greenberger Horne-Zeilinger (GHZ) class states, where quantum channels are composed of two maximally entangled states. With the aid of forward classical bits, the preparation of the original state can be successfully realized with the probability 1/2, the necessary classical communication cost is 0.5 bit on average. If the state to be prepared belongs to some special states, the success probability of preparation can achieve 1 after consuming one extra bit on average. We then generalize this scheme to the case that the quantum channels consist of two non-maximally entangled states. 相似文献
15.
LIU Jun LIU Yi-Min XIA Yan ZHANG Zhan-Jun 《理论物理通讯》2008,49(4):887-890
Recently Xia and Song [Phys. Lett. A 364 (2007) 117] have proposed a controlled quantum secure direct communication (CQSDC) protocol. They claimed that in their protocol only with the help of the controller Charlie, the receiver Alice can successfully extract the secret message from the sender Bob. In this letter, first we will show that within their protocol the controller Charlie's role could have been excluded if it were not for their unreasonable design. We then revise the Xia-Song CQSDC protocol such that its original advantages are reta/ned and the CQSDC can be really realized. 相似文献
16.
提出一个无信息泄露的受控双向量子安全直接通信协议.协议中合法通信双方Alice和Bob在控制者Charlie的控制下实现彼此秘密信息的安全交换,利用3个Bell态纠缠交换后的测量相关性来克服信息泄露问题.由于该协议仅利用Bell态作为量子资源,而且仅需要进行Bell测量,所以方便实现.安全性分析表明,该协议不仅能检测到外部窃听者的主动攻击,而且还能检测到控制者Charlie的不诚实行为,因此,具备良好的安全性. 相似文献
17.
DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《理论物理通讯》2008,50(8):359-362
A theoretical scheme of quantum secure communication using a class of three-particle W states is proposed. In the scheme, two communicators may communicate after they test the security of the quantum channel. The receiver can obtain the secret message determinately if the quantum channel is safe. The present scheme can be realized without using teleportation. 相似文献
18.
Youn-Chang Jeong Se-Wan Ji Changho Hong Hee Su Park Jingak Jang 《Entropy (Basel, Switzerland)》2020,22(11)
In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. By first performing quantum entity authentication, it was possible to prevent third-party intervention. We demonstrate the security of the proposed protocol against the intercept-and-re-send attack and the entanglement-and-measure attack. Implementation of this protocol was demonstrated for quantum channels of various lengths. Especially, we propose the use of the multiple generation and shuffling method to prevent a loss of message in the experiment. 相似文献
19.
20.
A two-step deterministic secure quantum communication (DSQC) scheme using blocks of three-qubit W state is proposed. In this scheme, the secret messages can be encoded by employing four two-particle unitary operations and directly decoded by utilizing the corresponding measurements in Bell basis or single-particle basis. Comparing with most previous DSQC protocols, the present scheme has a high total efficiency, which comes up to 50%. Apartfrom this, it has still the advantages of high capacity as each W state can carry two bits of secret information, and high intrinsic efficiency because almost all the instances are useful. Furthermore, the security of this communication can be ensured by the decoy particle checking technique and the two-step transmitting idea. 相似文献