共查询到20条相似文献,搜索用时 31 毫秒
1.
Based on entanglement swapping, a quantum key distribution (QKD) scheme is proposed. In this scheme, the secret keys are formed by comparing initial Bell states and outcomes of entanglement swapping. Moreover, all initial Bell states prepared by Alice and Bob are completely arbitrary. As the classical information exchanged between two parties is very little, this QKD scheme has a high efficiency. In addition, in order to prevent eavesdropping, decoy particles are used. 相似文献
2.
A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations(corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed.An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. 相似文献
3.
Xiao-Ming Xiu Hai-Kuan Dong Li Dong Ya-Jun Gao Feng Chi 《Optics Communications》2009,282(12):2457-2459
A deterministic secure quantum communication scheme using entanglement swapping is proposed. The sender prepares four-particle genuine entangled states and sends two particles in each state to the receiver and remains the rest particles. If the quantum channel is secure, they begin to communicate. After their four-particle projective measurements, the receiver can obtain the secret information according to his measurement outcomes and classical information from the sender. Using entanglement swapping, there are no particles carrying secret information to be transmitted. 相似文献
4.
A quantum secure direct intercommunication scheme is
proposed to exchange directly the communicators' secret messages by
making use of swapping entanglement of Bell states. It has great
capacity to distribute the secret messages since these messages have
been imposed on high-dimensional Bell states via the local unitary
operations with superdense coding. The security is ensured by the
secure transmission of the travel sequences and the application of
entanglement swapping. 相似文献
5.
Based on entanglement swapping, a scheme for the secret sharing of an arbitrary
two-particle entangled state is proposed. If the controllers do not co-operate
with the eavesdropper, the eavesdropper's successful probability decreases with the
number of the controllers increasing.
In addition,
only the Bell-state measurements are
required to realize the secret sharing scheme. 相似文献
6.
《理论物理通讯》2017,(1)
By using GHZ-like states and entanglement swapping, Kang et al. [Chin. Phys. B 24(2015) 090306]proposed a controlled mutual quantum entity authentication protocol. We find that the proposed protocol is not secure,that is, the center, Charlie can eavesdrop the secret keys shared between Alice and Bob without being detected. 相似文献
7.
Quantum steganography with a large payload based on dense coding and entanglement swapping of Greenberger-Horne-Zeilinger states
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable. 相似文献
8.
Ling-Ling Zhang You-Bang Zhan Qun-Yong Zhang 《International Journal of Theoretical Physics》2009,48(10):2971-2976
We present a controlled quantum secure direct communication protocol by using cluster states via swapping quantum entanglement
and local unitary operation. In the present scheme, the sender transmit the secret message to the receiver directly and the
secret message can only be recovered by the receiver under the permission of the controller. 相似文献
9.
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
《中国物理 B》2015,(5)
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication(QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 相似文献
10.
In this paper, a new controlled secure direct communication protocol based on a maximally seven-qubit entangled state is proposed. the outcomes of measurement is performed by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability.In this scheme,by using entanglement swapping, no qubits carrying secret messages are transmitted.Therefore, the protocol is completely secure. 相似文献
11.
利用两粒子纠缠态作为经典信息的载体,结合Hash函数和量子本地操作提出了一种可以实现双向认证功能的量子秘密共享方案,并且分析了它的安全性. 这种方案的安全性基于秘密共享双方的认证密钥和传输过程中粒子排列次序的保密. 若不考虑认证和窃听检测所消耗的粒子,平均1个Bell态共享2 bit经典信息.
关键词:
量子秘密共享
认证密钥
量子双向认证
两粒子量子纠缠 相似文献
12.
Multiparty Quantum Secret Sharing of Classical Message using Cavity Quantum Electrodynamic System
下载免费PDF全文
![点击此处可从《中国物理快报》网站下载免费的PDF全文](/ch/ext_images/free.gif)
An experimental feasible scheme of multiparty secret sharing of classical messages is proposed, based on a cavity quantum electrodynamic system. The secret messages are imposed on atomic Bell states initially in the sender's possession by local unitary operations. By swapping quantum entanglement of atomic Bell states, the secret messages are split into several parts and each part is distributed to a separate party. In this case, any subset of the entire party group can not read out the secret message but the entirety via mutual cooperations. In this scheme, to discriminate atomic Bell states, additional classical fields are employed besides the same highlydetuned single-mode cavities used to prepare atomic Bell states. This scheme is insensitive to the cavity decay and the thermal field, and usual joint Bell-state measurements are unnecessary. 相似文献
13.
A quantum dialogue scheme based on entanglement swapping and Hadamard operation via cavity QED is proposed, which effectively uses the evolution law of atom in cavity QED. The proposed scheme uses Bell states and GHZ states as quantum resource and only needs single-atom measurements. The proposed scheme is secure against active attacks from an eavesdropper and can transmit 4 secret bits per round communication.
相似文献14.
Broadcast encryption allows the sender to securely distribute his/her
secret to a dynamically changing group of users over a broadcast
channel. In this paper, we just take account of a simple broadcast
communication task in quantum scenario, in which the central party
broadcasts his secret to multi-receiver via quantum channel. We
present three quantum broadcast communication schemes. The first
scheme utilizes entanglement swapping and
Greenberger--Horne--Zeilinger state to fulfil a task that the central
party broadcasts the secret to a group of receivers who share a group
key with him. In the second scheme, based on dense coding, the
central party broadcasts the secret to multi-receiver, each of which
shares an authentication key with him. The third scheme is a quantum
broadcast communication scheme with quantum encryption, in which the
central party can broadcast the secret to any subset of the legal
receivers. 相似文献
15.
We investigate schemes for quantum secret sharing and quantum dense
coding via tripartite entangled states. We present a scheme for
sharing classical information via entanglement swapping using two
tripartite entangled GHZ states. In order to throw light upon the
security affairs of the quantum dense coding protocol, we also
suggest a secure quantum dense coding scheme via W state by
analogy with the theory of sharing information among involved users. 相似文献
16.
F. Z. Guo S. J. Qin F. Gao S. Lin Q. Y. Wen F. C. Zhu 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2010,56(3):445-448
A kind of multiparty quantum secret sharing (MQSS)
schemes based on entanglement swapping is analyzed and an
effective attack is proposed. Some unauthorized agent groups can
recover the secret from the dealer with the help of this special
attack. It is shown that entanglement swapping not only makes the
MQSS protocols feasible but also brings a fatal drawback to them.
Furthermore, a possible improvement on such protocols is proposed,
which makes them secure against the proposed attack. 相似文献
17.
A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence coding, local collective unitary operations, and entanglement swapping. In this protocol, during the process of trans- mission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using symmetric two-dimensional states. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping. 相似文献
18.
A protocol for quantum secure direct communication by using entangled qutrits and swapping quantum entanglement is proposed. In this protocol, a set of ordered two-qutrit entangled states is used as quantum information channels for sending secret messages directly. During the process of transmission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using usual two-dimensional Bell-basis states as quantum channel. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping. 相似文献
19.
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. 相似文献
20.
Xin-Wen Wang Deng-Yu Zhang Shi-Qing Tang Li-Jun Xie 《International Journal of Theoretical Physics》2012,51(6):1978-1988
Entanglement swapping for four-qubit cluster-class states is studied. It is shown that a four-qubit cluster state (maximally
entangled) can be obtained with a certain probability from two four-qubit cluster-class states by entanglement swapping. The
probability is related to the smallest superposition coefficient of the cluster-class states (when all the moduli of amplitudes
are equivalent, they are the usual cluster states and the probability hits to one). Two examples for the applications of the
entanglement swapping are also presented. One is quantum teleportation of an arbitrary two-qubit state via a quantum repeater,
in which the success probability can be improved by the entanglement swapping when the quantum channels are general cluster-class states (partially entangled). The other is quantum key distribution, in which a secret random sequence of bits
(a “key”) can be efficiently established between two distant parties by the entanglement swapping of two groups of cluster
states. 相似文献