首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
葛华  刘文予 《中国物理快报》2007,24(10):2727-2729
A new quantum secure direct communication (QSDC) protocol is proposed by using decoherence free subspace (DFS) to avoid insecurity of the present QSDC protocols in a quantum noise channel. This protocol makes it easily for Bob and Alice to find eavesdropping in channel because the collective dephasing noise disappears in DFS. The probability of successful attack by Eve in this protocol is smaller than in BB84 protocol. Thus this protocol realizes secure QSDC and is feasible with present-day technology.  相似文献   

3.
Noise is currently unavoidable in quantum communication environments. Eavesdroppers can exploit this issue by disguising themselves as channel noise to avoid detection during eavesdropping checks performed by legitimate communicants. This paper first proposes a new coding function comprising eight unitary operations for two orthogonal bases for six-qubit decoherence-free states. Subsequently, based on the coding function, the first deterministic secure quantum communication (DSQC) scheme for quantum channels with collective noise is developed. The developed DSQC is robust against both collective-dephasing noise and collective-rotation noise Senders can choose one of six-qubit decoherence-free states to encode their two-bit message, and receivers simply conduct Bell measurement to obtain the message. Analyses conducted verify that the proposed scheme is both secure and robust.  相似文献   

4.
我们利用Greenberger-Horne-Zeilinger(GHZ)态,提出了一个控制量子安全直接通讯方案.在方案中,我们不仅分析了这个方案的安全性,而且指出了这个方案可以有效地抵御截取再发送袭击和干扰袭击.  相似文献   

5.
A novel quantum secure direct communication scheme based on four-qubit cluster states is proposed. In this scheme, the quantum channel between the sender Alice and the receiver Bob consists of an ordered sequence of cluster states which are prepared by Alice. After ensuring the security of quantum channel, Alice prepares the encoded Bell-state sequence, and performs Bell-basis measurements on the qubits at hand. Then Alice tells the measured results to Bob, and Bob also performs Bell-basis measurements on his own qubits. Finally Bob can get the secret information through the analysis of their measured results. In our scheme, the qubits carrying the secret message do not need to be transmitted in public channel. We show this scheme is determinate and secure.  相似文献   

6.
In this Letter, we propose a quantum secure direct communication protocol based on single photons without quantum memories. In the proposed protocol, quantum states are transmitted in a stream but not in a quantum data block, hence, quantum memories are unnecessary. Compare with other protocols the advantages of our protocol are smaller quantum space usage, lower cost and more easily being implemented experimentally.  相似文献   

7.
Quantum Secure Direct Communication Network with Two-Step Protocol   总被引:9,自引:0,他引:9       下载免费PDF全文
An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.  相似文献   

8.
In order to improve the efficiency of quantum secure direct communication, a controlled quantum secure direct communication protocol based on Huffman compression coding is proposed in this paper. The protocol combines classical Huffman coding with quantum communication, Alice performs Huffman compression code and unitary operation on the secret messages and sends them to Bob, and then Bob obtains the corresponding secret messages through decoding operation. In this protocol, communication efficiency can be effectively improved by using Huffman compression coding and sequence generator. As a result, the longer the secret messages, the higher the communication efficiency.  相似文献   

9.
International Journal of Theoretical Physics - The proposed quantum secret sharing protocol in this article conveys n bit secret messages from the sender to the n receivers making use of a secure...  相似文献   

10.
11.
We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques.  相似文献   

12.
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail.  相似文献   

13.
In a quantum secure direct communication protocol, two remote parties can transmit the secret message directly without first generating a key to encrypt them. A quantum secure direct communication protocol using two-photon four-qubit cluster states is presented. The presented scheme can achieve a higher efficiency in transmission and source capacity compared with the proposed quantum secure direct communication protocols with cluster states, and the security of the protocol is also discussed.  相似文献   

14.
We revisited the quantum secure direct communication (QSDC) by using a notation (Li et al. in Phys. Lett. A 297:121, 2002; Li et al. in Int. J. Theor. Phys. 46(7):1815, 2007) and generalized QSDC to arbitrary finite dimensions, we also figured out the decoding formula for QSDC of arbitrary finite dimensions. In order to overcome the channel noisy, we present a scheme through introduce n auxilians by using quantum swapping.  相似文献   

15.
提出了一种基于诱骗态的广域量子安全直接通信网络方案.在每一个局域网中设置一个服务器负责量子态的产生和测量,从而提高了通信距离;将诱骗态的思想引入量子安全直接通信,采用不同的强度发送光脉冲,能够克服光子数目分割攻击,从而提高通信的安全性;根据信道参量估计了不同通信距离的通过率,为信道编码提供了依据.对所提方案进行了安全性分析,结果表明此方案能够实现远距离量子安全直接通信.  相似文献   

16.
A novel multiparty controlled bidirectional quantum secure direct communication protocol combining continuous-variable states with qubit block transmission is proposed. Two legitimate communication parties encode their own secret information into entangled optical modes with translation operations, and the secret information of each counterpart can only be recovered under the permission of all controllers. Due to continuous-variable states and block transmission strategy, the proposed protocol is easy to realize with perfect qubit efficiency. Security analyses show that the proposed protocol is free from common attacks, including the man-in-the-middle attack.  相似文献   

17.
王敏杰  潘炜 《中国物理快报》2008,25(11):3860-3863
We propose two schemes of quantum secure direct communication (QADC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken.  相似文献   

18.
从信息论的角度分析了一个典型的两步量子直接通信方案的安全性,计算了该量子直接通信过程中攻击者Eve所能获得的信息量及在Eve进行攻击后合法通信者所能接收的信息量,为合法者对量子直接通信的安全性判定和对敌手的检测提供了一定的依据和标准.  相似文献   

19.
A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are required,which makes the scheme more convenient than others in practical applications.By distributing a random key between both sides of the communication and performing classical XOR operation,we realize a one-time-pad scheme,therefore our protocol achieves unconditional secure.Because only user with legitimate identity string can decrypt the secret,our protocol can resist man-in-the middle attack.The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping.The detection rate reaches 75% per qubit.  相似文献   

20.
By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the ``two-step" transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号