Quantum secure direct communication scheme with identity authentication br

被引:2
|
作者
Zhou, Xian-Tao [1 ]
Jiang, Ying-Hua [1 ]
机构
[1] Xizang Minzu Univ, Sch Informat Engn, Xianyang 712000, Peoples R China
关键词
quantum secure direct communication; GHZ state; identity authentication; transmission efficiency;
D O I
10.7498/aps.72.20221684
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Aiming at the problem that traditional quantum secure direct communication schemes need to assume thelegitimacy of both parties in advance, a GHZ state (a quantum state involving at least three subsystems orparticles entanglement) based quantum secure direct communication scheme with identity authentication isproposed. The scheme first encodes GHZ state particles into eight types, divides the particles into three parts,and sends them three times. Each time, eavesdropping is added to detect whether the particle detection channelis secure, and identity authentication is added when sending particles for the second time to verify the identityof the receiver. Specifically, according to the value of the ID key IDA, the specified particles (such as particles or particles) are found in the two particles. Then their positions are marked as L and they traversedown until all the identity keys are traversed, obtaining a position sequence L. After sending the two particlesto Bob for eavesdropping detection, Bob measures the L position of the two particles on the corresponding basisaccording to the value of the identity key, the measurement results are coded, and compared with the identitykey IDA to complete the identity authentication. After sending the particles for the third time. the receiverextracts all the detected particles, and then the GHZ state particles are jointly measured, and the originalinformation is recovered through the previously given coding rules, so as to realize quantum safe directcommunication. The design of this scheme is simple and efficient, and the communication can be realizedwithout complex unitary transformation. The correctness analysis proves that the scheme is correct in theory.The security analyses of interception/measurement retransmission attack, Trojan horse attack, denial of serviceattack, auxiliary particle attack, identity impersonation attack, and other attacks prove that the scheme canresist common internal attacks and external attacks, and solve the problem of information leakage. Thetransmission efficiency of the scheme is 1, the quantum bit utilization is 1, and the coding capacity is aquantum state carrying 3 bits of information. Compared with some previous schemes, this scheme has obviousadvantages in these three aspects. The biggest advantage is that the sender does not need to assume thelegitimacy of the receiver when sending information, so it has high practical application value
引用
收藏
页数:9
相关论文
共 29 条
  • [1] Almut B, 2002, J AGR FOOD CHEM, VA3546
  • [2] Bennett C. H., 1984, P INT C COMP SYST SI, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [3] Deterministic secure direct communication using entanglement -: art. no. 187902
    Boström, K
    Felbinger, T
    [J]. PHYSICAL REVIEW LETTERS, 2002, 89 (18) : 187902/1 - 187902/4
  • [4] Quantum secure direct communication protocol based on the mixture of Bell state particles and single photons
    Cao Zheng-Wen
    Zhao Guang
    Zhang Shuang-Hao
    Feng Xiao-Yi
    Peng Jin-Ye
    [J]. ACTA PHYSICA SINICA, 2016, 65 (23)
  • [5] Secure direct communication with a quantum one-time pad
    Deng, FG
    Long, GL
    [J]. PHYSICAL REVIEW A, 2004, 69 (05): : 052319 - 1
  • [6] Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block
    Deng, FG
    Long, GL
    Liu, XS
    [J]. PHYSICAL REVIEW A, 2003, 68 (04):
  • [7] Dong L, 2009, COMMUN THEOR PHYS, V51, P08
  • [8] Dong L, 2008, COMMUN THEOR PHYS, V49, P1495, DOI 10.1088/0253-6102/49/6/32
  • [9] Gao T, 2005, CHINESE PHYS, V14, P893, DOI 10.1088/1009-1963/14/5/006
  • [10] Bi-directional semi-quantum secure direct communication protocol based on high-dimensional single-particle states
    Gong Li-Hua
    Chen Zhen-Yong
    Xu Liang-Chao
    Zhou Nan-Run
    [J]. ACTA PHYSICA SINICA, 2022, 71 (13)