Semi-quantum dialogue scheme based on hyperentangled Bell states

被引:10
作者
Shi, Guo-Fang [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Sci, Xian 710061, Peoples R China
关键词
semi-quantum dialogue; hyperentanglement; Bell state; SECURE DIRECT COMMUNICATION; CRYPTOGRAPHY; PROTOCOLS;
D O I
10.1088/1402-4896/ad007f
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum dialogue enables two communicators to send their own secret information to each other, but most of the current quantum dialogue protocols have high requirements for the hardware equipment and capabilities of the communicators. In order to reduce the cost of participant, a semi-quantum dialogue scheme based on hyperentangled Bell states is studied in this paper. In our protocol, we combines the idea of semi-quantum key distribution and semi-quantum secure direct communication to realize the exchange of secret information between Alice and Bob, Alice's information is transmitted to Bob through semi-quantum secure direct communication, while Bob's message is extracted by Alice through semi-quantum key distribution and one-time pad encryption. This is different from the previous semi-quantum dialogue protocols, and is a new way of thinking. The security analysis shows that our protocol can not only resist the conventional attack strategies, but also has not the drawback of 'information leakage' problem. Compared with the existing semi-quantum dialogue protocols, it has some advantages, such as high communication efficiency, saving classical participant's consumption and security. Although this protocol requires the preparation and analysis of hyperentangled Bell state, which are slightly more complex, it will be shown that all these are achievable by current technology. Our protocol is fully implementable, so it has good application prospects.
引用
收藏
页数:9
相关论文
共 48 条
[1]  
Bennett C H., 1984, Theor. Comput. Sci, V560, P175, DOI [10.1016/j.tcs.2014.05.025, DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2011.08.039, DOI 10.1016/J.TCS.2011.08.039]
[2]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[3]   Semiquantum key distribution [J].
Boyer, Michel ;
Gelles, Ran ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW A, 2009, 79 (03)
[4]   Quantum key distribution with classical Bob [J].
Boyer, Michel ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW LETTERS, 2007, 99 (14)
[5]   Quantum key distribution in the Holevo limit [J].
Cabello, A .
PHYSICAL REVIEW LETTERS, 2000, 85 (26) :5635-5638
[6]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[7]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)
[8]   Secure direct communication with a quantum one-time pad [J].
Deng, FG ;
Long, GL .
PHYSICAL REVIEW A, 2004, 69 (05) :052319-1
[9]   Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block [J].
Deng, FG ;
Long, GL ;
Liu, XS .
PHYSICAL REVIEW A, 2003, 68 (04) :6
[10]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663