Improved Security Detection Strategy in Quantum Secure Direct Communication Protocol Based on Four-Particle Green-Horne-Zeilinger State

被引:2
作者
Li, Jian [1 ]
Nie, Jin-Rui [1 ]
Li, Rui-Fan [1 ]
Jing, Bo [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp, Beijing 100876, Peoples R China
[2] Beijing Inst Appl Meteorol, Dept Comp Sci, Beijing 100029, Peoples R China
来源
ZEITSCHRIFT FUR NATURFORSCHUNG SECTION A-A JOURNAL OF PHYSICAL SCIENCES | 2012年 / 67卷 / 6-7期
基金
中国国家自然科学基金;
关键词
Quantum Secure Direct Communication Protocol; Dense Coding; Four-Particle GHZ State; Eavesdropping Detection; GHZ STATES; KEY DISTRIBUTION; BELL THEOREM; CRYPTOGRAPHY; ENTANGLEMENT; DIALOGUE; NETWORK; SECRET;
D O I
10.5560/ZNA.2012-0029
中图分类号
O64 [物理化学(理论化学)、化学物理学];
学科分类号
070304 ; 081704 ;
摘要
To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others.
引用
收藏
页码:369 / 376
页数:8
相关论文
共 43 条
[1]  
[Anonymous], J AM I ELEC ENG
[2]   Secure communication with a publicly known key [J].
Beige, A ;
Englert, BG ;
Kurtsiefer, C ;
Weinfurter, H .
ACTA PHYSICA POLONICA A, 2002, 101 (03) :357-368
[3]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]   COMMUNICATION VIA ONE-PARTICLE AND 2-PARTICLE OPERATORS ON EINSTEIN-PODOLSKY-ROSEN STATES [J].
BENNETT, CH ;
WIESNER, SJ .
PHYSICAL REVIEW LETTERS, 1992, 69 (20) :2881-2884
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[7]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[8]   Improving the capacity of the Bostrom-Felbinger protocol [J].
Cai, QY ;
Li, BW .
PHYSICAL REVIEW A, 2004, 69 (05) :054301-1
[9]   The "ping-pong" protocol can be attacked without eavesdropping [J].
Cai, QY .
PHYSICAL REVIEW LETTERS, 2003, 91 (10)
[10]  
Cai QY, 2004, CHINESE PHYS LETT, V21, P601, DOI 10.1088/0256-307X/21/4/003