Quantum secure dialogue based on single photons and controlled-not operations

被引:25
作者
Shi, Guo-Fang [1 ]
Tian, Xiu-Lao [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Sci, Xian 710061, Peoples R China
关键词
quantum dialogue; single photons; controlled-not operations; KEY DISTRIBUTION; BELL THEOREM; COMMUNICATION; CRYPTOGRAPHY;
D O I
10.1080/09500340.2010.514072
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A quantum dialogue protocol is proposed and proved to be secure. In our scheme, single photons are used as a quantum channel, the security of our scheme is guaranteed by BB84 QKD and the fact that controlled-not operation ensures the control qubit is unchanged and the target qubit flips only if the control qubit is [image omitted]. By using controlled-not operations, two legitimate communicators can share a private initial state and realize quantum dialogue securely. Compared with previous quantum dialogue protocols, the good merit of this work is that the insecurity, i.e. 'information leakage' is eliminated. Comparing this dialogue protocol with the recent work in another paper [Shi, G.F.; Xi, X.Q.; Hu, M.L.; Yue, R.H. Opt. Commun. 2010, 283, 1984] where two adjacent single photons must be of the same quantum state, this scheme is experimentally simple.
引用
收藏
页码:2027 / 2030
页数:4
相关论文
共 26 条
  • [1] Secure communication with a publicly known key
    Beige, A
    Englert, BG
    Kurtsiefer, C
    Weinfurter, H
    [J]. ACTA PHYSICA POLONICA A, 2002, 101 (03) : 357 - 368
  • [2] Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
  • [3] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [4] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM
    BENNETT, CH
    BRASSARD, G
    MERMIN, ND
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
  • [5] Deterministic secure direct communication using entanglement -: art. no. 187902
    Boström, K
    Felbinger, T
    [J]. PHYSICAL REVIEW LETTERS, 2002, 89 (18) : 187902/1 - 187902/4
  • [6] Quantum key distribution in the Holevo limit
    Cabello, A
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (26) : 5635 - 5638
  • [7] Eavesdropping on the two-way quantum communication protocols with invisible photons
    Cai, QY
    [J]. PHYSICS LETTERS A, 2006, 351 (1-2) : 23 - 25
  • [8] Improving the capacity of the Bostrom-Felbinger protocol
    Cai, QY
    Li, BW
    [J]. PHYSICAL REVIEW A, 2004, 69 (05): : 054301 - 1
  • [9] Cai QY, 2004, CHINESE PHYS LETT, V21, P601, DOI 10.1088/0256-307X/21/4/003
  • [10] Deng F.-G., 2005, ROBUSTNESS 2 WAY QUA