Secure deterministic communication scheme based on quantum remote state preparation

被引:6
作者
Ying, Guo [1 ]
Zhi-Gang, Chen
Gui-Hua, Zeng
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
来源
CHINESE PHYSICS | 2007年 / 16卷 / 09期
关键词
quantum deterministic communication; quantum error-correction code; quantum cryptography; quantum computing;
D O I
10.1088/1009-1963/16/9/009
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Based on the techniques of the quantum remote state preparation via a deterministic way, this paper proposes a quantum communication scheme to distribute the secret messages in two phases, i.e., the carrier state checking phase and the message state transmitting phase. In the first phase, the secret messages are encoded by the sender using a stabilizer quantum code and then transmitted to the receiver by implementing three CNOT gates. In the second phase, the communicators check the perfectness of the entanglement of the transmitted states. The messages can be distributed to the receiver even if some of the transmitted qubits are destroyed.
引用
收藏
页码:2549 / 2556
页数:8
相关论文
共 31 条
[1]   Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers [J].
Bagherinezhad, S ;
Karimipour, V .
PHYSICAL REVIEW A, 2003, 67 (04) :4
[2]   Secure communication with a publicly known key [J].
Beige, A ;
Englert, BG ;
Kurtsiefer, C ;
Weinfurter, H .
ACTA PHYSICA POLONICA A, 2002, 101 (03) :357-368
[3]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[4]  
BENNETT CH, 1984, ADV CRYPTOLOGY
[5]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[6]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[7]   Improving the capacity of the Bostrom-Felbinger protocol [J].
Cai, QY ;
Li, BW .
PHYSICAL REVIEW A, 2004, 69 (05) :054301-1
[8]   The "ping-pong" protocol can be attacked without eavesdropping [J].
Cai, QY .
PHYSICAL REVIEW LETTERS, 2003, 91 (10)
[9]   Quantum error correction via codes over GF (4) [J].
Calderbank, AR ;
Rains, EM ;
Shor, PW ;
Sloane, NJA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (04) :1369-1387
[10]   Experimental quantum communication without a shared reference frame [J].
Chen, TY ;
Zhang, J ;
Boileau, JC ;
Jin, XM ;
Yang, B ;
Zhang, Q ;
Yang, T ;
Laflamme, R ;
Pan, JW .
PHYSICAL REVIEW LETTERS, 2006, 96 (15)