Improving the capacity of the Bostrom-Felbinger protocol

被引:249
作者
Cai, QY [1 ]
Li, BW [1 ]
机构
[1] Chinese Acad Sci, Wuhan Inst Phys & Math, Wuhan 430071, Peoples R China
来源
PHYSICAL REVIEW A | 2004年 / 69卷 / 05期
关键词
D O I
10.1103/PhysRevA.69.054301
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We show that the capacity of the Bostrom-Felbinger (ping-pong) protocol [Phys. Rev. Lett. 89, 187902 (2002)] can be doubled by introducing two additional unitary operations. In message mode, Alice can use one of the four unitary operations to encode two classical bits of information. Bob can decode Alice's information by using a Bell-basis measurement. Security against eavesdropping attack can be ensured by using two conjugate measurement bases in control mode. A message authentification method can protect this communication against a man-in-the-middle attack without eavesdropping.
引用
收藏
页码:054301 / 1
页数:3
相关论文
共 20 条
[1]   Noncommuting mixed states cannot be broadcast [J].
Barnum, H ;
Caves, CM ;
Fuchs, CA ;
Jozsa, R ;
Schumacher, B .
PHYSICAL REVIEW LETTERS, 1996, 76 (15) :2818-2821
[2]   Secure communication with a publicly known key [J].
Beige, A ;
Englert, BG ;
Kurtsiefer, C ;
Weinfurter, H .
ACTA PHYSICA POLONICA A, 2002, 101 (03) :357-368
[3]  
Bennett C.H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[4]   COMMUNICATION VIA ONE-PARTICLE AND 2-PARTICLE OPERATORS ON EINSTEIN-PODOLSKY-ROSEN STATES [J].
BENNETT, CH ;
WIESNER, SJ .
PHYSICAL REVIEW LETTERS, 1992, 69 (20) :2881-2884
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[7]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[8]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[9]   Quantum key distribution in the Holevo limit [J].
Cabello, A .
PHYSICAL REVIEW LETTERS, 2000, 85 (26) :5635-5638
[10]   The "ping-pong" protocol can be attacked without eavesdropping [J].
Cai, QY .
PHYSICAL REVIEW LETTERS, 2003, 91 (10)