Improving the capacity of the Bostrom-Felbinger protocol

被引:249
作者
Cai, QY [1 ]
Li, BW [1 ]
机构
[1] Chinese Acad Sci, Wuhan Inst Phys & Math, Wuhan 430071, Peoples R China
来源
PHYSICAL REVIEW A | 2004年 / 69卷 / 05期
关键词
D O I
10.1103/PhysRevA.69.054301
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We show that the capacity of the Bostrom-Felbinger (ping-pong) protocol [Phys. Rev. Lett. 89, 187902 (2002)] can be doubled by introducing two additional unitary operations. In message mode, Alice can use one of the four unitary operations to encode two classical bits of information. Bob can decode Alice's information by using a Bell-basis measurement. Security against eavesdropping attack can be ensured by using two conjugate measurement bases in control mode. A message authentification method can protect this communication against a man-in-the-middle attack without eavesdropping.
引用
收藏
页码:054301 / 1
页数:3
相关论文
共 20 条
[11]  
CAI QY, QUANTPH0303117
[12]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[13]  
FUCHS CA, QUANTPH9601020
[14]   QUANTUM CRYPTOGRAPHY BASED ON ORTHOGONAL STATES [J].
GOLDENBERG, L ;
VAIDMAN, L .
PHYSICAL REVIEW LETTERS, 1995, 75 (07) :1239-1243
[15]   QUANTUM CRYPTOGRAPHY WITH COHERENT STATES [J].
HUTTNER, B ;
IMOTO, N ;
GISIN, N ;
MOR, T .
PHYSICAL REVIEW A, 1995, 51 (03) :1863-1869
[16]   Quantum cryptography without public announcement of bases [J].
Hwang, WY ;
Koh, IG ;
Han, YD .
PHYSICS LETTERS A, 1998, 244 (06) :489-494
[17]   Quantum cryptography based on split transmission of one-bit information in two steps [J].
Koashi, M ;
Imoto, N .
PHYSICAL REVIEW LETTERS, 1997, 79 (12) :2383-2386
[18]   Unconditional security of quantum key distribution over arbitrarily long distances [J].
Lo, HK ;
Chau, HF .
SCIENCE, 1999, 283 (5410) :2050-2056
[19]  
Nielsen Michael A, 2002, Quantum computation and quantum information, DOI DOI 10.1119/1.1463744