Quantum Secure Communication Network Protocol with Entangled Photons for Mobile Communications

被引:11
作者
Chou, Yao-Hsin [1 ]
Zeng, Guo-Jyun [1 ]
Lin, Fang-Jhu [1 ]
Chen, Chi-Yuan [2 ]
Chao, Han-Chieh [2 ,3 ,4 ]
机构
[1] Natl Chi Nan Univ, Dept Comp Sci & Informat Engn, Puli Township, Taiwan
[2] Natl Dong Hwa Univ, Dept Elect Engn, Shoufeng Township, Taiwan
[3] Natl Ilan Univ, Dept Elect Engn, Yilan City, Taiwan
[4] Natl Ilan Univ, Inst Comp Sci & Informat Engn, Yilan City, Taiwan
关键词
Quantum wireless network; Quantum secure network; Quantum secure direct communication; Bidirectional quantum secure direct communication; HORNE-ZEILINGER STATE; SINGLE PHOTONS; BELL THEOREM; GHZ STATE; CRYPTOGRAPHY; DIALOGUE; KEY;
D O I
10.1007/s11036-013-0454-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a communication protocol called Controlled Bidirectional Quantum Secret Direct Communication (CBQSDC) for mobile networks. In mobile networks, telecom companies assist the agent ensuring both sides could receive the other's secret messages in the transmission by quantum theory simultaneously. This protocol is based on n-particle GHZ states (Greenberger-Horne-Zeilinger-states) which are transformed to Einstein-Podolsky-Rosen (EPR) pairs by entanglement swapping. GHZ states are used to carry both sides' messages and entanglement swapping could reduce the number of transmission, so we could decrease the probability of eavesdropping. If any eavesdropper tries to steal dealer's messages, the lawful participants will perceive it and abort their transmission.
引用
收藏
页码:121 / 130
页数:10
相关论文
共 40 条
[1]   Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks -: art. no. 012309 [J].
Acín, A ;
Gisin, N ;
Scarani, V .
PHYSICAL REVIEW A, 2004, 69 (01) :16
[2]   Secure communication with a publicly known key [J].
Beige, A ;
Englert, BG ;
Kurtsiefer, C ;
Weinfurter, H .
ACTA PHYSICA POLONICA A, 2002, 101 (03) :357-368
[3]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[5]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[6]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[7]   Improving the capacity of the Bostrom-Felbinger protocol [J].
Cai, QY ;
Li, BW .
PHYSICAL REVIEW A, 2004, 69 (05) :054301-1
[8]   The "ping-pong" protocol can be attacked without eavesdropping [J].
Cai, QY .
PHYSICAL REVIEW LETTERS, 2003, 91 (10)
[9]  
Cai QY, 2004, CHINESE PHYS LETT, V21, P601, DOI 10.1088/0256-307X/21/4/003
[10]  
Chang LP, 2010, J INTERNET TECHNOL, V11, P519