Information leakage resistant quantum dialogue against collective noise

被引:31
作者
Ye TianYu [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Informat & Elect Engn, Hangzhou 310018, Peoples R China
来源
SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY | 2014年 / 57卷 / 12期
基金
中国国家自然科学基金;
关键词
quantum dialogue(QD); bidirectional quantum secure direct communication (BQSDC); information leakage; collective-dephasing noise; collective-rotation noise; SECURE DIRECT COMMUNICATION; PUBLICLY KNOWN KEY; GHZ STATES; SINGLE PHOTONS; PHYS; LETT; BELL STATES; ENTANGLEMENT; CRYPTOGRAPHY; PROTOCOL; NETWORK;
D O I
10.1007/s11433-014-5566-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, two information leakage resistant quantum dialogue (QD) protocols over a collective-noise channel are proposed. Decoherence-free subspace (DFS) is used to erase the influence from two kinds of collective noise, i.e., collective-dephasing noise and collective-rotation noise, where each logical qubit is composed of two physical qubits and free from noise. In each of the two proposed protocols, the secret messages are encoded on the initial logical qubits via two composite unitary operations. Moreover, the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding, making the two proposed protocols easier to implement. The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart. Consequently, the information leakage problem is avoided in the two proposed protocols. Moreover, the detailed security analysis also shows that Eve's several famous active attacks can be effectively overcome, such as the Trojan horse attack, the intercept-resend attack, the measure-resend attack, the entangle-measure attack and the correlation-elicitation (CE) attack.
引用
收藏
页码:2266 / 2275
页数:10
相关论文
共 71 条
[1]   Secure communication with a publicly known key [J].
Beige, A ;
Englert, BG ;
Kurtsiefer, C ;
Weinfurter, H .
ACTA PHYSICA POLONICA A, 2002, 101 (03) :357-368
[2]  
Bennett C H, 1984, P IEEE INT C COMP SY, V175, P175
[3]   Purification of noisy entanglement and faithful teleportation via noisy channels [J].
Bennett, CH ;
Brassard, G ;
Popescu, S ;
Schumacher, B ;
Smolin, JA ;
Wootters, WK .
PHYSICAL REVIEW LETTERS, 1996, 76 (05) :722-725
[4]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[5]   Robust polarization-based quantum key distribution over a collective-noise channel [J].
Boileau, JC ;
Gottesman, D ;
Laflamme, R ;
Poulin, D ;
Spekkens, RW .
PHYSICAL REVIEW LETTERS, 2004, 92 (01) :4
[6]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[7]   Quantum key distribution in the Holevo limit [J].
Cabello, A .
PHYSICAL REVIEW LETTERS, 2000, 85 (26) :5635-5638
[8]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[9]   Improving the capacity of the Bostrom-Felbinger protocol [J].
Cai, QY ;
Li, BW .
PHYSICAL REVIEW A, 2004, 69 (05) :054301-1
[10]  
Cai QY, 2004, CHINESE PHYS LETT, V21, P601, DOI 10.1088/0256-307X/21/4/003