QUANTUM DIRECT COMMUNICATION BASED ON QUANTUM SEARCH ALGORITHM

被引:38
作者
Wang, Chuan [1 ,2 ,3 ,4 ]
Hao, Liang [1 ,2 ,5 ]
Song, Si Yu [1 ,2 ,5 ]
Long, Gui Lu [1 ,2 ,5 ]
机构
[1] Tsinghua Univ, Key Lab Atom & Mol Nanosci, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Dept Phys, Beijing 100084, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
[4] Beijing Univ Posts & Telecommun, Key Lab Opt Commun & Lightwave Technol, Beijing 100876, Peoples R China
[5] Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
关键词
Deterministic secure quantum communication; quantum direct communication; quantum search algorithm; quantum secure direct communication; SECURE DIRECT COMMUNICATION; KEY DISTRIBUTION; ENTANGLED STATES; BELL THEOREM; CRYPTOGRAPHY; NETWORK; PROTOCOL; SCHEME; ORDER;
D O I
10.1142/S0219749910006071
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Quantum direct communications, including deterministic secure quantum communication and quantum secure direct communication protocol using two-qubit quantum search algorithm are proposed in this paper. Secret messages are encoded by two-qubit unitary operations and exchanged by the two communication parties directly. We discussed the security of the protocol under intercept-resend attack and individual attack. We found that the protocols are secure against eavesdropping attacks.
引用
收藏
页码:443 / 450
页数:8
相关论文
共 46 条
[1]   Secure communication with a publicly known key [J].
Beige, A ;
Englert, BG ;
Kurtsiefer, C ;
Weinfurter, H .
ACTA PHYSICA POLONICA A, 2002, 101 (03) :357-368
[2]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   COMMUNICATION VIA ONE-PARTICLE AND 2-PARTICLE OPERATORS ON EINSTEIN-PODOLSKY-ROSEN STATES [J].
BENNETT, CH ;
WIESNER, SJ .
PHYSICAL REVIEW LETTERS, 1992, 69 (20) :2881-2884
[4]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[5]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[6]   Implementation of quantum search algorithm using classical Fourier optics [J].
Bhattacharya, N ;
van den Heuvell, HBV ;
Spreeuw, RJC .
PHYSICAL REVIEW LETTERS, 2002, 88 (13) :1379011-1379014
[7]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[8]   Exact quantum algorithm to distinguish Boolean functions of different weights [J].
Braunstein, Samuel L. ;
Choi, Byung-Soo ;
Ghosh, Subhroshekhar ;
Maitra, Subhamoy .
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2007, 40 (29) :8441-8454
[9]   Improving the capacity of the Bostrom-Felbinger protocol [J].
Cai, QY ;
Li, BW .
PHYSICAL REVIEW A, 2004, 69 (05) :054301-1
[10]   Experimental test of two-way quantum key distribution in the presence of controlled noise [J].
Cere, Alessandro ;
Lucamarini, Marco ;
Di Giuseppe, Giovanni ;
Tombesi, Paolo .
PHYSICAL REVIEW LETTERS, 2006, 96 (20)