Controlled Quantum Dialogue with Five-Qubit Entangled States

Author(s):  
Hong-Ming Pan
2014 ◽  
Vol 28 (12) ◽  
pp. 1450094 ◽  
Author(s):  
Gan Gao

In this paper [Mod. Phys. Lett. B23 (2009) 2993], Zhang and Zhan proposed a quantum dialogue protocol by using the two-qutrit entangled states. We study the security of the protocol and find that it is not secure. The eavesdropper can obtain half of secret messages without performing any attack. In other words, their quantum dialogue protocol has the drawback of information leakage.


2018 ◽  
Vol 17 (9) ◽  
Author(s):  
Jia-Min Qi ◽  
Gang Xu ◽  
Xiu-Bo Chen ◽  
Tian-Yin Wang ◽  
Xiao-Qiu Cai ◽  
...  

2011 ◽  
Vol 50 (10) ◽  
pp. 3089-3095 ◽  
Author(s):  
Gan Gao ◽  
Ming Fang ◽  
Yue Wang ◽  
Da-Jin Zang

2009 ◽  
Vol 23 (25) ◽  
pp. 2993-2998 ◽  
Author(s):  
LING-LING ZHANG ◽  
YOU-BANG ZHAN

A protocol for quantum dialogue is proposed to exchange directly the communicators' secret messages by using the two-qutrit entangled state. In this protocol, the security of communication is ensured by the secret transmitting order of qutrits. It is shown that two legitimate users can directly transmit the secret messages by generalized Bell-basis measurement and classical communication.


2021 ◽  
pp. 2150189
Author(s):  
Zhou-jing Feng ◽  
Liang Tang ◽  
Yi Xiang ◽  
Zhi-wen Mo ◽  
Ming-qiang Bai

Many protocols of quantum dialogue are based on the assumption that the user is legitimate. In fact, the assumption is ideal. Therefore, it is necessary to identify whether the user is legitimate or not. In this paper, by adding identity authentication, a quantum dialogue protocol is proposed based on four-particle entangled states. For preparing the entangled state, we first give the description of the preparation process and draw the diagram of the prepared quantum circuit. Next, the nonlocal correlation properties of the entangled state are investigated. By associating identity authentication with channel security detection, the consumption of quantum resources is reduced to a certain extent. Furthermore, a random number r and a one-way hash function are added to increase the security of the protocol. In the end, compared with other protocols, our protocol has an improvement in efficiency.


Sign in / Sign up

Export Citation Format

Share Document