Resource and Duration Evaluation of Quantum Secure Communication Protocols

Author(s):  
Georgi Bebrov ◽  
Plamen Stoyanov ◽  
Rozalina Dimova
Author(s):  
Pramode K. Verma ◽  
Mayssaa El Rifai ◽  
Kam Wai Clifford Chan

Author(s):  
Lyubov V. Amitonova ◽  
Tristan B. H. Tentrup ◽  
Ivo M. Vellekoop ◽  
Pepijn W. H. Pinkse

2021 ◽  
pp. 2150343
Author(s):  
Xiao-Jun Wen ◽  
Yong-Zhi Chen ◽  
Xin-Can Fan ◽  
Zheng-Zhong Yi ◽  
Zoe L. Jiang ◽  
...  

Blockchain technology represented by Bitcoin and Ethereum has been deeply developed and widely used due to its broad application prospects such as digital currency and IoT. However, the security of the existing blockchain technologies built on the classical cryptography depends on the computational complexity problem. With the enhancement of the attackers’ computing power, especially the upcoming quantum computers, this kind of security is seriously threatened. Based on quantum hash, quantum SWAP test and quantum teleportation, a quantum blockchain system is proposed with quantum secure communication. In classical cryptographic theory sense, the security of this system is unconditional since it has nothing to do with the attackers’ computing power and computing resources.


2019 ◽  
Vol 58 (4) ◽  
pp. 1079-1087
Author(s):  
Dong-fen Li ◽  
Rui-jin Wang ◽  
Ya-ming Yang ◽  
Jin-lian Chen

2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Yao-Hsin Chou ◽  
Yu-Ting Lin ◽  
Guo-Jyun Zeng ◽  
Fang-Jhu Lin ◽  
Chi-Yuan Chen

We propose a novel protocol for controlled bidirectional quantum secure communication based on anonlocal swapgate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on thenonlocal swapgate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.


Sign in / Sign up

Export Citation Format

Share Document