Modified method of security amplification for quantum direct communication protocols

Author(s):  
Yevhen Vasiliu ◽  
Sergiy Nikolayenko
2014 ◽  
Vol 54 (7) ◽  
pp. 2436-2445 ◽  
Author(s):  
Shu-Jiang Xu ◽  
Xiu-Bo Chen ◽  
Lian-Hai Wang ◽  
Xin-Xin Niu ◽  
Yi-Xian Yang

2016 ◽  
Vol 14 (04) ◽  
pp. 1640012 ◽  
Author(s):  
L. Vaidman

The counterfactuality of recently proposed protocols is analyzed. A definition of “counterfactuality” is offered and it is argued that an interaction-free measurement (IFM) of the presence of an opaque object can be named “counterfactual”, while proposed “counterfactual” measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measurements of the presence of the object are counterfactual, but quantum direct communication protocols are not. Therefore, the name “counterfactual” is not appropriate for recent “counterfactual” protocols which transfer quantum states by quantum direct communication.


2019 ◽  
Vol 34 (01) ◽  
pp. 1950004 ◽  
Author(s):  
Yuhua Sun ◽  
Lili Yan ◽  
Yan Chang ◽  
Shibin Zhang ◽  
Tingting Shao ◽  
...  

Quantum secure direct communication allows one participant to transmit secret messages to another directly without generating a shared secret key first. In most of the existing schemes, quantum secure direct communication can be achieved only when the two participants have full quantum ability. In this paper, we propose two semi-quantum secure direct communication protocols to allow restricted semi-quantum or “classical” users to participate in quantum communication. A semi-quantum user is restricted to measure, prepare, reorder and reflect quantum qubits only in the classical basis [Formula: see text]. Both protocols rely on quantum Alice to randomly prepare Bell states, perform Bell basis measurements and publish the initial Bell states, but the semi-quantum Bob only needs to measure the qubits in classical basis to obtain secret information without quantum memory. Security and qubit efficiency analysis have been given in this paper. The analysis results show that the two protocols can avoid some eavesdropping attacks and their qubit efficiency is higher than some current related quantum or semi-quantum protocols.


2010 ◽  
Vol 56 (6) ◽  
pp. 1733-1737 ◽  
Author(s):  
Hyung Jin Yang ◽  
Chang Ho Hong ◽  
Jong In Lim ◽  
Ji In Kim

Sign in / Sign up

Export Citation Format

Share Document