Teleportation-based quantum secure communication using quantum channel compression

2020 ◽  
Vol 74 (2) ◽  
Author(s):  
Georgi Bebrov ◽  
Rozalina Dimova
2008 ◽  
Vol 19 (11) ◽  
pp. 1673-1681 ◽  
Author(s):  
LI DONG ◽  
XIAO-MING XIU ◽  
YA-JUN GAO ◽  
FENG CHI

A three-party controlled deterministic secure quantum communication scheme through entanglement swapping is proposed firstly. In the scheme, the sender needs to prepare a class of Greenberger–Horne–Zeilinger (GHZ) states which are used as quantum channel. The two communicators may securely communicate under the control of the controller if the quantum channel is safe. The roles of the sender, the receiver, and the controller can be exchanged owing to the symmetry of the quantum channel. Different from other controlled quantum secure communication schemes, the scheme needs lesser additional classical information for transferring secret information. Finally, it is generalized to a multiparty controlled deterministic secure quantum communication scheme.


Author(s):  
Pramode K. Verma ◽  
Mayssaa El Rifai ◽  
Kam Wai Clifford Chan

Author(s):  
Lyubov V. Amitonova ◽  
Tristan B. H. Tentrup ◽  
Ivo M. Vellekoop ◽  
Pepijn W. H. Pinkse

2021 ◽  
pp. 2150343
Author(s):  
Xiao-Jun Wen ◽  
Yong-Zhi Chen ◽  
Xin-Can Fan ◽  
Zheng-Zhong Yi ◽  
Zoe L. Jiang ◽  
...  

Blockchain technology represented by Bitcoin and Ethereum has been deeply developed and widely used due to its broad application prospects such as digital currency and IoT. However, the security of the existing blockchain technologies built on the classical cryptography depends on the computational complexity problem. With the enhancement of the attackers’ computing power, especially the upcoming quantum computers, this kind of security is seriously threatened. Based on quantum hash, quantum SWAP test and quantum teleportation, a quantum blockchain system is proposed with quantum secure communication. In classical cryptographic theory sense, the security of this system is unconditional since it has nothing to do with the attackers’ computing power and computing resources.


2019 ◽  
Vol 58 (4) ◽  
pp. 1079-1087
Author(s):  
Dong-fen Li ◽  
Rui-jin Wang ◽  
Ya-ming Yang ◽  
Jin-lian Chen

2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Yao-Hsin Chou ◽  
Yu-Ting Lin ◽  
Guo-Jyun Zeng ◽  
Fang-Jhu Lin ◽  
Chi-Yuan Chen

We propose a novel protocol for controlled bidirectional quantum secure communication based on anonlocal swapgate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on thenonlocal swapgate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.


2011 ◽  
Vol 54 (12) ◽  
pp. 2578-2591 ◽  
Author(s):  
WenChao Dai ◽  
Yuan Lu ◽  
Jun Zhu ◽  
GuiHua Zeng

2013 ◽  
Vol 19 (1) ◽  
pp. 121-130 ◽  
Author(s):  
Yao-Hsin Chou ◽  
Guo-Jyun Zeng ◽  
Fang-Jhu Lin ◽  
Chi-Yuan Chen ◽  
Han-Chieh Chao

Sign in / Sign up

Export Citation Format

Share Document