scholarly journals QUANTUM SECURE CONDITIONAL DIRECT COMMUNICATION VIA EPR PAIRS

2005 ◽  
Vol 16 (08) ◽  
pp. 1293-1301 ◽  
Author(s):  
TING GAO ◽  
FENGLI YAN ◽  
ZHIXI WANG

Two schemes for quantum secure conditional direct communication are proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission. After insuring the security of the quantum channel and obtaining the permission of Charlie (i.e., Charlie is trustworthy and cooperative, which means the "conditional" in the two schemes), Alice and Bob begin their private communication under the control of Charlie. In the first scheme, Alice transmits secret message to Bob in a deterministic manner with the help of Charlie by means of Alice's local unitary transformations, both Alice and Bob's local measurements, and both of Alice and Charlie's public classical communication. In the second scheme, the secure communication between Alice and Bob can be achieved via public classical communication of Charlie and Alice, and the local measurements of both Alice and Bob. The common feature of these protocols is that the communications between two communication parties Alice and Bob depend on the agreement of the third side Charlie. Moreover, transmitting one bit secret message, the sender Alice only needs to apply a local operation on her one qubit and send one bit classical information. We also show that the two schemes are completely secure if quantum channels are perfect.

2010 ◽  
Vol 08 (08) ◽  
pp. 1355-1371 ◽  
Author(s):  
CHIN-YUNG LU ◽  
SHIOU-AN WANG ◽  
YUH-JIUH CHENG ◽  
SY-YEN KUO

In this paper, we propose a quantum secure direct communication (QSDC) protocol based on Einstein–Podolsky–Rosen (EPR) pairs. Previous QSDC protocols usually consume one EPR pair to transmit a single qubit. If Alice wants to transmit an n-bit message, she needs at least n/2 EPR pairs when a dense coding scheme is used. In our protocol, if both Alice and Bob preshare 2c + 1 EPR pairs with the trusted server, where c is a constant, Alice can transmit an arbitrary number of qubits to Bob. The 2c EPR pairs are used by Alice and Bob to authenticate each other and the remaining EPR pair is used to encode and decode the message qubit. Thus the total number of EPR pairs used for one communication is a constant no matter how many bits will be transmitted. It is not necessary to transmit EPR pairs before transmitting the secret message except for the preshared constant number of EPR pairs. This reduces both the utilization of the quantum channel and the risk. In addition, after the authentication, the server is not involved in the message transmission. Thus we can prevent the server from knowing the message.


2015 ◽  
Vol 740 ◽  
pp. 857-860
Author(s):  
Xun Ru Yin

A three-party quantum secure direct communication protocol is proposed, in which the qubit transmission forms a closed loop. In this scheme, each party implements the corresponding unitary operations according to his secret bit value over the quantum channels. Then, by performing Bell measurements on the encoded particles, each party can extract the other two parties’ secret information simultaneously. Thus the three parties realize the direct exchange successfully.


2011 ◽  
Vol 135-136 ◽  
pp. 1171-1178
Author(s):  
Min Cang Fu ◽  
Jia Chen Wang

An efficient and secure two-way asynchronous quantum secure direct communication protocol by using entangled states is proposed in this paper. Decoy photons are utilized to check eavesdropping; the securities of the protocol are equal to BB84 protocol. After ensuring the security of the quantum channel, both parties encode the secret message by using CNOT operation and local unitary operation separately. The two-way asynchronous direct transition of secret message can be realized by using Bell measurement and von Neumann measurement, combined with classical communication. Different from the present quantum secure direct communication protocols, the two parties encode secret message through different operations which is equivalent to sharing two asymmetric quantum channels, and the protocol is secure for a noise quantum protocol. The protocol is efficient in that all entangled states are used to transmit secret message.


2004 ◽  
Vol 4 (6&7) ◽  
pp. 564-578
Author(s):  
A. Winter

We discuss concepts of message identification in the sense of Ahlswede and Dueck via general quantum channels, extending investigations for classical channels, initial work for classical--quantum (cq) channels and ``quantum fingerprinting''. We show that the identification capacity of a discrete memoryless quantum channel for classical information can be larger than that for transmission; this is in contrast to all previously considered models, where it turns out to equal the common randomness capacity (equals transmission capacity in our case): in particular, for a noiseless qubit, we show the identification capacity to be 2, while transmission and common randomness capacity are 1. Then we turn to a natural concept of identification of quantum messages (i.e. a notion of ``fingerprint'' for quantum states). This is much closer to quantum information transmission than its classical counterpart (for one thing, the code length grows only exponentially, compared to double exponentially for classical identification). Indeed, we show how the problem exhibits a nice connection to visible quantum coding. Astonishingly, for the noiseless qubit channel this capacity turns out to be 2: in other words, one can compress two qubits into one and this is optimal. In general however, we conjecture quantum identification capacity to be different from classical identification capacity.


2008 ◽  
Vol 19 (04) ◽  
pp. 625-635 ◽  
Author(s):  
TZONELIH HWANG ◽  
CHUAN-MING LI ◽  
NARN-YIH LEE

This paper presents a deterministic BB84 (dBB84) protocol that not only inherits the unconditional security of the original BB84 protocol but also enables the receiver to deterministically measure and decode all qubits sent by the sender. The proposed dBB84 protocol is then extended to be a deterministic secure quantum communication (DSQC) protocol wherein the sender can securely transmit secret messages to the receiver via quantum channels and the receiver can read out the secret messages only after receiving an additional classical bit for each qubit from the sender. In contrast to the existing single-photon-based secure communication protocols, which require the sender to either prepare two-qubit photon states or to establish two-way quantum channels with the receiver, the newly proposed protocol requires the sender to prepare single-qubit photon states for message transmissions and only set up one-way quantum channels to the receiver. Therefore, the proposed protocol is very suitable and feasible in practical applications.


2021 ◽  
pp. 188-198

The innovations in advanced information technologies has led to rapid delivery and sharing of multimedia data like images and videos. The digital steganography offers ability to secure communication and imperative for internet. The image steganography is essential to preserve confidential information of security applications. The secret image is embedded within pixels. The embedding of secret message is done by applied with S-UNIWARD and WOW steganography. Hidden messages are reveled using steganalysis. The exploration of research interests focused on conventional fields and recent technological fields of steganalysis. This paper devises Convolutional neural network models for steganalysis. Convolutional neural network (CNN) is one of the most frequently used deep learning techniques. The Convolutional neural network is used to extract spatio-temporal information or features and classification. We have compared steganalysis outcome with AlexNet and SRNeT with same dataset. The stegnalytic error rates are compared with different payloads.


2017 ◽  
Vol 24 (04) ◽  
pp. 1740013 ◽  
Author(s):  
Chiara Macchiavello ◽  
Massimiliano F. Sacchi

We review in a unified way a recently proposed method to detect properties of unknown quantum channels and lower bounds to quantum capacities, without resorting to full quantum process tomography. The method is based on the preparation of a fixed bipartite entangled state at the channel input or, equivalently, an ensemble of an overcomplete set of single-system states, along with few local measurements at the channel output.


Entropy ◽  
2019 ◽  
Vol 21 (8) ◽  
pp. 736 ◽  
Author(s):  
Julio A. López-Saldívar ◽  
Octavio Castaños ◽  
Margarita A. Man’ko ◽  
Vladimir I. Man’ko

The evolution of an open system is usually associated with the interaction of the system with an environment. A new method to study the open-type system evolution of a qubit (two-level atom) state is established. This evolution is determined by a unitary transformation applied to the qutrit (three-level atom) state, which defines the qubit subsystems. This procedure can be used to obtain different qubit quantum channels employing unitary transformations into the qutrit system. In particular, we study the phase damping and spontaneous-emission quantum channels. In addition, we mention a proposal for quasiunitary transforms of qubits, in view of the unitary transform of the total qutrit system. The experimental realization is also addressed. The probability representation of the evolution and its information-entropic characteristics are considered.


2017 ◽  
Vol 16 (5) ◽  
Author(s):  
Ming-Hui Zhang ◽  
Hui-Fang Li ◽  
Zhao-Qiang Xia ◽  
Xiao-Yi Feng ◽  
Jin-Ye Peng

Sign in / Sign up

Export Citation Format

Share Document