Two semi-quantum secure direct communication protocols based on Bell states

2019 ◽  
Vol 34 (01) ◽  
pp. 1950004 ◽  
Author(s):  
Yuhua Sun ◽  
Lili Yan ◽  
Yan Chang ◽  
Shibin Zhang ◽  
Tingting Shao ◽  
...  

Quantum secure direct communication allows one participant to transmit secret messages to another directly without generating a shared secret key first. In most of the existing schemes, quantum secure direct communication can be achieved only when the two participants have full quantum ability. In this paper, we propose two semi-quantum secure direct communication protocols to allow restricted semi-quantum or “classical” users to participate in quantum communication. A semi-quantum user is restricted to measure, prepare, reorder and reflect quantum qubits only in the classical basis [Formula: see text]. Both protocols rely on quantum Alice to randomly prepare Bell states, perform Bell basis measurements and publish the initial Bell states, but the semi-quantum Bob only needs to measure the qubits in classical basis to obtain secret information without quantum memory. Security and qubit efficiency analysis have been given in this paper. The analysis results show that the two protocols can avoid some eavesdropping attacks and their qubit efficiency is higher than some current related quantum or semi-quantum protocols.

2013 ◽  
Vol 11 (01) ◽  
pp. 1350005 ◽  
Author(s):  
ZHI-WEI SUN ◽  
RUI-GANG DU ◽  
DONG-YANG LONG

Recently, quantum key distribution (QKD) with classical Bob has been suggested and proven completely robust by Boyer et al. [Phys. Rev. Lett.99 (2007) 140501] in which quantum Alice has a fully-fledged quantum power, while classical Bob is restricted to preparing and measuring a particle in the computational basis, reflecting or reordering the particles. In this paper, we describe two related but simpler semi-quantum key distribution protocol that exempts classical Bob from measurement (hereafter called limited classical Bob for convenience) and, prove them completely robust. As limited classical Bob can deterministically prepare the qubits, we exploit this feature to construct a semi-quantum secure direct communication protocol, which is the direct communication of secret messages without first producing a shared secret key.


2020 ◽  
Vol 18 (06) ◽  
pp. 2050033
Author(s):  
Muhammad Mubashir Khan ◽  
Asad Arfeen ◽  
Usama Ahsan ◽  
Saneeha Ahmed ◽  
Tahreem Mumtaz

Quantum key distribution (QKD) is a proven secured way to transmit shared secret keys using quantum particles. Any adversarial attempt to intercept and eavesdrop secret key results in generating errors alerting the legitimate users. Since QKD is constrained by quantum mechanics principles, the practical transmission of the key at a greater distance is an issue. In this paper, we discover and analyze the key factors associated with transmission media, hardware components and protocol implementation of the QKD system that causes hindrance in distance range. Practical implementation of BB84 and KMB09 protocols is discussed to determine the achievable distance given current technology. We find that by using ultra low loss fiber, short-pulse laser and superconducting nanowire single photon detector the maximum achievable distance for both of the quantum protocols is 250[Formula: see text]km.


Author(s):  
Xudong Qin ◽  
Yuxin Deng ◽  
Wenjie Du

Abstract One important application of quantum process algebras is to formally verify quantum communication protocols. With a suitable notion of behavioural equivalence and a decision method, one can determine if an implementation of a protocol is consistent with its specification. Ground bisimulation is a convenient behavioural equivalence for quantum processes because of its associated coinduction proof technique. We exploit this technique to design and implement two on-the-fly algorithms for the strong and weak versions of ground bisimulation to check if two given processes in quantum CCS are equivalent. We then develop a tool that can verify interesting quantum protocols such as the BB84 quantum key distribution scheme.


2021 ◽  
Vol 36 (37) ◽  
Author(s):  
Xi Huang ◽  
Shibin Zhang ◽  
Yan Chang ◽  
Fan Yang ◽  
Min Hou ◽  
...  

As one of the most important branches of quantum cryptography, quantum secure direct communication (QSDC) is used to transmit the secret message directly rather than distribute a random key. Quantum homomorphic encryption (QHE) enables arbitrary quantum transformation on encrypted data without decrypting the data. To date, the previously proposed QSDC schemes are mainly based on different quantum states. The research of the QSDC scheme based on QHE is still blank. In this paper, a QSDC scheme by taking advantage of the properties of QHE is proposed. The proposed protocol has applied QHE and decoy photons to prevent various types of attacks. The proposed scheme only utilizes the rotation operation to encode the secret message which is easy to implement with the current technologies. Moreover, the communication efficiency and the qubit-utilization ratio are analyzed in this paper, which shows that this protocol has good performance in the qubit-utilization ratio, and the qubit efficiency of the QSDC scheme has improved.


Symmetry ◽  
2020 ◽  
Vol 12 (9) ◽  
pp. 1481
Author(s):  
Nur Ziadah Harun ◽  
Zuriati Ahmad Zukarnain ◽  
Zurina Mohd Hanapi ◽  
Idawaty Ahmad

The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of authentication is required to be done three times based on the usage of unitary transformation that is only known between Alice and Bob. In the proposed protocol, a secure quantum handshake is utilized to share the secret polarization angle and an authentication key at the initial stage of authentication over the quantum channel. The symmetry key is used in this work to protect user data communication within the QSDC protocol, where the same secret key is used to encrypt and decrypt the message. This work adopts the information travel time (ITT) by allowing the sender to detect any interference from third parties. In addition, the operation of the Pauli-X quantum gate increases Eve’s difficulty in stealing the information. The information transmitted is then continued by sending photons once in the quantum channel, which improves the efficiency without losing the message’s security. In addition, to securely transfer the stream of messages, the proposed protocol is operated in single-stage, and the authentication is applied bit-by-bit, thus reducing the transmission time. Security checks are carried out along the data transmission process. Compared to previous protocols, this new initial authentication protocol has remarkable advantages since it does not require public communication to pre-share the authentication key and secret angles before the onset of the transmission, therefore, reducing the communication cost. Moreover, the secret authentication key and polarization angles are updated after a number of bits are sent to increase the security level. The verification process is also conducted to ensure the symmetry of the sender and receiver. The analyses presented herein demonstrate that the proposed authentication protocol is simple and secure in order to ensure the legitimacy of the users.


2014 ◽  
Vol 898 ◽  
pp. 663-667
Author(s):  
Cheng Hong Zhou ◽  
Yi Liu ◽  
Wei Ping Qian

In this article, we first review the classical satellite telecontrol system, including space-ground closed loop comparison system, and analyse the insufficient from the perspectives of security and reliability. Subsequently the development of quantum communication is summarized, besides, the advantages of quantum communication used for satellite telecontrol is expounded. Finally we put forward a simplified quantum secure direct communication protocol for satellite telecontrol and discuss the quantum telecontrol system for further development.


Sign in / Sign up

Export Citation Format

Share Document