Information leakage in quantum dialogue by using the two-qutrit entangled states

2014 ◽  
Vol 28 (12) ◽  
pp. 1450094 ◽  
Author(s):  
Gan Gao

In this paper [Mod. Phys. Lett. B23 (2009) 2993], Zhang and Zhan proposed a quantum dialogue protocol by using the two-qutrit entangled states. We study the security of the protocol and find that it is not secure. The eavesdropper can obtain half of secret messages without performing any attack. In other words, their quantum dialogue protocol has the drawback of information leakage.

2019 ◽  
Vol 33 (05) ◽  
pp. 1950033 ◽  
Author(s):  
Ming-Hui Zhang ◽  
Jin-Ye Peng ◽  
Zheng-Wen Cao

Quantum dialogue can realize the mutual transmission of secret information between two legal users. In most of the existing quantum dialogue protocols, the information carriers applied in quantum dialogue are discrete variable (DV) quantum states. However, there are certain limitations on the preparation and detection of DV quantum states with current techniques. Continuous variable (CV) quantum states can overcome these problems effectively while improving the quantum channel capacity. In this paper, we propose a quantum dialogue protocol with four-mode continuous variable GHZ state. Compared with the existing CV-based quantum dialogue protocols, the protocol allows two users to transmit two groups of secret information with different lengths to each other simultaneously. The channel capacity of the protocol has been improved as each traveling mode carries two- or four-bits of information. In addition, the protocol has been proved to be secure against information leakage problem and some common attacks, such as beam splitter attack and intercept-and-resend attack.


2014 ◽  
Vol 53 (11) ◽  
pp. 3829-3837 ◽  
Author(s):  
Nan-Run Zhou ◽  
Tian-Xiang Hua ◽  
Gui-Tong Wu ◽  
Chao-Sheng He ◽  
Ye Zhang

2016 ◽  
Vol 30 (26) ◽  
pp. 1650332 ◽  
Author(s):  
Yefeng He ◽  
Wenping Ma

Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.


Sign in / Sign up

Export Citation Format

Share Document