QUANTUM SECURE DIRECT COMMUNICATION WITHOUT A PRE-ESTABLISHED SECURE QUANTUM CHANNEL

2006 ◽  
Vol 04 (06) ◽  
pp. 925-934 ◽  
Author(s):  
JIAN WANG ◽  
QUAN ZHANG ◽  
CHAOJING TANG

Most of the quantum secure direct communication protocols need a pre-established secure quantum channel. Only after ensuring the security of quantum channel can the sender encode the secret message and send it to the receiver through the secure channel. In this paper, we present a quantum secure direct communication protocol using Einstein–Podolsky–Rosen pairs and teleportation. It is unnecessary for the present protocol to ensure the security of the quantum channel before transmitting the secret message. In the present protocol, all Einstein–Podolsky–Rosen pairs are used to transmit the secret message except those chosen for eavesdropping check. We also discuss the security of our protocol under several eavesdropping attacks.


2006 ◽  
Vol 17 (05) ◽  
pp. 685-692 ◽  
Author(s):  
JIAN WANG ◽  
QUAN ZHANG ◽  
CHAOJING TANG

Most of the quantum secure direct communication protocol needs a pre-established secure quantum channel. Only after insuring the security of quantum channel, could the sender encode the secret message and send them to the receiver through the secure channel. In this paper, we present a quantum secure direct communication protocol using Einstein-Podolsky-Rosen pairs without insuring the security of quantum channel before transmitting the secret message. Compared with the protocol proposed by Deng et al. [Phys. Rev. A68, 042317 (2003)] and the scheme proposed by Yan et al. [ Euro. Phys. J. B41, 75 (2004)], the present protocol provides higher efficiency.



2014 ◽  
Vol 28 (15) ◽  
pp. 1450121 ◽  
Author(s):  
Dongsu Shen ◽  
Wenping Ma ◽  
Meiling Wang ◽  
Xunru Yin

A security loophole exists in Gao et al.'s controlled quantum secure direct communication protocol. By employing the security loophole, the receiver can obtain the secret message sent by the sender without the permission of the controller in their protocol. In order to avoid this loophole, we present an improved protocol in this paper. In the improved protocol, entangled particles are prepared at random in two GHZ-like states, which ensure that the receiver is not able to recover the secret message without knowing the initially entangled state. Compared with the other improved version whose security depends on the perfect quantum channel, our improved protocol is secure in a noisy quantum channel. Therefore, our protocol is more practical.



2014 ◽  
Vol 28 (24) ◽  
pp. 1450194 ◽  
Author(s):  
Meiling Wang ◽  
Wenping Ma ◽  
Dongsu Shen ◽  
Xunru Yin

A new controlled quantum secure direct communication (CQSDC) protocol is presented by using a four-particle cluster state as quantum channel and the physical characteristics of controlled quantum teleportation to implement the transmission and the control. In this scheme, the receiver can receive the secret message from the sender and recover the secret message under the permission of the controller. According to the security analysis, the communication is secure against both participant and outside attacks, so this CQSDC protocol is secure and feasible.



2010 ◽  
Vol 08 (08) ◽  
pp. 1355-1371 ◽  
Author(s):  
CHIN-YUNG LU ◽  
SHIOU-AN WANG ◽  
YUH-JIUH CHENG ◽  
SY-YEN KUO

In this paper, we propose a quantum secure direct communication (QSDC) protocol based on Einstein–Podolsky–Rosen (EPR) pairs. Previous QSDC protocols usually consume one EPR pair to transmit a single qubit. If Alice wants to transmit an n-bit message, she needs at least n/2 EPR pairs when a dense coding scheme is used. In our protocol, if both Alice and Bob preshare 2c + 1 EPR pairs with the trusted server, where c is a constant, Alice can transmit an arbitrary number of qubits to Bob. The 2c EPR pairs are used by Alice and Bob to authenticate each other and the remaining EPR pair is used to encode and decode the message qubit. Thus the total number of EPR pairs used for one communication is a constant no matter how many bits will be transmitted. It is not necessary to transmit EPR pairs before transmitting the secret message except for the preshared constant number of EPR pairs. This reduces both the utilization of the quantum channel and the risk. In addition, after the authentication, the server is not involved in the message transmission. Thus we can prevent the server from knowing the message.



2012 ◽  
Vol 67 (6-7) ◽  
pp. 369-376 ◽  
Author(s):  
Jian Li ◽  
Jin-Rui Nie ◽  
Rui-Fan Li ◽  
Bo Jing

To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others



2011 ◽  
Vol 135-136 ◽  
pp. 1171-1178
Author(s):  
Min Cang Fu ◽  
Jia Chen Wang

An efficient and secure two-way asynchronous quantum secure direct communication protocol by using entangled states is proposed in this paper. Decoy photons are utilized to check eavesdropping; the securities of the protocol are equal to BB84 protocol. After ensuring the security of the quantum channel, both parties encode the secret message by using CNOT operation and local unitary operation separately. The two-way asynchronous direct transition of secret message can be realized by using Bell measurement and von Neumann measurement, combined with classical communication. Different from the present quantum secure direct communication protocols, the two parties encode secret message through different operations which is equivalent to sharing two asymmetric quantum channels, and the protocol is secure for a noise quantum protocol. The protocol is efficient in that all entangled states are used to transmit secret message.



2011 ◽  
Vol 09 (02) ◽  
pp. 801-807 ◽  
Author(s):  
TIAN-YIN WANG ◽  
QIAO-YAN WEN ◽  
FU-CHEN ZHU

We present a new multiparty controlled quantum secure direct communication protocol with phase encryption, in which the sender's secret message can only be recovered by the receiver under the permission of all the controllers. The security of this scheme is based on the basic principles of quantum mechanics and the secret order of encoding photons.



2019 ◽  
Vol 34 (01) ◽  
pp. 1950004 ◽  
Author(s):  
Yuhua Sun ◽  
Lili Yan ◽  
Yan Chang ◽  
Shibin Zhang ◽  
Tingting Shao ◽  
...  

Quantum secure direct communication allows one participant to transmit secret messages to another directly without generating a shared secret key first. In most of the existing schemes, quantum secure direct communication can be achieved only when the two participants have full quantum ability. In this paper, we propose two semi-quantum secure direct communication protocols to allow restricted semi-quantum or “classical” users to participate in quantum communication. A semi-quantum user is restricted to measure, prepare, reorder and reflect quantum qubits only in the classical basis [Formula: see text]. Both protocols rely on quantum Alice to randomly prepare Bell states, perform Bell basis measurements and publish the initial Bell states, but the semi-quantum Bob only needs to measure the qubits in classical basis to obtain secret information without quantum memory. Security and qubit efficiency analysis have been given in this paper. The analysis results show that the two protocols can avoid some eavesdropping attacks and their qubit efficiency is higher than some current related quantum or semi-quantum protocols.



Sign in / Sign up

Export Citation Format

Share Document