AN EFFICIENT DETERMINISTIC SECURE QUANTUM COMMUNICATION SCHEME WITH CLUSTER STATE

2009 ◽  
Vol 07 (03) ◽  
pp. 689-696 ◽  
Author(s):  
HAO YUAN ◽  
JUN SONG ◽  
XIAOYUAN HU ◽  
KUI HOU

A novel efficient scheme for deterministic secure quantum communication with cluster state is proposed. By utilizing Bell-basis- and [Formula: see text]-basis-measurements, the two legitimate users can directly transmit secret message after exchanging some additional classical information. It has a high capacity as each cluster state can carry two bits of information, and has a high intrinsic efficiency because almost all the instances are useful. Since the present scheme is based on the cluster state which is robust against decoherence, it is easily processed by a one-way quantum computer. Furthermore, this scheme is feasible with present-day technique.

2011 ◽  
Vol 09 (01) ◽  
pp. 607-614 ◽  
Author(s):  
HAO YUAN ◽  
JUN SONG ◽  
XIANG-YUAN LIU ◽  
SHAN CHENG ◽  
KUI HOU ◽  
...  

We propose a new protocol for deterministic secure quantum communication with a four-qubit W state. In this protocol, by using four local two-particle unitary operations and Bell basis measurements, the two legitimate users can directly transmit secret messages after exchanging some additional classical information. It will be shown that our protocol has a high capacity as each W state can carry two bits of secret information, and has a high intrinsic efficiency because almost all the instances are useful. Furthermore, this protocol is feasible with present day techniques.


2017 ◽  
Vol 15 (01) ◽  
pp. 1750002 ◽  
Author(s):  
Milad Nanvakenari ◽  
Monireh Houshmand

In this paper, a three-party controlled quantum secure direct communication and authentication (QSDCA) protocol is proposed by using four particle cluster states via a quantum one-time pad and local unitary operations. In the present scheme, only under the permission of the controller, the sender and the receiver can implement secure direct communication successfully. But under any circumstances, Charlie cannot obtain the secret message. Eavesdropping detection and identity authentication are achieved with the help of the previously shared reusable base identity strings of users. This protocol is unconditionally secure in both ideal and practical noisy cases. In one transmission, a qubit of each four particle cluster state is used as controller’s permission and the same qubit with another qubit are used to recover two classical bits of information. In the proposed scheme, the efficiency is improved compared with the previous works.


2008 ◽  
Vol 50 (5) ◽  
pp. 1105-1108 ◽  
Author(s):  
Yuan Hao ◽  
He Qin ◽  
Hu Xiao-Yuan ◽  
Hou Kui ◽  
Han Lian-Fang ◽  
...  

2008 ◽  
Vol 19 (11) ◽  
pp. 1673-1681 ◽  
Author(s):  
LI DONG ◽  
XIAO-MING XIU ◽  
YA-JUN GAO ◽  
FENG CHI

A three-party controlled deterministic secure quantum communication scheme through entanglement swapping is proposed firstly. In the scheme, the sender needs to prepare a class of Greenberger–Horne–Zeilinger (GHZ) states which are used as quantum channel. The two communicators may securely communicate under the control of the controller if the quantum channel is safe. The roles of the sender, the receiver, and the controller can be exchanged owing to the symmetry of the quantum channel. Different from other controlled quantum secure communication schemes, the scheme needs lesser additional classical information for transferring secret information. Finally, it is generalized to a multiparty controlled deterministic secure quantum communication scheme.


2010 ◽  
Vol 08 (08) ◽  
pp. 1389-1395 ◽  
Author(s):  
HAI-KUAN DONG ◽  
LI DONG ◽  
XIAO-MING XIU ◽  
YA-JUN GAO

A deterministic secure quantum communication protocol against collective rotation noise is proposed. If the security check is passed, the receiver can obtain a one-bit secret message with the aid of a one-bit classical message for two photons. It does not need a photon storing technique and only single photon measurement is necessary.


2009 ◽  
Vol 18 (10) ◽  
pp. 4105-4109 ◽  
Author(s):  
Liu Wen-Jie ◽  
Chen Han-Wu ◽  
Ma Ting-Huai ◽  
Li Zhi-Qiang ◽  
Liu Zhi-Hao ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document