ENCRYPTION-BASED NETWORKING QUANTUM TELEPORTATION WITH TRIPLET GREENBERGER–HORNE–ZEILINGER STATES

2010 ◽  
Vol 08 (05) ◽  
pp. 765-778 ◽  
Author(s):  
YING GUO ◽  
Guihua Zeng

An encryption-based networking quantum teleportation scheme is proposed for the secure quantum communication network based on the novel networking quantum key distribution (NQKD) with the Greenberger–Horne–Zeilinger (GHZ) state. The security is exactly guaranteed via the entanglement of the GHZ quantum system. In the process of quantum teleportation, the server Charlie prepares the GHZ states and the users exploit the four local unitary operations corresponding to the keys shared aforehand to encrypt/decrpt for the initial messages. One legal user can communicate with another on the network securely as they may perform a quantum privacy application on the encrypted quantum states transmitted in quantum channel. Its intrinsic efficiency is high as almost all the instances are useful and each GHZ state can carry two different encrypted single-qubit states. To reconstruct these transmitted messages, the users exploit Bell measurement and perform local operations with respect to the shared keys in NQKD, which will improve its security in a noise quantum channel.


2021 ◽  
pp. 2150249
Author(s):  
Vikram Verma

In this paper, by utilizing a nine-qubit entangled state as a quantum channel, we propose new schemes for symmetric and asymmetric cyclic controlled quantum teleportation (CYCQT). In our proposed schemes, four participants Alice, Bob, Charlie and David teleport their unknown quantum states cyclically among themselves with the help of a controller Eve. No participants can reconstruct the original states sent from the respective senders without the permission of the controller. Also, by considering same nine-qubit entangled state as a quantum channel, we propose a generalized scheme for CYCQT of multi-qubit states. In contrast to the previous CYCQT schemes involving three communicators and a controller, there are four communicators and a controller in the proposed schemes. Also, compared with previous CYCQT schemes, our proposed CYCQT schemes require less consumption of quantum resource and the intrinsic efficiency of the generalized scheme increases with the increase of number of qubits in the information states.



2004 ◽  
Vol 59 (9) ◽  
pp. 597-601 ◽  
Author(s):  
T. Gao

A theoretical scheme for controlled and secure direct communication is proposed. The communication is based on GHZ state and controlled quantum teleportation. After insuring the security of the quantum channel (a set of qubits in the GHZ state), Alice encodes the secret message directly on a sequence of particle states in the GHZ state and transmits them to Bob, supervised by Charlie using controlled quantum teleportation. Bob can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportation transmits Alice’s message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret messages between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if a perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of a third side.



2014 ◽  
Vol 12 (06) ◽  
pp. 1450038 ◽  
Author(s):  
Yahong Wang ◽  
Hongwei Liang

This paper offers a theoretical protocol for one-party controlled remote state preparation (RSP) of n-qubit states with minimum resources consumption. We are mainly focused on the case of the n-qubit state chosen from equatorial circle on a Bloch sphere. We use n - 1 EPR pairs and one GHZ state as quantum channel and show that only n + 1 cbits, n ebits and 2n + 1 qubits are consumed during the controlled RSP processing.



2018 ◽  
Vol 96 (6) ◽  
pp. 650-653 ◽  
Author(s):  
Nan Zhao ◽  
Min Li ◽  
Nan Chen ◽  
Chang-xing Pei

We present a scheme for teleporting a certain class of six-particle state via an eight-particle cluster state as quantum channel. In our scheme, the sender merely needs to perform an eight-particle von-Neumann projective measurement, and the receiver gives a corresponding general evolution to restore the original state. Our scheme is a deterministic scheme. Compared with other schemes proposed before, our scheme possesses higher intrinsic efficiency.



Author(s):  
Luis Adrián Lizama-Pérez ◽  
José Mauricio López-Romero

We present an error reconciliation method for Quantum Key Distribution (QKD) that corrects 100% of errors generated in regular binary frames transmitted over a noisy quantum channel regardless of the quantum channel error rate. In a previous investigation, we introduced a novel distillation QKD algorithm whose secret key rate descends linearly with respect to the channel error rate. Now, as the main achievement of this work, we demonstrate an improved algorithm capable of retaining almost all the secret information enclosed in the regular binary frames. Remarkably, this technique increases quadratically the secret key rate as a function of the double matching detection events and doubly quadratically in the number of the quantum pulses. Furthermore, this reconciliation method opens up the opportunity to use less attenuated quantum pulses, would allow greater QKD distances at drastically increased secret key rate. Since our method can be implemented as a software update, we hope that quantum key distribution technology would be fast deployed over global data networks in the quantum era.



2014 ◽  
Vol 14 (3&4) ◽  
pp. 255-264
Author(s):  
Alaa Sagheer ◽  
Hala Hamdoun

In this paper, some properties of multi-qubit states traveling in non-inertial frames are investigated, where we assume that all particles are accelerated. These properties are including fidelities, capacities and entanglement of the accelerated channels for three different states, namely, Greeberger-Horne-Zeilinger (GHZ) state, GHZ-like state and W-state. It is shown here that all these properties are decreased as the accelerations of the moving particles are increased. The obtained results show that the GHZ-state is the most robust state comparing to the others, where the degradation rate is less than that for the other states particularly in the second Rindler region. Also, it is shown here that the entangled property doesn't change in the accelerated frames. Additionally, the paper shows that the degree of entanglement decreases as the accelerations of the particles increase in the first Rindler region. However in the second region, where all subsystems are disconnected at zero acceleration, entangled states are generated as the acceleration increases.



2007 ◽  
Vol 17 (03) ◽  
pp. 323-335 ◽  
Author(s):  
NAYA NAGY ◽  
SELIM G. AKL

The aim of quantum key distribution protocols is to establish a secret key among two parties with high security confidence. Such algorithms generally require a quantum channel and an authenticated classical channel. This paper presents a totally new perception of communication in such protocols. The quantum communication alone satisfies all needs of array communication between the two parties. Even so, the quantum communication channel does not need to be protected or authenticated whatsoever. As such, our algorithm is a purely quantum key distribution algorithm. The only certain identification of the two parties is through public keys.



2011 ◽  
Vol 09 (supp01) ◽  
pp. 389-403 ◽  
Author(s):  
ANIRBAN PATHAK ◽  
ANINDITA BANERJEE

An efficient and economical scheme is proposed for the perfect quantum teleportation of n-qubit non-maximally entangled state of generalized Bell-type. A Bell state is used as the quantum channel in the proposed scheme. It is also shown that the controlled teleportation of this n-qubit state can be achieved by using a GHZ state or a GHZ-like state as quantum channel. The proposed schemes are economical because for the perfect and controlled teleportation of n-qubit non-maximally entangled state of generalized Bell-type, we only need a Bell state and a tripartite entangled state respectively. It is also established that there exists a family of 12 orthogonal tripartite GHZ-like states which can be used as quantum channel for controlled teleportation. The proposed protocols are critically compared with the existing protocols.



2005 ◽  
Vol 12 (17) ◽  
Author(s):  
Ivan B. Damgård ◽  
Thomas B. Pedersen ◽  
Louis Salvail

Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared key, where attempts to eavesdrop the ciphertext can be detected. If no eavesdropping is detected, we can securely re-use the entire key for encrypting new messages. If eavesdropping is detected, we must discard a number of key bits corresponding to the length of the message, but can re-use almost all of the rest. We show this is essentially optimal. Thus, provided the adversary does not interfere (too much) with the quantum channel, we can securely send an arbitrary number of message bits, independently of the length of the initial key. Moreover, the key-recycling mechanism only requires one-bit feedback. While ordinary quantum key distribution with a classical one time pad could be used instead to obtain a similar functionality, this would need more rounds of interaction and more communication.





Sign in / Sign up

Export Citation Format

Share Document