Secure Deterministic Communication without Entanglement
نویسندگان
چکیده
منابع مشابه
Deterministic secure direct communication using entanglement.
A novel secure communication protocol is presented, based on an entangled pair of qubits and allowing asymptotically secure key distribution and quasisecure direct communication. Since the information is transferred in a deterministic manner, no qubits have to be discarded. The transmission of information is instantaneous, i.e., the information can be decoded during the transmission. The securi...
متن کاملDeterministic secure communication protocol
Quantum key distribution (QKD) is a protocol which is provably secure, by which private key bit can be created between two parties over a public channel. The key bits can then be used to implement a classical private key cryptosystem, to enable the parties to communicate securely. The basic idea behind QKD is that Eve cannot gain any information from the qubits transmitted from Alice to Bob wit...
متن کاملOn the "Deterministic Secure Quantum Communication using Four-Particle Entangled State and Entanglement Swapping"
Recently, Xiu et al. proposed a deterministic secure quantum communication (DSQC) protocol using the entanglement swapping of four-particle genuine entangled states. Later, Qin et al. showed a double-CNOT attack on the protocol and also provided an improvement to avoid the attack. This work tries to use a batch of decoy single photons prepared randomly in one of four different states, to enhanc...
متن کاملDeterministic Secure Communication Using Quantum Nonlocality
Quantum key distribution (QKD) is a protocol which is provably secure, by which private bit can be created between two parties over a public channel. Based on the postulate of quantum measurement [1] and no-cloning theorem [2], different QKD protocol are presented [3]. However, these type of cryptographic schemes are usually nondeterministic. A Beige et al. have presented a quantum communicatio...
متن کاملDeterministic Secure Direct Communication Using Mixed State
We show an improved ping − pong protocol which is based on the protocol showed by Kim Bostrom and Timo Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]. We show that our protocol is asymptotically secure key distribution and quasisecure direct communication using a mixed state. This protocol can be carried out with great efficiency and speed with today’s technology, e.g. single photon source and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2005
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.94.140501