Improving the capacity of the ping-pong protocol
نویسندگان
چکیده
Since Bennett and Brassard presented the pioneer quantum key distribution (QKD) protocol in 1984 [1], there are a lot of theoretical QKD schemes [1-12] today. Recently, Beige et al. proposed a quantum secure direct communication scheme [13], which allows messages communicated directly without first establishing a random key to encrypt them. Bostroem and Felbingeer presented a ping-pong protocol [14] which is secure for key distribution and quasisecure for direct communication with a perfect quantum channel. However, an eavesdropper-Eve can eavesdrop the information if the quantum channel is noisy [15]. And this ping-pong protocol can attacked without eavesdropping [16]. Moreover, the capacity is restricted, and an entangled state only carries one bit of classical information in every message run. In this paper, we give an improved ping-pong protocol, which allows one entangled state carrying two classical bits in every message run. And we show this protocol is secure with a classical message authentification method. Let us start with the brief description of the ping-pong protocol. Suppose Bob have two photons that are maximally entangled in their polarization degree of freedom, |ψ± >= 1 √ 2 (|1 > |0 > ±|0 > |1 >). Since the reduced density matrices, ρA = trB{|ψ± >< ψ±|} are completely mixture, then one can not distinguish the state |ψ± > from each other by only access one qubit. Since the state |ψ± > are mutually orthogonal , a measurement on both qubit can perfectly distinguish the states form each other. Bob sends one of the photon (travel photon) to Alice and keeps another (home qubit). Alice can performs a unitary operation Uj,
منابع مشابه
Citronellyl Butyrate Synthesis in Non-Conventional Media Using Packed-Bed Immobilized Candida Rugosa Lipase Reactor
The synthesis of citronellyl butyrate by direct esterification reaction catalyzed by immobilized lipase from Candida rugosa was studied in a continuous packed bed reactor using n-hexane as organic solvent. Parameters such as residence time, temperature, and pH were examined. The optimum conversion was obtained at a flow rate of 1 ml/min (residence time 8 min), temperature of 50 °C, and pH 7.5. ...
متن کاملEavesdropping on the "ping-pong" quantum communication protocol.
Security of the "ping-pong" quantum communication protocol recently proposed by Boström and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can b...
متن کاملOn the Security of Ping-Pong Protocols when Implemented using the RSA
The Security of the RSA implementation of ping-pong protocols is considered. It is shown that the obvious RSA properties, such as "multiplicativity", do not endanger the security of ping-pong protocols. Namely, if a ping-pong protocol is secure in general then its implementation using an "ideal RSA" is also secure.
متن کاملOn the Security of the Ping-Pong Protocol
We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.
متن کاملBisubstrate Kinetic Model for Enzymatic Decolorization of Reactive Black 5 by Coprinus cinereus Peroxidase
In this study, decolorization of the diazo dye, Reactive Black 5 (RB5) in a Coprinus cinereus peroxidase-catalyzed reaction has been investigated. A bisubstate kinetic model for the reaction rate based on the Ping-Pong mechanism was assumed for the enzymatic decolorization. Experiment...
متن کامل