Deterministic secure quantum communication using a single d-level system

نویسندگان

  • Dong Jiang
  • Yuanyuan Chen
  • Xuemei Gu
  • Ling Xie
  • Lijun Chen
چکیده

Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deterministic Secure Communication Using Quantum Nonlocality

Quantum key distribution (QKD) is a protocol which is provably secure, by which private bit can be created between two parties over a public channel. Based on the postulate of quantum measurement [1] and no-cloning theorem [2], different QKD protocol are presented [3]. However, these type of cryptographic schemes are usually nondeterministic. A Beige et al. have presented a quantum communicatio...

متن کامل

A novel secure communication protocol

Quantum key distribution (QKD) is a protocol which is provably secure. Eve cannot gain any information from the qubits transmitted from Alice to Bob without disturbing their state. First , the no-cloning theorem forbids Eve to perfectly clone Alice’s qubit. Second, in any attempt to distinguish between two non-orthogonal quantum states, information gain is only possible at the expense of introd...

متن کامل

Confidential Deterministic Quantum Communication Using Three Quantum States

A secure quantum deterministic communication protocol is described. The protocol is based on transmission of quantum states from unbiased bases and exploits no entanglement. It is composed form two main components: a quantum quasi secure quantum communication supported by a suitable classical message preprocessing layer. Contrary to many others propositions, it does not require large quantum re...

متن کامل

On the "Deterministic Secure Quantum Communication using Four-Particle Entangled State and Entanglement Swapping"

Recently, Xiu et al. proposed a deterministic secure quantum communication (DSQC) protocol using the entanglement swapping of four-particle genuine entangled states. Later, Qin et al. showed a double-CNOT attack on the protocol and also provided an improvement to avoid the attack. This work tries to use a batch of decoy single photons prepared randomly in one of four different states, to enhanc...

متن کامل

Deterministic secure communication protocol

Quantum key distribution (QKD) is a protocol which is provably secure, by which private key bit can be created between two parties over a public channel. The key bits can then be used to implement a classical private key cryptosystem, to enable the parties to communicate securely. The basic idea behind QKD is that Eve cannot gain any information from the qubits transmitted from Alice to Bob wit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2017