ID: quant-ph/0501130

Quantum secure conditional direct communication via EPR pairs

January 23, 2005

View on ArXiv

Similar papers 4

N-Partner Secure Direct Communication Based on Quantum Nonlocality

January 14, 2004

86% Match
LV Hua, Qing-Yu Cai
Quantum Physics

A multipartner secure direct communication protocol is presented, using quantum nonlocality. Security of this protocol is based on `High fidelity implies low entropy'. When the entanglement was successfully distributed, anyone of the multipartner can send message secretly by using local operation and reliable public channel. Since message transfered only by using local operation and public channel after entanglement successfully distributed, so this protocol can protect the c...

Find SimilarView on arXiv

Measurement-device-independent quantum key distribution with classical Bob and no joint measurement

August 11, 2021

86% Match
Guang Ping He
Quantum Physics

Measurement-device-independent quantum key distribution (MDI-QKD) provides a method for secret communication whose security does not rely on trusted measurement devices. In all existing MDI-QKD protocols, the participant Charlie has to perform the Bell state measurement or other joint measurements. Here we propose an MDI-QKD protocol which requires individual measurements only. Meanwhile, all operations of the receiver Bob are classical, without the need for preparing and mea...

Find SimilarView on arXiv

Efficient high-capacity quantum secret sharing with two-photon entanglement

February 18, 2006

86% Match
Fu-Guo Deng, Xi-Han Li, Hong-Yu Zhou
Quantum Physics

An efficient high-capacity quantum secret sharing scheme is proposed following some ideas in quantum dense coding with two-photon entanglement. The message sender, Alice prepares and measures the two-photon entangled states, and the two agents, Bob and Charlie code their information on their photons with four local unitary operations, which makes this scheme more convenient for the agents than others. This scheme has a high intrinsic efficiency for qubits and a high capacity.

Find SimilarView on arXiv

Securing quantum bit commitment through reverse quantum communication

December 28, 2001

86% Match
R. Srikanth
Quantum Physics

Einstein-Podolsky-Rosen- (EPR) and the more powerful Mayers-Lo-Chau attack impose a serious constraint on quantum bit commitment (QBC). As a way to circumvent them, it is proposed that the quantum system encoding the commitment chosen by the committer (Alice) should be initially prepared in a seperable quantum state known to and furnished by the acceptor (Bob), rather than Alice. Classical communication is used to conclude the commitment phase and bind Alice's subsequent unve...

Find SimilarView on arXiv

Secure direct bidirectional communication protocol using the Einstein-Podolsky-Rosen pair block

March 30, 2004

86% Match
Z. J. Zhang, Z. X. Man
Quantum Physics

In light of Deng-Long-Liu's two-step secret direct communication protocol using the Einstein-Podolsky-Rosen pair block [Phys. Rev. A {\bf 68}, 042317 (2003)], by introducing additional local operations for encoding, we propose a brand-new secure direct communication protocol, in which two legitimate users can simultaneously transmit their different secret messages to each other in a set of quantum communication device.

Find SimilarView on arXiv

Secure Bidirectional Communication Protocol without Quantum Channel

March 30, 2004

86% Match
Z. J. Zhang, Z. X. Man
Quantum Physics

In this letter we propose a theoretical deterministic secure direct bidirectional quantum communication protocol by using swapping quantum entanglement and local unitary operations, in which the quantum channel for photon transmission can be discarded, hence any attack with or without eavesdropping or even the destructive attack without scruple is impossible.

Find SimilarView on arXiv

Comment on "Controlled mutual quantum entity authentication using entanglement swapping"

September 19, 2015

86% Match
Gan Gao
Quantum Physics

Kang et al. [Chin. Phys. B 24 (2015) 090306] proposed a controlled mutual quantum entity authentication protocol. We find that the proposed protocol is not secure, that is, Charlie can eavesdrop the shared keys between Alice and Bob without being detected.

Find SimilarView on arXiv

Bidirectional quantum controlled teleportation by using EPR states and entanglement swapping

February 12, 2015

86% Match
Shima Hassanpour, Monireh Houshmand
Quantum Physics

In this paper, a novel protocol for bidirectional controlled quantum teleportation (BCQT) is proposed. Based on entanglement swapping of initiate Bell state, two users can teleport an unknown single-qubit state to each other under the permission of the supervisor. This proposed protocol would be utilized to a system in which a controller controls the communication in one direction only. Indeed, just one of the users needs the permission of the controller to reconstruct the un...

Find SimilarView on arXiv

Quantum Secure Direct Communication using Entanglement and Super Dense Coding

January 21, 2014

86% Match
Ola M. Hegazy, Ayman M. Bahaa-Eldin, Yasser H. Dakroury
Cryptography and Security

This paper introduces a new quantum protocol for secure direct communication. This protocol is based on Entanglement and Super-Dense coding. In this paper we present some basic definitions of entanglement in quantum mechanics, present how to use the maximally entangled states known as Bell States, and super dense coding technique to achieve secure direct message communication. Finally, we will apply some error models that could affect the transmission of the quantum data on t...

Find SimilarView on arXiv

Improving the security of quantum direct communication with authentication

April 18, 2006

86% Match
Zhan-jun Zhang
Quantum Physics

Two protocols of quantum direct communication with authentication [Phys. Rev. A {\bf 73}, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message of communication. The first protocol can be eavesdropped by Trent using the the intercept-measure-resend attack, while the second protocol can be eavesdropped by Trent using single-qubit measurement. To...

Find SimilarView on arXiv