Deterministic Secure Direct Communication Using Ping-pong protocol without public channel

نویسنده

  • Qing-yu Cai
چکیده

Based on an EPR pair of qubits and allowing asymptotically secure key distribution, a secure communication protocol is presented. Bob sends either of the EPR pair qubits to Alice. Alice receives the travel qubit. Then she can encode classical information by local unitary operations on this travel qubit. Alice send the qubit back to Bob. Bob can get Alice’s information by measurement on the two photons in Bell operator basis. If Eve in line, she has no access to Bob’s home qubit. All her operations are restricted to the travel qubit. In order to find out which opeartion Alice performs, Eve’s operation must include measurements. The EPR pair qubits are destroyed. Bob’s measurement on the two photons in Bell operator basis can help him to judge whether Eve exist in line or not. In this protocal, a public channel is not necessary. PACS numbers: 03.67.Hk, 03.65.Ud, 03.67.Dd The idea of quantum cryptography was first proposed in the 1970s by Stephen Wiesner [1] and by Charles H. Bennett of IBM and Gilles Brassard of The University of Montreal [5]. The motive that we build quantum-mechanical communications channels is not only to transmit information securely without being eavesdropped on but also to transmit information more efficiently. We consider that quantum channel is secure because that quantum physics establishes a set of negative rules stating things that cannot be done [2]: (1) One cannot take a measurement without perturbing the system. (2) One cannot determine simultaneously the position and the momentum of a particle with arbitrarily high accuracy. (3) One cannot simultaneously measure the polarization of a photon in the verticalhorizontal basis and simultaneously in the diagonal basis. (4) One cannot draw pictures of individual quantum processes. (5) One cannot duplicate an unknown quantum state. These characters of quantum physics let us have ability to exchange information securely. As is well known, operations on one particle of an Einstein-Podolsky-Rosen (EPR) pair cannot influence the marginal statistics of measurements on the other particle. Let’s suppose that Bob have two photons which are maximally entangled in their polarization degree of freedom

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deterministic Secure Communication Using Quantum Nonlocality

Quantum key distribution (QKD) is a protocol which is provably secure, by which private bit can be created between two parties over a public channel. Based on the postulate of quantum measurement [1] and no-cloning theorem [2], different QKD protocol are presented [3]. However, these type of cryptographic schemes are usually nondeterministic. A Beige et al. have presented a quantum communicatio...

متن کامل

Improving the capacity of the ping-pong protocol

Since Bennett and Brassard presented the pioneer quantum key distribution (QKD) protocol in 1984 [1], there are a lot of theoretical QKD schemes [1-12] today. Recently, Beige et al. proposed a quantum secure direct communication scheme [13], which allows messages communicated directly without first establishing a random key to encrypt them. Bostroem and Felbingeer presented a ping-pong protocol...

متن کامل

Secure Bidirectional Quantum Communication Protocol without Quantum Channel

In this letter we propose a theoretical deterministic secure direct bidirectional quantum communication protocol by using swapping quantum entanglement and local unitary operations, in which the quantum channel for photon transmission can be discarded, hence any attack with or without eavesdropping or even the destructive attack without scruple is impossible. Much attention [1-6] has been focus...

متن کامل

Deterministic Secure Direct Communication Using single photon resource

Quantum key distribution is a brilliant application of quantum mechanics. Two remote parties establish a shared secret key through the transmission of quantum states. We consider that quantum channel is secure because that quantum physics establishes a set of negative rules stating things that cannot be done: (1) One cannot take a measurement without perturbing the system. (2) One cannot determ...

متن کامل

Attack the ‘ping-pong’ protocol without eavesdropping

Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...

متن کامل

Security of the quantum direct communication based on pairs of completely entangled qudits

Quantum secure direct communication protocols offer confidential transmission of classic information over the quantum channel without a prior key agreement. The ping-pong based protocols provide asymptotic security and detailed analysis of the security level provided by each variant of the protocol is required. The paper presents a general method of calculation of the eavesdropped information a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003