Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Quantum secure direct communication protocol based on the mixture of Bell state particles and single photons

Cao Zheng-Wen Zhao Guang Zhang Shuang-Hao Feng Xiao-Yi Peng Jin-Ye

Citation:

Quantum secure direct communication protocol based on the mixture of Bell state particles and single photons

Cao Zheng-Wen, Zhao Guang, Zhang Shuang-Hao, Feng Xiao-Yi, Peng Jin-Ye
PDF
Get Citation

(PLEASE TRANSLATE TO ENGLISH

BY GOOGLE TRANSLATE IF NEEDED.)

  • By studying the properties of the mixture of Bell state particles and single photons,in the paper we design a quantum code scheme with high coding capacity,and propose a novel quantum secure direct communication protocol with high transmission efficiency.Alice prepares Bell state particles and single photons,and divides Bell state particles into two sequences SA and SB.SB is sent to Bob for the first security check through using quantum correlation properties of particles.When the check result shows that the quantum channel is safe,by using the designed quantum code scheme, Alice encodes her classical message on the mixed quantum state sequence of Bell sequence SA and single photon sequence SS.Then,some single photons that are used for security check are re-inserted randomly into the encoded sequence,and the order of particles is rearranged to ensure checking Eve's attack.Alice sends the new sequence to Bob.Bob delays and receives it.And then,the quantum channel conducts the second-time security check.The transmission error rate is calculated,and if the error rate is lower than the tolerance threshold,the channel is safe.Bob decodes and reads Alice's message.The first security check is to determine whether quantum channel is safe.The second security check is to test whether there are eavesdroppers during information transmission.Safety analysis is done by applying the quantum information theory for the proposed protocol.The error rate introduced by Eve and the amount of information by Eve are calculated.It is shown that this pro-tocol can effectively resist measurement-resend attack,intercept-resend attack, auxiliary particle attack,denial of service attack and Trojan attack.Among them,auxiliary particle attack is analyzed in detail.The transmission efficiency and coding capacity are also analyzed.The transmission efficiency is 2,the quantum bit rate is 1,and the coding capacity is that a quantum state can encode three bits of classical messages.We also compare the proposed protocol with many existing popular protocols in the sense of efficiency,e.g.,Ping-Pong protocol, Deng F G et al.'s two-step and one-pad-time quantum secure direct communication protocol,Wang J et al.'s quantum secure direct communication protocol based on entanglement swapping and Quan D X et al.'s one-way quantum secure direct communication protocol based on single photon.It is proved that this proposed protocol has higher transmission efficiency.In addition,neither complex U operation nor entanglement swapping is used,and implementation process is simplified.However,this protocol is devoted to theoretical research of quantum secure direct communication.There are still some difficulties in the practical application.For example,the storage technology of quantum states is not mature at present.It is not easy to prepare and measure Bell state particles nor to combine them with single photons,and so on.The implementation of this protocol depends on the development of quantum technology in the future.
      Corresponding author: Cao Zheng-Wen, caozhw@nwu.edu.cn
    • Funds: Project supported by the Natural Science Foundation of Shaanxi Province,China (Grant No. 2013JM8036).
    [1]

    Bennett C H, Brassard G 1984 Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (New York:IEEE Press) p175

    [2]

    Ekert A K 1991 Phys. Rev. Lett. 67 661

    [3]

    Wang X B 2005 Phys. Rev. A 72 012322

    [4]

    Long G L, Liu X S 2002 Phys. Rev. A 65 032302

    [5]

    Beige A, Englert B G, Kurtsiefer C 2002 J. Phys. A:Math. Gen. 35 L407

    [6]

    Bostrom K, Felbinger T 2002 Phys. Rev. Lett. 89 187902

    [7]

    Cai Q Y, Li B W 2004 Phys. Rev. A 69 054301

    [8]

    Deng F G, Long G L, Liu X S 2003 Phys. Rev. A 68 042317

    [9]

    Deng F G, Long G L 2004 Phys. Rev. A 69 052319

    [10]

    Wang C, Deng F G, Li Y S 2005 Phys. Rev. A 71 044305

    [11]

    Wang J, Zhang Q, Tang C J 2006 Phys. Lett. A 358 256

    [12]

    Wang J, Chen H Q, Zhang Q, Tang C J 2007 Journal of National University of Defense Technology 29 56 (in Chinese)[王剑, 陈皇卿, 张权等, 唐朝京2007国防科技大学学报29 56]

    [13]

    Wang J, Chen H Q, Zhang Q, Tang C J 2007 Acta Phys. Sin. 56 673 (in Chinese)[王剑, 陈皇卿, 张权, 唐朝京2007物理学报56 673]

    [14]

    Wang T Y, Qin H J, Wen Q Y, Zhu P C 2008 Acta Phys. Sin. 57 7452 (in Chinese)[王天银, 秦海娟, 温巧燕, 朱甫臣2008物理学报57 7452]

    [15]

    Quan D X, Pei C X, Liu D, Zhao N 2010 Acta Phys. Sin. 59 2493 (in Chinese)[权东晓, 裴昌辛, 刘丹, 赵楠2010物理学报59 2493]

    [16]

    Li K, Huang X Y, Teng J H, Li Z H 2012 Journal of Electronics Information Technology 34 1917 (in Chinese)[李凯, 黄晓英, 滕吉红, 李振华2012电子与信息学报34 1917]

    [17]

    Li X H, Deng F G, Zhou H Y 2006 Phys. Rev. A 74 054302

    [18]

    Cai Q Y 2006 Phys. Lett. A 351 23

    [19]

    Wang J, Zhang S, Zhang Q, Zhang S L 2009 Journal of National University of Defense Technology 31 51 (in Chinese)[王剑, 张盛, 张权, 张盛林2009国防科技大学学报31 51]

  • [1]

    Bennett C H, Brassard G 1984 Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (New York:IEEE Press) p175

    [2]

    Ekert A K 1991 Phys. Rev. Lett. 67 661

    [3]

    Wang X B 2005 Phys. Rev. A 72 012322

    [4]

    Long G L, Liu X S 2002 Phys. Rev. A 65 032302

    [5]

    Beige A, Englert B G, Kurtsiefer C 2002 J. Phys. A:Math. Gen. 35 L407

    [6]

    Bostrom K, Felbinger T 2002 Phys. Rev. Lett. 89 187902

    [7]

    Cai Q Y, Li B W 2004 Phys. Rev. A 69 054301

    [8]

    Deng F G, Long G L, Liu X S 2003 Phys. Rev. A 68 042317

    [9]

    Deng F G, Long G L 2004 Phys. Rev. A 69 052319

    [10]

    Wang C, Deng F G, Li Y S 2005 Phys. Rev. A 71 044305

    [11]

    Wang J, Zhang Q, Tang C J 2006 Phys. Lett. A 358 256

    [12]

    Wang J, Chen H Q, Zhang Q, Tang C J 2007 Journal of National University of Defense Technology 29 56 (in Chinese)[王剑, 陈皇卿, 张权等, 唐朝京2007国防科技大学学报29 56]

    [13]

    Wang J, Chen H Q, Zhang Q, Tang C J 2007 Acta Phys. Sin. 56 673 (in Chinese)[王剑, 陈皇卿, 张权, 唐朝京2007物理学报56 673]

    [14]

    Wang T Y, Qin H J, Wen Q Y, Zhu P C 2008 Acta Phys. Sin. 57 7452 (in Chinese)[王天银, 秦海娟, 温巧燕, 朱甫臣2008物理学报57 7452]

    [15]

    Quan D X, Pei C X, Liu D, Zhao N 2010 Acta Phys. Sin. 59 2493 (in Chinese)[权东晓, 裴昌辛, 刘丹, 赵楠2010物理学报59 2493]

    [16]

    Li K, Huang X Y, Teng J H, Li Z H 2012 Journal of Electronics Information Technology 34 1917 (in Chinese)[李凯, 黄晓英, 滕吉红, 李振华2012电子与信息学报34 1917]

    [17]

    Li X H, Deng F G, Zhou H Y 2006 Phys. Rev. A 74 054302

    [18]

    Cai Q Y 2006 Phys. Lett. A 351 23

    [19]

    Wang J, Zhang S, Zhang Q, Zhang S L 2009 Journal of National University of Defense Technology 31 51 (in Chinese)[王剑, 张盛, 张权, 张盛林2009国防科技大学学报31 51]

  • [1] Zhou Xian-Tao, Jiang Ying-Hua. Quantum secure direct communication scheme with identity authentication. Acta Physica Sinica, 2023, 72(2): 020302. doi: 10.7498/aps.72.20221684
    [2] Zhou Xian-Tao, Jiang Ying-Hua, Guo Xiao-Jun, Peng Zhan. Quantum secure direct communication scheme based on the mixture of single photon and Bell state with two way authentication. Acta Physica Sinica, 2023, 72(13): 130302. doi: 10.7498/aps.72.20221972
    [3] Zhao Liang-Chao. Transmission efficiency and beam reception of the SESRI 300 MeV synchrotron injection line. Acta Physica Sinica, 2022, 71(11): 112901. doi: 10.7498/aps.71.20212112
    [4] Zhao Ning, Jiang Ying-Hua, Zhou Xian-Tao. Efficient quantum secure direct communication scheme based on single photons. Acta Physica Sinica, 2022, 71(15): 150304. doi: 10.7498/aps.71.20220202
    [5] Wei Yu-Yan, Gao Zi-Kai, Wang Si-Ying, Zhu Ya-Jing, Li Tao. Deterministic secure quantum communication with double-encoded single photons. Acta Physica Sinica, 2022, 71(5): 050302. doi: 10.7498/aps.71.20210907
    [6] Wang Ming-Yu, Wang Xin-De, Ruan Dong, Long Gui-Lu. Quantum direct portation. Acta Physica Sinica, 2021, 70(19): 190301. doi: 10.7498/aps.70.20210837
    [7] Deterministic secure quantum communication with double-encoded single photons. Acta Physica Sinica, 2021, (): . doi: 10.7498/aps.70.20210907
    [8] Shang Xiang-Jun, Ma Ben, Chen Ze-Sheng, Yu Ying, Zha Guo-Wei, Ni Hai-Qiao, Niu Zhi-Chuan. Physics and devices of quanutm light emission from semicoductor self-assembled quantum Dots. Acta Physica Sinica, 2018, 67(22): 227801. doi: 10.7498/aps.67.20180594
    [9] Yang Lu, Ma Hong-Yang, Zheng Chao, Ding Xiao-Lan, Gao Jian-Cun, Long Gui-Lu. Quantum communication scheme based on quantum teleportation. Acta Physica Sinica, 2017, 66(23): 230303. doi: 10.7498/aps.66.230303
    [10] Liu Zhi-Hao, Chen Han-Wu. Information leakage problem in quantum secure direct communication protocol based on the mixture of Bell state particles and single photons. Acta Physica Sinica, 2017, 66(13): 130304. doi: 10.7498/aps.66.130304
    [11] Ma Hong-Yang, Qin Guo-Qing, Fan Xing-Kui, Chu Peng-Cheng. Quantum network direct communication protocol over noisy channel. Acta Physica Sinica, 2015, 64(16): 160306. doi: 10.7498/aps.64.160306
    [12] Ke Xi-Zheng, Nu Ning, Yang Qin-Ling. Research of transmission characteristics of single-photon orbital angular momentum. Acta Physica Sinica, 2010, 59(9): 6159-6163. doi: 10.7498/aps.59.6159
    [13] Quan Dong-Xiao, Pei Chang-Xing, Liu Dan, Zhao Nan. One-way deterministic secure quantum communication protocol based on single photons. Acta Physica Sinica, 2010, 59(4): 2493-2497. doi: 10.7498/aps.59.2493
    [14] Wang Tian-Yin, Qin Su-Juan, Wen Qiao-Yan, Zhun Fu-Chen. Analysis and improvement of multiparty controlled quantum secure direct communication protocol. Acta Physica Sinica, 2008, 57(12): 7452-7456. doi: 10.7498/aps.57.7452
    [15] Wang Jian, Chen Huang-Qing, Zhang Quan, Tang Chao-Jing. Multiparty controlled quantum secure direct communication protocol. Acta Physica Sinica, 2007, 56(2): 673-677. doi: 10.7498/aps.56.673
    [16] Wu Peng-Ju, Li Yu-De, Lin Xiao-Yan, Liu An-Dong, Sun Tian-Xi. Simulation of x-ray transmission through a capillary. Acta Physica Sinica, 2005, 54(10): 4478-4482. doi: 10.7498/aps.54.4478
    [17] Feng MingMing, Qin XiaoLin, Zhou ChunYuan, Xiong Li, Ding LiangEn. Quantum random number generator based on polarization. Acta Physica Sinica, 2003, 52(1): 72-76. doi: 10.7498/aps.52.72
    [18] LIANG CHUANG, FU DONG-HAO, LIANG BING, LIAO JING, WU LING-AN, YAO DE-CHENG, Lü SHU-WANG. QUANTUM KEY DISTRIBUTION OVER 1.1km IN AN 850nm EXPERIMENTAL ALL-FIBER SYSTEM. Acta Physica Sinica, 2001, 50(8): 1429-1433. doi: 10.7498/aps.50.1429
    [19] LIAO JING, LIANG CHUANG, WEI YA-JUN, WU LING-AN, PAN SHAO-HUA, YAO DE-CHENG. TRUE RANDOM NUMBER GENERATOR BASED ON A PHOTON BEAMSPLITTER. Acta Physica Sinica, 2001, 50(3): 467-472. doi: 10.7498/aps.50.467
    [20] KUANG JING-YU, DENG KUN, HUANG RONG-HAI. AN ENCRYPTION APPROACH TO DIGITAL COMMUNICATION BY USING SPATIOTEMPORAL CHAOS SYNCHRONIZATION. Acta Physica Sinica, 2001, 50(10): 1856-1861. doi: 10.7498/aps.50.1856
Metrics
  • Abstract views:  6174
  • PDF Downloads:  407
  • Cited By: 0
Publishing process
  • Received Date:  28 May 2016
  • Accepted Date:  30 August 2016
  • Published Online:  05 December 2016

/

返回文章
返回