A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

  • In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two.
      PCAS:
  • 加载中
  • [1] Bennett C H, Brassard G. Proc. IEEE Int. Conf. on Com- puter, Systems, and Signal Processing, Bangalore, India. IEEE, New York, 1984. 175-1792 Bennett C H, Brassard G, Crepeau C et al. Phys. Rev. Lett., 1993, 70: 1895-18993 Bouwmeester D, Pan J W, Mattle K et al. Nature, 1997, 390: 575-5794 Bouwmeester D, Mattle K, Pan J W et al. Appl. Phys. B, 1998, 67: 749-7525 Kim Y H, Kulik S P, Shih Y. Quantum Electronics and Laser Science Conference, 2001. 223-2266 Prakash H. International Conference on Emerging Trends in Electronic and Photonic Devices Systems, 2009. 18-237 Furusawa A. Quantum Electronics and Laser Science Con- ference, 20108 Bennett C H, Wiesner S J. Phys. Rev. Lett., 1992, 69: 2881-28849 Mattle K, Weinfurter H, Kwiat P G et al. Phys. Rev. Lett., 1996, 76: 4656-465910 Hillery M, Buzek V, Berthiaume A. Phys. Rev. A, 1999, 59: 1829-183411 Cleve R, Gottesman D, Lo H K. Phys. Rev. Lett., 1999, 83: 648-65112 LI Chun-Yan, ZHOU Hong-Yu, Wang Yan et al. Chinese Physics Letters, 2005, 22(5): 1049-105213 LI Chun-Yan, LI Xi-Han, DENG Fu-Guo et al. Chinese Physics Letters, 2006, 23(11): 289614 Beige A, Englert B G, Kurtsiefer C et al. Acta Phys. A, 2002, 101: 357-37015 Bostrom K, Felbringer T. Phys. Rev. Lett., 2002, 89: 18790216 LONG Gui-Lu, LIU Xiao-Shu. Phys. Rev. A, 2002, 65(3): 03230217 DENG Fu-Guo, LONG Gui-Lu, LIU Xiao-Shu. Phys. Rev. A, 2003, 68: 04231718 DENG Fu-Guo, LONG Gui-Lu. Phys. Rev. A, 2004, 69: 05231919 GAO Fei, GUO Fen-Zhuo, WEN Qiao-Yan et al. Sci. China Ser G-Phys Mech. Astron, 2009, 39(2): 161-166 (in Chi- nese)20 LONG Gui-Lu, DENG Fu-Guo, WANG C et al. Front. Phys. China, 2007, 2(3): 251-27221 CAi Qing-Yu, LI Bai-Wen. Chinese Physics Letters, 2004, 21: 601-60322 LIANG Hao, CHUAN Wang, LONG Gui-Lu. J. Phys. B: At. Mol. Opt. Phys., 2010, 43: 12550223 CAI Qing-Yu, LI Bai-Wen. Phys. Rev. A, 2004, 69: 05430124 GAO Ting, YAN Feng-Li, WANG Zhi-Xi. Chinese Physics Letters, 2005, 22: 2473-247625 WANG Chuan, DENG Fu-Guo, LONG Gui-Lu. Optical Communications, 2005, 253: 15-2026 LI Xi-Han, DENG Fu-Guo, ZHOU Hong-Yu. Phys. Rev. A, 2006, 74: 05430227 LI Xi-Han, LI Chun-Yan, DENG Fu-Guo et al. Chinese Physics Letters, 2007, 16: 2149-215328 KAI Wen, LONG Gui-Lu. International Journal of Quan- tum Information, 2010, 8(4): 69729 MAN Zhong-Xiao, XIA Yun-Jie, Nguyen B A. J Phys. B-At Mol. Opt. Phys., 2006, 39: 3855-386330 MAN Zhong-Xiao, XIA Yun-Jie. Chinese Physics Letters, 2006, 23: 1680-168231 JIN Xing-Ri, JI Xin, ZHANG Ying-Qiao et al. Phys. Lett. A, 2006, 354: 67-7032 MAN Zhong-Xiao, XIA Yun-Jie. Chinese Physics Letters, 2007, 24: 15-1833 CHEN Yan, MAN Zhong-Xiao, XIA Yun-Jie. Chinese Physics Letters, 2007, 24: 19-2234 GU Bin, PEI Shi-Xin, SONG Biao et al. Science in China Series G-Physics Mechanics Astronomy, 2009, 52(12): 1913-1918
  • 加载中

Get Citation
LI Jian, SONG Dan-Jie, GUO Xiao-Jing and JING Bo. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation[J]. Chinese Physics C, 2012, 36(1): 31-36. doi: 10.1088/1674-1137/36/1/005
LI Jian, SONG Dan-Jie, GUO Xiao-Jing and JING Bo. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation[J]. Chinese Physics C, 2012, 36(1): 31-36.  doi: 10.1088/1674-1137/36/1/005 shu
Milestone
Received: 2011-03-28
Revised: 2011-05-03
Article Metric

Article Views(2563)
PDF Downloads(441)
Cited by(0)
Policy on re-use
To reuse of subscription content published by CPC, the users need to request permission from CPC, unless the content was published under an Open Access license which automatically permits that type of reuse.
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Email This Article

Title:
Email:

A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

Abstract: In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two.

    HTML

Reference (1)

目录

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return