摘要
Quantum system is inevitably affected by the external environment in the real world.Two controlled quantum dialogue protocols are put forward based on logicalχ-type states under collective noise environment.One is against collectivedephasing noise,while the other is against collective-rotation noise.Compared with existing protocols,there exist several outstanding advantages in our proposed protocols:Firstly,theχ-type state is utilized as quantum channels,it possesses better entanglement properties than GHZ state,W state as well as cluster state,which make it difficult to be destroyed by local operations.Secondly,two kinds of logicalχ-type states are constructed by us in theory,which can be perfectly immune to the effects of collective noise.Thirdly,the controller can be offline after quantum distribution and permission announcement,without waiting for all the participants to complete the information coding.Fourthly,the security analysis illuminates that our protocols can not only be free from the information leakage,but also resist against the interceptand-resend attack,the entanglement-and-measure attack,the modification attack,the conspiring attack,and especially the dishonest controller’s attacks.
Quantum system is inevitably affected by the external environment in the real world. Two controlled quantum dialogue protocols are put forward based on logical χ-type states under collective noise environment. One is against collectivedephasing noise, while the other is against collective-rotation noise. Compared with existing protocols, there exist several outstanding advantages in our proposed protocols: Firstly, the χ-type state is utilized as quantum channels, it possesses better entanglement properties than GHZ state, W state as well as cluster state, which make it difficult to be destroyed by local operations. Secondly, two kinds of logical χ-type states are constructed by us in theory, which can be perfectly immune to the effects of collective noise. Thirdly, the controller can be offline after quantum distribution and permission announcement, without waiting for all the participants to complete the information coding. Fourthly, the security analysis illuminates that our protocols can not only be free from the information leakage, but also resist against the interceptand-resend attack, the entanglement-and-measure attack, the modification attack, the conspiring attack, and especially the dishonest controller’s attacks.
作者
常利伟
张宇青
田晓雄
钱宇华
郑世慧
Li-Wei Chang;Yu-Qing Zhang;Xiao-Xiong Tian;Yu-Hua Qian;Shi-Hui Zheng(College of Information,Shanxi University of Finance and Economics,Taiyuan 030006,China;Institute of Big Data Science and Industry,Shanxi University,Taiyuan 030006,China;School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China)
基金
Project supported by the National Natural Science Foundation of China(Grant No.61502048)
the Natural Science Foundation of Shanxi Province of China(Grant No.201801D221159)
the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi Province of China(Grant No.2019L0470)
Youth Research Foundation of Shanxi University of Finance and Economics in Shanxi Province of China(Grant No.QN-2016009)