In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first sc...In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed.展开更多
A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein- Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded direc...A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein- Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded directly on the first particles of the prepared Bell states by simple unitary operations and decoded by performing the Bell-basis measurement after the additional classic information is exchanged. In addition, the strategy with two-step transmission of quantum data blocks and the technique of decoy-particle checking both are exploited to guarantee the security of the communication. Compared with some previous DSQC schemes, this scheme not oniy has a higher resource capacity, intrinsic efficiency and total efficiency, but also is more realizable in practical applications. Security anaJysis shows that the proposed scheme is unconditionally secure against various attacks over an ideal quantum channel and still conditionally robust over a noisy and lossy quantum channel.展开更多
基金Supported by the National Fundamental Research Program under Grant No.2010CB923202Specialized Research Fund for the Doctoral Program of Education Ministry of China under Grant No.20090005120008+1 种基金 the Fundamental Research Funds for the Central Universities under Grant No.BUPT2009RC0710 China National Natural Science Foundation under Grant Nos.60871082,60937003 and 10947151
文摘In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed.
基金Supported by the National Natural Science Foundation of China under Grant No.61272501the National Key Basic Research Program(NKBRP)(973 program)(2012CB315905)the Beijing Natural Science Foundation under Grant No.4132056
文摘A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein- Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded directly on the first particles of the prepared Bell states by simple unitary operations and decoded by performing the Bell-basis measurement after the additional classic information is exchanged. In addition, the strategy with two-step transmission of quantum data blocks and the technique of decoy-particle checking both are exploited to guarantee the security of the communication. Compared with some previous DSQC schemes, this scheme not oniy has a higher resource capacity, intrinsic efficiency and total efficiency, but also is more realizable in practical applications. Security anaJysis shows that the proposed scheme is unconditionally secure against various attacks over an ideal quantum channel and still conditionally robust over a noisy and lossy quantum channel.