In this paper a quantum dialogue scheme is proposed by using N batches of single photons. The same secret message is encoded on each batch of single photons by the sender with two different unitary operations, and the...In this paper a quantum dialogue scheme is proposed by using N batches of single photons. The same secret message is encoded on each batch of single photons by the sender with two different unitary operations, and then the N batches of single photons are sent to the receiver. After eavesdropping check, the message is encoded on the one remaining batch by the receiver. It is shown that the intercept-and-resend attack and coupling auxiliary modes attack can be resisted more efficiently, because the photons are sent only once in our quantum dialogue scheme.展开更多
A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence ...A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence coding, local collective unitary operations, and entanglement swapping. In this protocol, during the process of trans- mission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using symmetric two-dimensional states. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping.展开更多
A quasi-secure quantum dialogue protocol using single photons was proposed. Different from the previous entanglement-based protocols, the present protocol uses batches of single photons which run back and forth betwee...A quasi-secure quantum dialogue protocol using single photons was proposed. Different from the previous entanglement-based protocols, the present protocol uses batches of single photons which run back and forth between the two parties. A round run for each photon makes the two parties each obtain a classical bit of information. So the efficiency of information transmission can be increased. The present scheme is practical and well within the present-day technology.展开更多
A multi-party quantum secret sharing protocol using two entangled states, φ0〉 = 1/√2 (1+)n + 1-)n) and (φ1)1) =1/√2 (1+)n -1-〉n), is proposed and analyzed. In this protocol, without requiring to gen...A multi-party quantum secret sharing protocol using two entangled states, φ0〉 = 1/√2 (1+)n + 1-)n) and (φ1)1) =1/√2 (1+)n -1-〉n), is proposed and analyzed. In this protocol, without requiring to generate any photon or do any local unitary operation, an agent can obtain a shadow of the secret key by simply performing a measurement of single photon. Furthermore, the security of the protocol is analyzed. It shows that no agent can obtain the manager's secret without the help of the other agents, and any eavesdropper will be detected if he/she tries to steal the manager's secret under ideal or noisy quantum channels.展开更多
基金Project supported by the Science Foundation of Yanbian University of China (Grant No 2005-20).
文摘In this paper a quantum dialogue scheme is proposed by using N batches of single photons. The same secret message is encoded on each batch of single photons by the sender with two different unitary operations, and then the N batches of single photons are sent to the receiver. After eavesdropping check, the message is encoded on the one remaining batch by the receiver. It is shown that the intercept-and-resend attack and coupling auxiliary modes attack can be resisted more efficiently, because the photons are sent only once in our quantum dialogue scheme.
文摘A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence coding, local collective unitary operations, and entanglement swapping. In this protocol, during the process of trans- mission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using symmetric two-dimensional states. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping.
基金Supported by the National Hi-Tech Research and Development Program of China (Grant No. 2006AA01Z419)the Major Research Plan of the National Natural Science Foundation of China (Grant No. 90604023)+2 种基金the National Research Foundation for the Doctoral Program of Higher Education of China (Grant No. 20040013007)the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601)the Open Foundation of the State Key Laboratory of Information Security, Graduate University of the Chinese Academy of Sciences
文摘A quasi-secure quantum dialogue protocol using single photons was proposed. Different from the previous entanglement-based protocols, the present protocol uses batches of single photons which run back and forth between the two parties. A round run for each photon makes the two parties each obtain a classical bit of information. So the efficiency of information transmission can be increased. The present scheme is practical and well within the present-day technology.
基金supported by the National Science Council of the Republic of China,Taiwan,China (Grant No. NSC 98-2221-E-006-097-MY3)
文摘A multi-party quantum secret sharing protocol using two entangled states, φ0〉 = 1/√2 (1+)n + 1-)n) and (φ1)1) =1/√2 (1+)n -1-〉n), is proposed and analyzed. In this protocol, without requiring to generate any photon or do any local unitary operation, an agent can obtain a shadow of the secret key by simply performing a measurement of single photon. Furthermore, the security of the protocol is analyzed. It shows that no agent can obtain the manager's secret without the help of the other agents, and any eavesdropper will be detected if he/she tries to steal the manager's secret under ideal or noisy quantum channels.