|
|
A quantum secure direct communication scheme based on intermediate-basis |
Kexin Liang1,2, Zhengwen Cao1,2(), Xinlei Chen1, Lei Wang1, Geng Chai1(), Jinye Peng1 |
1. Laboratory of Quantum Information & Technology (QIT), School of Information Science and Technology, Northwest University, Xi’an 710127, China 2. State Key Laboratory of Integrated Services Networks (Xidian University), Xi’an 710071, China |
|
|
Abstract Quantum secure direct communication (QSDC) is a method of communication that transmits secret information directly through a quantum channel. This paper proposes a two-step QSDC scheme based on intermediate-basis, in which the intermediate-basis Einstein−Podolsky−Rosen (EPR) pairs can assist to detect channel security and help encode information. Specifically, the intermediate-basis EPR pairs reduce the probability of Eve choosing the correct measurement basis in the first step, enhancing the security of the system. Moreover, they encode information together with information EPR pairs to improve the transmission efficiency in the second step. We consider the security of the protocol under coherent attack when Eve takes different dimensions of the auxiliary system. The simulation results show that intermediate-basis EPR pairs can lower the upper limit of the amount of information that Eve can steal in both attack scenarios. Therefore, the proposed protocol can ensure that the legitimate parties get more confidential information and improve the transmission efficiency.
|
Keywords
quantum secure direct communication
two-step
intermediate-basis
|
Corresponding Author(s):
Zhengwen Cao,Geng Chai
|
About author: *These authors equally shared correspondence to this manuscript. |
Issue Date: 28 April 2023
|
|
1 |
W. Shor P., Algorithms for quantum computation: Discrete logarithms and factoring, Proceedings of 35th Annual Symposium on Foundations of Computer Science, 1994, pp 124–134
|
2 |
L. Rivest R. , Shamir A. , Adleman L. . A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 1978, 21(2): 120
https://doi.org/10.1145/359340.359342
|
3 |
H. Bennett C. , Brassard G. . Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci., 2014, 560: 7
https://doi.org/10.1016/j.tcs.2014.05.025
|
4 |
Srikara S. , Thapliyal K. , Pathak A. . Continuous variable direct secure quantum communication using Gaussian states. Quantum Inform. Process., 2020, 19(4): 132
https://doi.org/10.1007/s11128-020-02627-3
|
5 |
Bouwmeester D. , W. Pan J. , Mattle K. , Eibl M. , Weinfurter H. , Zeilinger A. . Experimental quantum teleportation. Nature, 1997, 390(6660): 575
https://doi.org/10.1038/37539
|
6 |
L. Long G. , S. Liu X. . Theoretically efficient high-capacity quantum-key distribution scheme. Phys. Rev. A, 2002, 65(3): 032302
https://doi.org/10.1103/PhysRevA.65.032302
|
7 |
C. Zhang Y. , Chen Z. , Pirandola S. , Wang X. , Zhou C. , Chu B. , Zhao Y. , Xu B. , Yu S. , Guo H. . Long-distance continuous-variable quantum key distribution over 202.81 km fiber. Phys. Rev. Lett., 2020, 125(1): 010502
https://doi.org/10.1103/PhysRevLett.125.010502
|
8 |
Lucamarini M. , L. Yuan Z. , F. Dynes J. , J. Shields A. . Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature, 2018, 557(7705): 400
https://doi.org/10.1038/s41586-018-0066-6
|
9 |
Furusawa A. , L. Srensen J. , L. Braunstein S. , A. Fuchs C. , J. Kimble H. , S. Polzik E. . Unconditional quantum teleportation between distant solid-state quantum bits. Science, 1998, 345(6196): 532
|
10 |
Pirandola S. , Eisert J. , Weedbrook C. , Furusawa A. , L. Braunstein S. . Advances in quantum teleportation. Nat. Photonics, 2015, 9(10): 641
https://doi.org/10.1038/nphoton.2015.154
|
11 |
Zawadzki P. . Advances in quantum secure direct communication. IET Quantum Commun., 2021, 2(2): 54
https://doi.org/10.1049/qtc2.12009
|
12 |
G. Deng F. , L. Long G. , S. Liu X. . Two-step quantum direct communication protocol using the Einstein−Podolsky−Rosen pair block. Phys. Rev. A, 2003, 68(4): 042317
https://doi.org/10.1103/PhysRevA.68.042317
|
13 |
G. Deng F. , L. Long G. . Secure direct communication with a quantum one-time pad. Phys. Rev. A, 2004, 69(5): 052319
https://doi.org/10.1103/PhysRevA.69.052319
|
14 |
Wu J. , Lin Z. , Yin L. , L. Long G. . Security of quantum secure direct communication based on Wyners wiretap channel theory. Quantum Eng., 2019, 1(4): e26
https://doi.org/10.1002/que2.26
|
15 |
Qi R. , Sun Z. , Lin Z. , Niu P. , Hao W. , Song L. , Huang Q. , Gao J. , Yin L. , L. Long G. . Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl., 2019, 8(1): 22
https://doi.org/10.1038/s41377-019-0132-3
|
16 |
Ye Z. , Pan D. , Sun Z. , Du C. , L. Long G. . Generic security analysis framework for quantum secure direct communication. Front. Phys., 2020, 16(2): 1
|
17 |
Y. Hu J. , Yu B. , Y. Jing M. , T. Xiao L. , T. Jia S. , Q. Qin G. , L. Long G. . Experimental quantum secure direct communication with single photons. Light Sci. Appl., 2016, 5(9): e16144
https://doi.org/10.1038/lsa.2016.144
|
18 |
Zhang W. , S. Ding D. , B. Sheng Y. , Zhou L. , S. Shi B. , C. Guo G. . Quantum secure direct communication with quantum memory. Phys. Rev. Lett., 2017, 118(22): 220501
https://doi.org/10.1103/PhysRevLett.118.220501
|
19 |
Zhu F. , Zhang W. , B. Sheng Y. , D. Huang Y. . Experimental long-distance quantum secure direct communication. Sci. Bull. (Beijing), 2017, 62(22): 1519
https://doi.org/10.1016/j.scib.2017.10.023
|
20 |
Sun Z.Qi R.Lin Z.Yin L.Long G.Lu J., Design and implementation of a practical quantum secure direct communication system, 2018 IEEE Globecom Workshops (GC Wkshps), 18472318 (2018)
|
21 |
R. Zhou Z. , B. Sheng Y. , H. Niu P. , Yin L. , L. Long G. , Hanzo L. . Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron., 2020, 63(3): 230362
https://doi.org/10.1007/s11433-019-1450-8
|
22 |
Li T. , K. Gao Z. , H. Li Z. . Measurement-device–independent quantum secure direct communication: Direct quantum communication with imperfect measurement device and untrusted operator. Europhys. Lett., 2020, 131(6): 60001
https://doi.org/10.1209/0295-5075/131/60001
|
23 |
H. Niu P. , W. Wu J. , G. Yin L. , L. Long G. . Security analysis of measurement-device-independent quantum secure direct communication. Quantum Inform. Process., 2020, 19(10): 356
https://doi.org/10.1007/s11128-020-02840-0
|
24 |
Gao Z. , Ma M. , Liu T. , Long J. , Li T. , Li Z. . Free-space quantum secure direct communication based on decoherence-free space. J. Opt. Soc. Am. B, 2020, 37(10): 3028
https://doi.org/10.1364/JOSAB.397973
|
25 |
Pan D. , Lin Z. , Wu J. , Zhang H. , Sun Z. , Ruan D. , Yin L. , L. Long G. . Experimental free-space quantum secure direct communication and its security analysis. Photon. Res., 2020, 8(9): 1522
https://doi.org/10.1364/PRJ.388790
|
26 |
F. Zou X. , W. Qiu D. . Three-step semiquantum secure direct communication protocol. Sci. China Phys. Mech. Astron., 2014, 57(9): 1696
https://doi.org/10.1007/s11433-014-5542-x
|
27 |
Rong Z. , Qiu D. , Mateus P. , F. Zou X. . Mediated semi-quantum secure direct communication. Quantum Inform. Process., 2021, 20(2): 58
https://doi.org/10.1007/s11128-020-02965-2
|
28 |
Rong Z. , Qiu D. , Zou X. . Two single-state semi-quantum secure direct communication protocols based on single photons. Int. J. Mod. Phys. B, 2020, 34(11): 2050106
https://doi.org/10.1142/S0217979220501064
|
29 |
Rong Z. , Qiu D. , Zou X. . Semi-quantum secure direct communication using entanglement. Int. J. Theor. Phys., 2020, 59(6): 1807
https://doi.org/10.1007/s10773-020-04447-8
|
30 |
Chai G. , W. Cao Z. , Q. Liu W. , H. Zhang M. , X. Liang K. , Y. Peng J. . Novel continuous-variable quantum secure direct communication and its security analysis. Laser Phys. Lett., 2019, 16(9): 095207
https://doi.org/10.1088/1612-202X/ab3a2b
|
31 |
W. Cao Z. , Wang L. , X. Liang K. , Chai G. , Y. Peng J. . Continuous-variable quantum secure direct communication based on Gaussian mapping. Phys. Rev. Appl., 2021, 16(2): 024012
https://doi.org/10.1103/PhysRevApplied.16.024012
|
32 |
Pirandola S. , L. Andersen U. , Banchi L. , Berta M. , Bunandar D. , Colbeck R. , Englund D. , Gehring T. , Lupo C. , Ottaviani C. , L. Pereira J. , Razavi M. , Shamsul Shaari J. , Tomamichel M. , C. Usenko V. , Vallone G. , Villoresi P. , Wallden P. . Advances in quantum cryptography. Adv. Opt. Photonics, 2020, 12(4): 1012
https://doi.org/10.1364/AOP.361502
|
33 |
K. Ekert A. . Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett., 1991, 67(6): 661
https://doi.org/10.1103/PhysRevLett.67.661
|
34 |
Collins D. , Gisin N. . A relevant two qubit Bell inequality inequivalent to the CHSH inequality. J. Phys. Math. Gen., 2004, 37(5): 1775
https://doi.org/10.1088/0305-4470/37/5/021
|
35 |
Khrennikov A. . CHSH inequality: Quantum probabilities as classical conditional probabilities. Found. Phys., 2015, 45(7): 711
https://doi.org/10.1007/s10701-014-9851-8
|
36 |
Leung-Yan-Cheong S. , Hellman M. . The Gaussian wire-tap channel. IEEE Trans. Inf. Theory, 1978, 24(4): 451
https://doi.org/10.1109/TIT.1978.1055917
|
37 |
Cai N. , Winter A. , W. Yeung R. . Quantum privacy and quantum wiretap channels. Probl. Inf. Transm., 2004, 40(4): 318
https://doi.org/10.1007/s11122-005-0002-x
|
38 |
Devetak I. . The private classical capacity and quantum capacity of a quantum channel. IEEE Trans. Inf. Theory, 2005, 51(1): 44
https://doi.org/10.1109/TIT.2004.839515
|
39 |
Hayashi M. . Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked information. IEEE Trans. Inf. Theory, 2015, 61(10): 5595
https://doi.org/10.1109/TIT.2015.2464215
|
40 |
Winter A. . Coding theorem and strong converse for quantum channels. IEEE Trans. Inf. Theory, 1999, 45(7): 2481
https://doi.org/10.1109/18.796385
|
41 |
Zhou L. , B. Sheng Y. , L. Long G. . Device-independent quantum secure direct communication against collective attacks. Sci. Bull. (Beijing), 2020, 65(1): 12
https://doi.org/10.1016/j.scib.2019.10.025
|
42 |
Kretschmann D. , Schlingemann D. , F. Werner R. . A continuity theorem for stinesprings dilation. J. Funct. Anal., 2008, 255(8): 1889
https://doi.org/10.1016/j.jfa.2008.07.023
|
43 |
X. Wang B. , J. Tao M. , Ai Q. , Xin T. , Lambert N. , Ruan D. , C. Cheng Y. , Nori F. , G. Deng F. , L. Long G. . Efficient quantum simulation of photosynthetic light harvesting. npj Quantum Inform., 2018, 4(1): 52
https://doi.org/10.1038/s41534-018-0102-2
|
44 |
Y. Chen X. , N. Zhang N. , T. He W. , Y. Kong X. , J. Tao M. , G F. , Ai Deng , L. Long Q. . Global correlation and local information flows in controllable non-Markovian open quantum dynamics. npj Quantum Inform., 2022, 8(1): 22
https://doi.org/10.1038/s41534-022-00537-z
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|