2011
DOI: 10.1007/s11432-011-4371-z
|View full text |Cite
|
Sign up to set email alerts
|

Deterministic secure quantum communication without unitary operation based on high-dimensional entanglement swapping

Abstract: By analysis of the basic properties of entanglement swapping of high-dimensional Bell states, a universal and general deterministic secure quantum communication (DSQC) protocol is proposed, in which unitary operation is not required. By making use of the results of high-dimensional Bell measurement, the sender and the receiver can encode and decode the message respectively by performing the modular addition and subtraction. Two mutually complementary bases are constructed; and according to the property of mutu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 47 publications
(47 reference statements)
0
10
0
Order By: Relevance
“…Compared with the QPC based on the quantum operation discrimination [43] or the combination of decoherence-free states and error-correcting code [45], our schemes are based on the entanglement swapping of Bell states. Different from previous quantum trust center [24][25][26][27][28][29][30][31][32] or quantum semi-honest center [43][44][45][46][47], our schemes take use of the classical semi-honest center, which is more flexible in implementation. These schemes can be used to justify their disagreements by the semi-honest center.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with the QPC based on the quantum operation discrimination [43] or the combination of decoherence-free states and error-correcting code [45], our schemes are based on the entanglement swapping of Bell states. Different from previous quantum trust center [24][25][26][27][28][29][30][31][32] or quantum semi-honest center [43][44][45][46][47], our schemes take use of the classical semi-honest center, which is more flexible in implementation. These schemes can be used to justify their disagreements by the semi-honest center.…”
Section: Discussionmentioning
confidence: 99%
“…The first important application is the quantum key distribution (QKD) protocol [5][6][7][8] with unconditional security. This great scheme has initiated various kinds of cryptographic protocols such as secure transmission of quantum state [9][10][11][12], quantum secret sharing [13][14][15][16][17][18][19], quantum direction communication [20][21][22][23][24][25][26], and quantum steganography protocols [27][28][29]; these schemes have been explored for various security systems.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of current technology, quantum information science is maturing little by little. In quantum communications in particular, quantum cryptography has become commercially available [2][3][4][5][6][7]. How to build up a quantum network is a more challenging and important task for the development of quantum communications [8].…”
Section: Introductionmentioning
confidence: 99%
“…Using single photons, Beige et al [30] proposed a DSQC protocol in 2002. After that, several DSQC protocols were proposed by utilizing quantum teleportation [31,32], entanglement swapping [33][34][35] or single photon measurement [36].…”
Section: Introductionmentioning
confidence: 99%