2012
DOI: 10.1007/s10773-012-1220-9
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Quantum Dialogue by Using the Two-Qutrit Entangled States Without Information Leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
6
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Chang et al proposed a QDP based on the entanglement of GHZ states to resist the collectivedephasing noise and collective-rotation noise [7,8]. Wang et al indicated two legitimate users could transmit their secret messages directly by combining the generalized Bell-basis measurement with classical communication [9].…”
Section: Introductionmentioning
confidence: 99%
“…Chang et al proposed a QDP based on the entanglement of GHZ states to resist the collectivedephasing noise and collective-rotation noise [7,8]. Wang et al indicated two legitimate users could transmit their secret messages directly by combining the generalized Bell-basis measurement with classical communication [9].…”
Section: Introductionmentioning
confidence: 99%
“…In 2004, another novel kind of quantum secure communication, called Quantum dialogue (QD), was put forward by Nguyen et al [5] and it permits the two participants to exchange their respective secret messages simultaneously. Up to now, various QD protocols have been proposed based on single photons [6][7][8][9][10][11][12][13] or entanglement states [5,14]. The security, efficiency and practicability are the focus of quantum communication protocols.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, several other protocols referred to as BQSDC [9,10], quantum telephone [11], quantum dialogue [12], quantum conversation [13], etc, have also been proposed using (i) dense coding [8], (ii) auxiliary particles [9], (iii) entangled states [10,14], (iv) single photon [12,15,16], (v) entanglement swapping [17], (vi) two-photon entanglement [18,19], etc. These are actually different names used for equivalent protocols, and there are subtle differences in these protocols.…”
Section: Introductionmentioning
confidence: 99%