2016
DOI: 10.1007/s11128-016-1294-z
|View full text |Cite
|
Sign up to set email alerts
|

Efficient quantum dialogue using entangled states and entanglement swapping without information leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…Here, it is worth mentioning that permutation operator is not a unique way to circumvent these attacks, a prior shared key will also ensure the security of the protocol. A similar strategy of using a prior shared key has been observed in a few protocols in the past [27]. We would like to emphasize here that employing a key for security is beyond the domain of direct communication.…”
Section: Possible Attack Strategies and Securitymentioning
confidence: 62%
See 1 more Smart Citation
“…Here, it is worth mentioning that permutation operator is not a unique way to circumvent these attacks, a prior shared key will also ensure the security of the protocol. A similar strategy of using a prior shared key has been observed in a few protocols in the past [27]. We would like to emphasize here that employing a key for security is beyond the domain of direct communication.…”
Section: Possible Attack Strategies and Securitymentioning
confidence: 62%
“…Since Bennett and Brassard's pioneering proposal of unconditionally secure quantum key distribution (QKD) scheme based on conjugate coding [1], various facets of secure communication have been ex-plored using quantum resources. On the one hand, a large number of conjugate-coding-based (BB84type) schemes [2][3][4] have been proposed for various tasks including QKD [2][3][4], quantum key agreement (QKA) [5], quantum secure direct communication (QSDC) [6,7], deterministic secure quantum communication (DSQC) [8,9], quantum e-commerce [10], quantum dialogue [11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30], etc., on the other hand, serious attempts have been made to answer two extremely important foundational questions-(1) Is conjugate coding necessary for secure quantum communication? (2) How much quantumness is needed for achieving unconditional security?…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, if a maximally densecodable quantum state is used as quantum channel, the encoding operations form a group under multiplication. This point will be further discussed in detail in the forthcoming sections.Recently, considerable efforts have also been made to avoid information leakage in quantum dialogue protocols (see [16,21,22,24] and reference therein). Some efforts have also been made to study the effect of noise on the schemes of QD [30,31,32].…”
mentioning
confidence: 99%
“…In this protocol, a series of ordered two-quantum entangled states are used as quantum information channels for direct and simultaneous exchange of secret information. In addition, a secret key string is shared between communicators to overcome information leakage, but the efficiency of other schemes is very low and cannot meet the requirements of information protection [1]. Lin and Lin investigated the possibility of unintentional and involuntary disclosure of personal information on Facebook.…”
Section: Introductionmentioning
confidence: 99%