2013
DOI: 10.1088/0031-8949/89/01/015103
|View full text |Cite
|
Sign up to set email alerts
|

Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state

Abstract: In order to avoid the risk of information leakage during the information mutual transmission between two authorized participants, i.e., Alice and Bob, a quantum dialogue protocol based on the entanglement swapping between any two Bell states and the shared secret Bell state is proposed. The proposed protocol integrates the ideas of block transmission, two-step transmission and unitary operation encoding together using the Bell states as the information carriers. Besides the entanglement swapping between any tw… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 42 publications
(39 citation statements)
references
References 37 publications
0
36
0
1
Order By: Relevance
“…Compared with the previous QD protocols [12][13][14][15][16][17][18][19][20][21][22][23][24][28][29][30][31][32][33][34][35][36][37][38][39][40]42,[53][54][55][56][57][58][59][60][61], the great merit of the two proposed protocols is that each of them can accomplish the mutual identity authentication and the dialogue between two participants simultaneously and securely over one kind of collective noise channels under the assumption that the information transmitted through the classical channel is eavesdroppable and modifiable. Their other characteristics are:…”
Section: Resultsmentioning
confidence: 99%
“…Compared with the previous QD protocols [12][13][14][15][16][17][18][19][20][21][22][23][24][28][29][30][31][32][33][34][35][36][37][38][39][40]42,[53][54][55][56][57][58][59][60][61], the great merit of the two proposed protocols is that each of them can accomplish the mutual identity authentication and the dialogue between two participants simultaneously and securely over one kind of collective noise channels under the assumption that the information transmitted through the classical channel is eavesdroppable and modifiable. Their other characteristics are:…”
Section: Resultsmentioning
confidence: 99%
“…After obtaining particles b, c and d, Bob performs double CNOT operations on particles c and d with particle b as the control qubit, respectively. Then, Bob uses Z ⊗ Z-basis ({|00 , |01 , |10 , |11 }) to measure particles c and d. According to (19)(20)(21)(22), Bob is able to know which Bell state particles a and b are collapsed into. On the other hand, Alice is also able to know the state of particles a and b after double CNOT operations, since she prepares the four-particle GHZ state by herself.…”
Section: Protocol Descriptionmentioning
confidence: 99%
“…[21] ofRef. [22] of Ref. [23] protocol with protocol with protocol with Bell-basis single-particle single-particle Bell-basis…”
Section: Protocol Descriptionmentioning
confidence: 99%
See 2 more Smart Citations