2006
DOI: 10.1088/0953-4075/39/18/015
|View full text |Cite
|
Sign up to set email alerts
|

Quantum secure direct communication by using GHZ states and entanglement swapping

Abstract: We present a three-party quantum secure direct communication protocol by using Greenberg–Horne–Zeilinger (GHZ) states and entanglement swapping. The proposed scheme realizes authorized parties' secure exchange of their respective secret messages simultaneously and directly in a set of devices. We show that the scheme is secure against eavesdropper's commonly used attacks. We also generalize the protocol to the N-party case by using N-partite GHZ states.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(69 citation statements)
references
References 17 publications
0
69
0
Order By: Relevance
“…Our scheme can be implemented in experiment since the controlled-not gate can be realized in different context, such as the gates with single trapped cold ions have been experimentally demonstrated [22]. It is known GHZ-like state is crucial for many application purposes (see, e.g., [23][24][25]) and can already be generated in the laboratory [26], thus the study for this state are important and necessary.…”
Section: Resultsmentioning
confidence: 99%
“…Our scheme can be implemented in experiment since the controlled-not gate can be realized in different context, such as the gates with single trapped cold ions have been experimentally demonstrated [22]. It is known GHZ-like state is crucial for many application purposes (see, e.g., [23][24][25]) and can already be generated in the laboratory [26], thus the study for this state are important and necessary.…”
Section: Resultsmentioning
confidence: 99%
“…Unfortunately, all the variants [13][14][15][16][17][18] of [12] suffer from such information leakage.…”
Section: Comparison With Existing Qd Protocolsmentioning
confidence: 99%
“…In 2006, Man, Xia, and Nguyen came up with such a protocol based on GHZ state (MXN protocol) [33] . Here we show that much information about the transmitted secrets would be leaked out in MXN protocol.…”
Section: Analysis Of Mxn Protocolmentioning
confidence: 99%
“…Here we show that much information about the transmitted secrets would be leaked out in MXN protocol. In this condition, as we know, entanglement swapping (or ES for short) [34] [33] for details). Consequently, each of the three users can obtain the secret bits sent by the other two.…”
Section: Analysis Of Mxn Protocolmentioning
confidence: 99%