2006
DOI: 10.1103/physreva.73.022338
|View full text |Cite
|
Sign up to set email alerts
|

Secure direct communication based on secret transmitting order of particles

Abstract: We propose the schemes of quantum secure direct communication (QSDC) based on secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
124
0
2

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 261 publications
(126 citation statements)
references
References 17 publications
0
124
0
2
Order By: Relevance
“…First, we note that in most QSDC protocols based on entangled pairs, because only a kind of Bell state is used to act as the quantum channel, Eve is easy to prepare the same Bell state and takes intercept-resend attack to acquire all information including checking message without being detected [19]. However, this situation can be avoided in our protocol.…”
Section: Security Analysesmentioning
confidence: 91%
See 1 more Smart Citation
“…First, we note that in most QSDC protocols based on entangled pairs, because only a kind of Bell state is used to act as the quantum channel, Eve is easy to prepare the same Bell state and takes intercept-resend attack to acquire all information including checking message without being detected [19]. However, this situation can be avoided in our protocol.…”
Section: Security Analysesmentioning
confidence: 91%
“…In these schemes, because quantum states carrying secret message are not orthogonal, the no-cloning theorem prevents any eavesdropper from perfectly copying them and the uncertainty law prohibits any eavesdropper from distinguishing them without disturbing them. The other one includes the protocols [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31] similar to E91 protocol [4], in which the quantum states carrying secret message are Bell states. Because every particle in Bell states is in a completely mixed state, Eve can't get any useful information from EPR pair only by access to one particle in an EPR pair.…”
mentioning
confidence: 99%
“…It is commonly believed that entanglement is not only a basic ingredient for testing quantum nonlocality against local hidden theories, but also a necessary resource for implementing various quantum information tasks. Fundamentally, entanglement is one of the most important traits in quantum mechanics, and it has found different applications in QIP, such as quantum state sharing [1][2][3], quantum cryptography [4], quantum teleportation [5][6][7][8][9][10], quantum secure direct communication [11][12][13][14], quantum dense coding [15][16][17], quantum cloning machine [18]. These concepts (QNDs) constructed by the cross-Kerr nonlinearity.…”
Section: Introductionmentioning
confidence: 99%
“…Alice reads out Bob's message with single-photon measurements using the basis she prepared the photons. These two DSQC protocols [21,22] using transmitting order rearranging method are simple as they only require one eavesdropping check. However, there is a security loophole because they both are two-way quantum communication protocols.…”
Section: Dsqc Based On the Rearrangement Of Orders Of Particlesmentioning
confidence: 99%
“…One DSQC protocol uses EPR pairs [21]. The transmitting order of the particles which ensures the security of communication is secret to anyone except for the sender Bob himself.…”
Section: Dsqc Based On the Rearrangement Of Orders Of Particlesmentioning
confidence: 99%