Secure direct communication using deterministic BB84 protocol

被引:13
|
作者
Hwang, Tzonelih [1 ]
Li, Chuan-Ming [1 ]
Lee, Narn-Yih [2 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
[2] So Taiwan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
来源
关键词
quantum information; quantum cryptography; quantum secure direct communication; deterministic secure quantum communication;
D O I
10.1142/S0129183108012364
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents a deterministic BB84 (dBB84) protocol that not only inherits the unconditional security of the original BB84 protocol but also enables the receiver to deterministically measure and decode all qubits sent by the sender. The proposed dBB84 protocol is then extended to be a deterministic secure quantum communication (DSQC) protocol wherein the sender can securely transmit secret messages to the receiver via quantum channels and the receiver can read out the secret messages only after receiving an additional classical bit for each qubit from the sender. In contrast to the existing single-photon-based secure communication protocols, which require the sender to either prepare two-qubit photon states or to establish two-way quantum channels with the receiver, the newly proposed protocol requires the sender to prepare single-qubit photon states for message transmissions and only set up one-way quantum channels to the receiver. Therefore, the proposed protocol is very suitable and feasible in practical applications.
引用
收藏
页码:625 / 635
页数:11
相关论文
共 50 条
  • [1] Deterministic Secure Quantum Communication on the BB84 System
    Jeong, Youn-Chang
    Ji, Se-Wan
    Hong, Changho
    Park, Hee Su
    Jang, Jingak
    ENTROPY, 2020, 22 (11) : 1 - 13
  • [2] A SECURE METHOD OF COMMUNICATION THROUGH BB84 PROTOCOL IN QUANTUM KEY DISTRIBUTION
    Anilkumar, Chunduru
    Lenka, Swathi
    Neelima, N.
    Sathishkumar, V. E.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 25 - 33
  • [3] Secure Key Rate of the BB84 Protocol using Finite Sample Bits
    Sano, Yousuke
    Matsumoto, Ryutaroh
    Uyematsu, Tomohiko
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2677 - 2681
  • [4] Secure key rate of the BB84 protocol using finite sample bits
    Sano, Yousuke
    Matsumoto, Ryutaroh
    Uyematsu, Tomohiko
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2010, 43 (49)
  • [5] Quantum key distribution secure threshold based on BB84 protocol
    Zhao Nan
    Pei Chang-Xing
    Liu Dan
    Quan Dong-Xiao
    Sun Xiao-Nan
    ACTA PHYSICA SINICA, 2011, 60 (09)
  • [6] Dim coherent states as signal states in the BB84 protocol:: Is it secure?
    Lütkenhaus, N
    QUANTUM COMMUNICATION, COMPUTING, AND MEASUREMENT 2, 2000, : 387 - 392
  • [7] Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications
    V A.D.
    V K.
    Personal and Ubiquitous Computing, 2023, 27 (03) : 875 - 885
  • [8] Semi device independence of the BB84 protocol
    Woodhead, Erik
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [9] Scheme of the arrangement for attack on the protocol BB84
    Khokhlov, D. L.
    OPTIK, 2016, 127 (18): : 7083 - 7087
  • [10] SQL injection principle against BB84 protocol
    Amellal, H.
    Meslouhi, A.
    Hassouni, Y.
    El Allati, A.
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,