Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique
From MaRDI portal
Publication:485378
Abstract: The Goldenberg-Vaidman (GV) protocol for quantum key distribution (QKD) uses orthogonal encoding states of a particle. Its security arises because operations accessible to Eve are insufficient to distinguish the two states encoding the secret bit. We propose a two-particle cryptographic protocol for quantum secure direct communication, wherein orthogonal states encode the secret, and security arises from restricting Eve from accessing any two-particle operations. However, there is a non-trivial difference between the two cases. While the encoding states are perfectly indistinguishable in GV, they are partially distinguishable in the bi-partite case, leading to a qualitatively different kind of information-vs-disturbance trade-off and also options for Eve in the two cases.
Recommendations
- Quantum secure direct communication based on order rearrangement of single photons
- Orthogonal-state-based deterministic secure quantum communication without actual transmission of the message qubits
- Secure quantum communication with orthogonal states
- Efficient Quantum Secure Communication Protocol by Rearranging Particle Orders
- Two single-state semi-quantum secure direct communication protocols based on single photons
- High-capacity deterministic secure four-qubit \(W\) state protocol for quantum communication based on order rearrangement of particle pairs
- Quantum key distribution based on orthogonal states allows secure quantum bit commitment
- Quantum key distribution based on orthogonal state encoding
- Secure direct communication based on non-orthogonal entangled pairs and local measurement
Cites work
- scientific article; zbMATH DE number 1579275 (Why is no real title available?)
- Broadcast channels with confidential messages
- Elements of quantum computation and quantum communication
- Quantum Cryptography Based on Orthogonal States
- Quantum cryptography
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Quantum cryptography: public key distribution and coin tossing
Cited in
(37)- Semiquantum secure direct communication using EPR pairs
- Hide and seek with quantum resources: new and modified protocols for quantum steganography
- Which verification qubits perform best for secure communication in noisy channel?
- Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement
- Quantum private comparison protocol based on the entanglement swapping between \(\chi ^+\) state and W-class state
- Secure quantum communication with orthogonal states
- Establishing rational networking using the DL04 quantum secure direct communication protocol
- Efficient Quantum Secure Communication Protocol by Rearranging Particle Orders
- Semi-quantum protocol for deterministic secure quantum communication using Bell states
- Hierarchical quantum rotation operation sharing with multiparty users
- Simplistic quantum operation sharing with a five-qubit genuinely entangled state
- Probabilistic cloning of three real states with optimal success probabilities
- Quantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commerce
- Deterministic secure quantum communication with four-qubit GHZ states
- Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment
- Indistinguishability of pure orthogonal product states by LOCC
- Quantum cryptography: key distribution and beyond
- Controller-independent bidirectional direct communication with four-qubit cluster states
- Secure quantum dialogue protocol based on four-qubit cluster state
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: different alternative approaches
- Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad
- Remote quantum information concentration via weak cross-Kerr nonlinearity
- Quantum key distribution based on orthogonal state encoding
- Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories
- Quantum secure direct communication based on order rearrangement of single photons
- New form simple structure of maximally eight-qubit entanglement state
- A general method for selecting quantum channel for bidirectional controlled state teleportation and other schemes of controlled quantum communication
- Deterministic remote preparation of an arbitrary qubit state using a partially entangled state and finite classical communication
- Fault-tolerant asymmetric quantum dialogue protocols against collective noise
- Novel multiparty controlled bidirectional quantum secure direct communication based on continuous-variable states
- Controlled secure direct quantum communication inspired scheme for quantum identity authentication
- Controlled secure direct communication with seven-qubit entangled states
- Optimized bidirectional quantum operation teleportation with three Bell states
- Improving the bidirectional quantum teleportation scheme via five-qubit cluster state
- Quantum mutual authentication key agreement scheme using five-qubit entanglement towards different realm architecture
- Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particles
This page was built for publication: Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q485378)