2010
DOI: 10.1007/s10773-010-0387-1
|View full text |Cite
|
Sign up to set email alerts
|

Novel Quantum Deterministic Key Distribution Protocols with Entangled States

Abstract: By utilizing Bell states and GHZ states, two quantum deterministic key distribution (QDKD) protocols are presented to hand over the previously deterministic key to the intended receiver. The proposed QDKD protocols have two-way authentications, and then the eavesdropping and impersonation can be detected easily. The deterministic key itself is not transmitted over the channel and the receiver Bob infers his key in an indirect manner with the relationship between Alice's messages and his own measurement results… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
13
0
1

Year Published

2011
2011
2012
2012

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 23 publications
0
13
0
1
Order By: Relevance
“…QKD has progressed quickly since the QKD protocol was first proposed by Bennett and Brassard in 1984 [1]. On the other hand, a novel concept, Quantum Secure Direct communication (QSDC) has been proposed and pursued attracted much attention [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Different from QKD whose goal is to generate a private key between two remote parties, the QSDC communicates the secret messages directly without generating a key in advance and then encrypting the secret messages.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…QKD has progressed quickly since the QKD protocol was first proposed by Bennett and Brassard in 1984 [1]. On the other hand, a novel concept, Quantum Secure Direct communication (QSDC) has been proposed and pursued attracted much attention [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Different from QKD whose goal is to generate a private key between two remote parties, the QSDC communicates the secret messages directly without generating a key in advance and then encrypting the secret messages.…”
Section: Introductionmentioning
confidence: 99%
“…Recent research on quantum computation and quantum information allowed to use it for real world scenarios [17][18][19][20][21][22][23][24][25][26]. Corresponding to quantum information, quantum data hiding including quantum watermarking and quantum steganography can be employed to achieve covert communication of quantum or classical messages.…”
Section: Introductionmentioning
confidence: 99%
“…Comparing with QKD, DSQC can be used to obtain deterministic information, not a randomly binary string. So far, DSQC has been actively pursued by some groups [27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42]. For example, in 2002, Beige et al [28] first proposed a DSQC scheme based on single-photon two-qubit states.…”
Section: Introductionmentioning
confidence: 99%
“…Dong et al [39] put forward a protocol for DSQC against collective-dephasing noise by using EPR pairs and auxiliary photons. In 2010, Zhou et al [40] proposed two DSQC protocols by utilizing Bell states and GHZ states respectively. Recently, Chen et al [41] proposed a new efficient DSQC scheme which allows a group of mutually distrustful players to perform the summation computation.…”
Section: Introductionmentioning
confidence: 99%
“…1, the atom with momentum p 0 (−p 0 ) traveling along the path I (II) will fly into the adjacent cavity B (C) which is initially prepared in vacuum state and is perpendicular to the path I (II). With the aid of atom trapping equipments, the atoms are trapped in the cavity B or cavity C. According to (4), if the cavity A is in the state |0 A , then all of the N atoms will be trapped in the cavity B and the number of the atoms in the cavity C is zero; in contrast, if the cavity A is in the state |1 A , then the cavity C will contain N atoms and no atom is in cavity B. Therefore, in the form of number representation the state of the cavity A and the atoms contained in cavities B and C can be rewritten as…”
mentioning
confidence: 99%