2007
DOI: 10.1007/s11467-007-0050-3
|View full text |Cite
|
Sign up to set email alerts
|

Quantum secure direct communication and deterministic secure quantum communication

Abstract: Quantum secure direct communication and deterministic secure quantum communication Abstract In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication is that DSQC requires the two parties excha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
178
0
4

Year Published

2008
2008
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 285 publications
(183 citation statements)
references
References 87 publications
1
178
0
4
Order By: Relevance
“…Based on the above-stated points, the most common and prominent quantum primitives existing to date have been developed: the quantum key distribution (Bebrov, 2017;Diamanti, 2016) and quantum secure communication (Long, 2007). The QKD is the process of securely sharing a key between parties in a quantum way, i.e., transferring the key information particle by particle, as shown in Fig.1a.…”
Section: Quantum Primitivesmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the above-stated points, the most common and prominent quantum primitives existing to date have been developed: the quantum key distribution (Bebrov, 2017;Diamanti, 2016) and quantum secure communication (Long, 2007). The QKD is the process of securely sharing a key between parties in a quantum way, i.e., transferring the key information particle by particle, as shown in Fig.1a.…”
Section: Quantum Primitivesmentioning
confidence: 99%
“…Up to the present relatively many schemes for quantum secure communication have been worked out (Hassanpour, 2015;Joy, 2017;Liu, 2013;Long, 2007;Yan, 2004;Zhang, 2017), taking into account the fact that the field of quantum communication is really juvenile.…”
Section: Quantum Primitivesmentioning
confidence: 99%
“…In 2003, Long and Liu presented a two-step QSDC protocol [20]. Later, many other QSDC protocols were proposed [21][22][23][24]. In 2006, Lee et al presented two QSDC protocols with authentication [25].…”
Section: Introductionmentioning
confidence: 99%
“…The principles of quantum mechanics have been exploited to propose many flavours of QDC. An extensive review of the applied techniques can be found in [1]. One of the first QDC protocols [2,3] was based on the ping-pong communication scheme and it exploited an entanglement of EPR pairs in order to limit capabilities of the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%