2009
DOI: 10.1007/s11433-009-0140-z
|View full text |Cite
|
Sign up to set email alerts
|

Quantum secure direct communication over the collective amplitude damping channel

Abstract: An efficient quantum secure direct communication protocol is presented over the amplitude damping channel. The protocol encodes logical bits in two-qubit noiseless states, and so it can function over a quantum channel subjected to collective amplitude damping. The feature of this protocol is that the sender encodes the secret directly on the quantum states, the receiver decodes the secret by performing determinate measurements, and there is no basis mismatch. The transmission's safety is ensured by the nonorth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0
2

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(28 citation statements)
references
References 43 publications
0
26
0
2
Order By: Relevance
“…Therefore, some well known attacks such as intercept-resend attack [11,34,49], the measure-resend attack, the entangle-measure attack can be detected via the checking mechanism [44][45][46]. Moreover, since there are round trip transmissions, the eavesdropper may take Tro-jan horse attack and invisible-photon attack [34,39,40]. Concretely, he/she may prepare in-visible photons or fake photons and split them into two wave packets by their own beam splitter BS.…”
Section: Outside Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, some well known attacks such as intercept-resend attack [11,34,49], the measure-resend attack, the entangle-measure attack can be detected via the checking mechanism [44][45][46]. Moreover, since there are round trip transmissions, the eavesdropper may take Tro-jan horse attack and invisible-photon attack [34,39,40]. Concretely, he/she may prepare in-visible photons or fake photons and split them into two wave packets by their own beam splitter BS.…”
Section: Outside Attackmentioning
confidence: 99%
“…Since Bennett and Brassard presented the first quantum cryptographic protocol [1] in 1984, quantum cryptography has developed quickly. Many kinds of quantum cryptographic protocols have been proposed to solve various different security problems, such as quantum key distribution (QKD) [1][2][3][4][5][6][7][8][9], quantum secure direct communication (QSDC) [10][11][12][13][14][15][16][17][18], quantum secret sharing (QSS) [19][20][21][22][23] and quantum key agreement (QKA) [24][25][26][27]. As another branch of quantum cryptography, quantum private comparison (QPC) also attracts much attention.…”
Section: Introductionmentioning
confidence: 99%
“…During the communication process, if Alice wants to send a k bit binary sequence of message M. She first picks a [[2m, 2k, t]] one-party-QECC that are used to correct the errors in the second transmission. There are k logical EPR pairs in the code pairs and she encodes M to her halves of the second-level logical qubits in the code pairs by applying (30) on the 2i-th logical qubit where the i-th bit of M is 1. Actually Alice is able to apply this local operation.…”
Section: Protocol: One-party-qecc Qsdc Protocolmentioning
confidence: 99%
“…In 2007, Li et al [25] proposed a QSDC with quantum encryption. In 2009, Qin et al [26] proposed a QSDC protocol under a collective damp noise and Gu et al [27] proposed a QSDC protocol under a collective noise.…”
Section: Introductionmentioning
confidence: 99%