2005
DOI: 10.1103/physrevlett.94.140501
|View full text |Cite
|
Sign up to set email alerts
|

Secure Deterministic Communication without Entanglement

Abstract: We propose a protocol for deterministic communication that does not make use of entanglement. It exploits nonorthogonal states in a two-way quantum channel to attain unconditional security and high efficiency of the transmission. We explicitly show the scheme is secure against a class of individual attacks regardless of the noise on the channel. Its experimental realization is feasible with current technology.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

4
358
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 422 publications
(362 citation statements)
references
References 22 publications
(19 reference statements)
4
358
0
Order By: Relevance
“…The most typical communication tasks are quantum key distribution (QKD) [7][8][9][10][11][12][13][14][15][16][17], reliable transmission of quantum information [18,19] and distribution of entanglement [20][21][22]. The latter allows two remote parties to implement powerful protocols such as quantum teleportation [23][24][25], which is a crucial tool for the contruction of a future quantum Internet [26,27].…”
Section: Introductionmentioning
confidence: 99%
“…The most typical communication tasks are quantum key distribution (QKD) [7][8][9][10][11][12][13][14][15][16][17], reliable transmission of quantum information [18,19] and distribution of entanglement [20][21][22]. The latter allows two remote parties to implement powerful protocols such as quantum teleportation [23][24][25], which is a crucial tool for the contruction of a future quantum Internet [26,27].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand copying of quantum devices did not receive so much attention even though it is a fundamental and equally important quantum information processing task. Similarly to states, quantum transformations are often used in quantum key distribution schemes [8][9][10][11] to encode bits, so analysis of possible attacks by cloning them are needed. Cloning of transformations was yet analyzed only for the case of unitary transformations [11].…”
Section: Introductionmentioning
confidence: 99%
“…Since then a large number of alternative protocols of unconditionally secure QKD have been proposed [2,3,4,5] and various aspects of secure quantum communication beyond QKD have been explored [6,7,8,9,10,11,12,13]. For example, a large number of protocols have been proposed for quantum secure direct communication (QSDC) [7,8,14,15,16], deterministic secure quantum communication (DSQC) [9,10,17,18,19,20,21,22], quantum dialogue (QD) [23,24], etc. All these protocols differ from each other in some specific features.…”
Section: Introductionmentioning
confidence: 99%