Controlled bidirectional quantum secure direct communication
- PMID: 25006596
- PMCID: PMC4076848
- DOI: 10.1155/2014/694798
Controlled bidirectional quantum secure direct communication
Abstract
We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.
Figures
















Similar articles
-
A generalized architecture of quantum secure direct communication for N disjointed users with authentication.Sci Rep. 2015 Nov 18;5:16080. doi: 10.1038/srep16080. Sci Rep. 2015. PMID: 26577473 Free PMC article.
-
One-step quantum secure direct communication.Sci Bull (Beijing). 2022 Feb 26;67(4):367-374. doi: 10.1016/j.scib.2021.11.002. Epub 2021 Nov 4. Sci Bull (Beijing). 2022. PMID: 36546088
-
A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity.Entropy (Basel). 2023 Apr 30;25(5):742. doi: 10.3390/e25050742. Entropy (Basel). 2023. PMID: 37238497 Free PMC article.
-
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.Sensors (Basel). 2022 Jan 3;22(1):331. doi: 10.3390/s22010331. Sensors (Basel). 2022. PMID: 35009873 Free PMC article.
-
Risk communication in cyberspace: a brief review of the information-processing and mental models approaches.Curr Opin Psychol. 2020 Dec;36:135-140. doi: 10.1016/j.copsyc.2020.06.006. Epub 2020 Jun 20. Curr Opin Psychol. 2020. PMID: 32679482 Review.
References
-
- Chou Y-H, Chen C-Y, Chao H-C, Park JH, Fan R-K. Quantum entanglement and non-locality based secure computation for future communication. IET Information Security. 2011;5(1):69–79.
-
- Chou Y-H, Chen C-Y, Fan R-K, Chao H-C, Lin F-J. Enhanced multiparty quantum secret sharing of classical messages by using entanglement swapping. IET Information Security. 2012;6(2):84–92.
-
- Bennett CH, Brassard G. Quantum cryptography: public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing; 1984; pp. 175–179.
-
- Bennett CH, Brassard G, Mermin ND. Quantum cryptography without Bell's theorem. Physical Review Letters. 1992;68(5):557–559. - PubMed
-
- Cabello A. Quantum key distribution without alternative measurements. Physical Review A: Atomic, Molecular, and Optical Physics. 2000;61(5):4 pages.052312
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources
Other Literature Sources