Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2014:2014:694798.
doi: 10.1155/2014/694798. Epub 2014 May 5.

Controlled bidirectional quantum secure direct communication

Affiliations

Controlled bidirectional quantum secure direct communication

Yao-Hsin Chou et al. ScientificWorldJournal. 2014.

Abstract

We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.

PubMed Disclaimer

Figures

Figure 1
Figure 1
The demonstration of online shopping.
Figure 2
Figure 2
The swap gate cascades three quantum Controlled-Not gates.
Figure 3
Figure 3
The demonstration of nonlocal swap gate scheme.
Figure 4
Figure 4
The scenario of our proposed protocol.
Figure 5
Figure 5
The scenario of Eve intercepts sequences.
Figure 6
Figure 6
The scenario of Eve inserts EPR pairs.
Figure 7
Figure 7
The scenario of Eve steals secret message by the nonlocal swap gate scheme.
Figure 8
Figure 8
The scenario of external attack in which the legitimate users and controller measure the qubits A 1, C, and B 1.
Figure 9
Figure 9
The different percentages of k e in N GHZ states corresponding to the error detection rate and the number of detecting GHZ states. (k e: the number of GHZ states replaced by Eve's EPR pairs; N: the number of GHZ states which are prepared from Charlie).
Figure 10
Figure 10
The legitimate users detect eavesdropper with 100% probability corresponding to the number of detecting GHZ states and percentage of replaced GHZ states.
Figure 11
Figure 11
The scenario of participant attack in which Charlie (controller) inserts his EPR pairs to replace GHZ states.
Figure 12
Figure 12
The scenario of participant attack 1 in which Charlie (controller) steals the secret messages by the nonlocal swap gate scheme.
Figure 13
Figure 13
The scenario of participant attack 1 in which Charlie (controller) steals the secret messages by the nonlocal swap gate scheme.
Figure 14
Figure 14
The different percentages of k c in N GHZ states corresponding to the error detection rate and the number of detecting GHZ states. (k c: the number of GHZ states replaced by Charlie's EPR pairs. N: the number of GHZ states which are prepared from Charlie).
Figure 15
Figure 15
The legitimate users ensure quantum channel security with 100% probability corresponding to the number of detecting GHZ states and percentage of replaced GHZ states.
Figure 16
Figure 16
Bob publishes an incorrect measurement result of qubit 4.

Similar articles

References

    1. Chou Y-H, Chen C-Y, Chao H-C, Park JH, Fan R-K. Quantum entanglement and non-locality based secure computation for future communication. IET Information Security. 2011;5(1):69–79.
    1. Chou Y-H, Chen C-Y, Fan R-K, Chao H-C, Lin F-J. Enhanced multiparty quantum secret sharing of classical messages by using entanglement swapping. IET Information Security. 2012;6(2):84–92.
    1. Bennett CH, Brassard G. Quantum cryptography: public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing; 1984; pp. 175–179.
    1. Bennett CH, Brassard G, Mermin ND. Quantum cryptography without Bell's theorem. Physical Review Letters. 1992;68(5):557–559. - PubMed
    1. Cabello A. Quantum key distribution without alternative measurements. Physical Review A: Atomic, Molecular, and Optical Physics. 2000;61(5):4 pages.052312

Publication types

LinkOut - more resources