Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2017 Mar 22:7:44934.
doi: 10.1038/srep44934.

Deterministic secure quantum communication using a single d-level system

Affiliations

Deterministic secure quantum communication using a single d-level system

Dong Jiang et al. Sci Rep. .

Abstract

Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

PubMed Disclaimer

Conflict of interest statement

The authors declare no competing financial interests.

Figures

Figure 1
Figure 1. Workflow diagram of the presented QSDC protocol.
Figure 2
Figure 2. Detection rate rd versus the dimensions d.
The black dashed line indicates the detection rate of existing two-level quantum system-based schemes.
Figure 3
Figure 3. Workflow diagram of THA.
Figure 4
Figure 4. Evaluation of the multi-photon rate.
(a) In the case that Eve inserts a spy photon in each signal, the multi-photon rate formula image versus the original multi-photon rate formula image. (b) Increase rate Ir of multi-photon rate versus formula image. (c) In the case that Eve inserts a spy photon in a signal with probability s, formula image versus formula image and s. (d) Increase rate Ir of multi-photon rate versus formula image and s.
Figure 5
Figure 5. Efficiency analysis.
(a) Efficiency e versus the dimensions d. The dashed line shows the theoretical efficiency of existing single photon based schemes. (b) Efficiency e versus the dimensions d and the proportion c of photons that used for security checking. The gray triangles indicate the efficiency of existing single photon based schemes with different c.
Figure 6
Figure 6. Implementation of our DSQC protocol.

Similar articles

Cited by

References

    1. Bennett C. H. & Brassard G. Quantum cryptography: punlic key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 175 (1984).
    1. Gisin N., Ribordy G., Tittel W. & Zbinden H. Qunatum cryptography. Rev. Mod. Phys. 74, 145 (2002).
    1. Long G. L. & Liu X. S. Theoretical efficient high capacity quantum key distribution scheme. arXiv:quantph/0012056 (2000).
    1. Beige A., Englert B. G., Kurtsiefer C. & Weinfurter H. Secure communication with a publicly known key. Phys. Pol. A 101, 357 (2002).
    1. Li X. H., Deng F. G. & Zhou H. Y. Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006).

Publication types

LinkOut - more resources