×
近期发现有不法分子冒充我刊与作者联系,借此进行欺诈等不法行为,请广大作者加以鉴别,如遇诈骗行为,请第一时间与我刊编辑部联系确认(《中国物理C》(英文)编辑部电话:010-88235947,010-88236950),并作报警处理。
本刊再次郑重声明:
(1)本刊官方网址为cpc.ihep.ac.cn和https://iopscience.iop.org/journal/1674-1137
(2)本刊采编系统作者中心是投稿的唯一路径,该系统为ScholarOne远程稿件采编系统,仅在本刊投稿网网址(https://mc03.manuscriptcentral.com/cpc)设有登录入口。本刊不接受其他方式的投稿,如打印稿投稿、E-mail信箱投稿等,若以此种方式接收投稿均为假冒。
(3)所有投稿均需经过严格的同行评议、编辑加工后方可发表,本刊不存在所谓的“编辑部内部征稿”。如果有人以“编辑部内部人员”名义帮助作者发稿,并收取发表费用,均为假冒。
                  
《中国物理C》(英文)编辑部
2024年10月30日

A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

  • In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two.
      PCAS:
  • 加载中
  • [1] Bennett C H, Brassard G. Proc. IEEE Int. Conf. on Com- puter, Systems, and Signal Processing, Bangalore, India. IEEE, New York, 1984. 175-1792 Bennett C H, Brassard G, Crepeau C et al. Phys. Rev. Lett., 1993, 70: 1895-18993 Bouwmeester D, Pan J W, Mattle K et al. Nature, 1997, 390: 575-5794 Bouwmeester D, Mattle K, Pan J W et al. Appl. Phys. B, 1998, 67: 749-7525 Kim Y H, Kulik S P, Shih Y. Quantum Electronics and Laser Science Conference, 2001. 223-2266 Prakash H. International Conference on Emerging Trends in Electronic and Photonic Devices Systems, 2009. 18-237 Furusawa A. Quantum Electronics and Laser Science Con- ference, 20108 Bennett C H, Wiesner S J. Phys. Rev. Lett., 1992, 69: 2881-28849 Mattle K, Weinfurter H, Kwiat P G et al. Phys. Rev. Lett., 1996, 76: 4656-465910 Hillery M, Buzek V, Berthiaume A. Phys. Rev. A, 1999, 59: 1829-183411 Cleve R, Gottesman D, Lo H K. Phys. Rev. Lett., 1999, 83: 648-65112 LI Chun-Yan, ZHOU Hong-Yu, Wang Yan et al. Chinese Physics Letters, 2005, 22(5): 1049-105213 LI Chun-Yan, LI Xi-Han, DENG Fu-Guo et al. Chinese Physics Letters, 2006, 23(11): 289614 Beige A, Englert B G, Kurtsiefer C et al. Acta Phys. A, 2002, 101: 357-37015 Bostrom K, Felbringer T. Phys. Rev. Lett., 2002, 89: 18790216 LONG Gui-Lu, LIU Xiao-Shu. Phys. Rev. A, 2002, 65(3): 03230217 DENG Fu-Guo, LONG Gui-Lu, LIU Xiao-Shu. Phys. Rev. A, 2003, 68: 04231718 DENG Fu-Guo, LONG Gui-Lu. Phys. Rev. A, 2004, 69: 05231919 GAO Fei, GUO Fen-Zhuo, WEN Qiao-Yan et al. Sci. China Ser G-Phys Mech. Astron, 2009, 39(2): 161-166 (in Chi- nese)20 LONG Gui-Lu, DENG Fu-Guo, WANG C et al. Front. Phys. China, 2007, 2(3): 251-27221 CAi Qing-Yu, LI Bai-Wen. Chinese Physics Letters, 2004, 21: 601-60322 LIANG Hao, CHUAN Wang, LONG Gui-Lu. J. Phys. B: At. Mol. Opt. Phys., 2010, 43: 12550223 CAI Qing-Yu, LI Bai-Wen. Phys. Rev. A, 2004, 69: 05430124 GAO Ting, YAN Feng-Li, WANG Zhi-Xi. Chinese Physics Letters, 2005, 22: 2473-247625 WANG Chuan, DENG Fu-Guo, LONG Gui-Lu. Optical Communications, 2005, 253: 15-2026 LI Xi-Han, DENG Fu-Guo, ZHOU Hong-Yu. Phys. Rev. A, 2006, 74: 05430227 LI Xi-Han, LI Chun-Yan, DENG Fu-Guo et al. Chinese Physics Letters, 2007, 16: 2149-215328 KAI Wen, LONG Gui-Lu. International Journal of Quan- tum Information, 2010, 8(4): 69729 MAN Zhong-Xiao, XIA Yun-Jie, Nguyen B A. J Phys. B-At Mol. Opt. Phys., 2006, 39: 3855-386330 MAN Zhong-Xiao, XIA Yun-Jie. Chinese Physics Letters, 2006, 23: 1680-168231 JIN Xing-Ri, JI Xin, ZHANG Ying-Qiao et al. Phys. Lett. A, 2006, 354: 67-7032 MAN Zhong-Xiao, XIA Yun-Jie. Chinese Physics Letters, 2007, 24: 15-1833 CHEN Yan, MAN Zhong-Xiao, XIA Yun-Jie. Chinese Physics Letters, 2007, 24: 19-2234 GU Bin, PEI Shi-Xin, SONG Biao et al. Science in China Series G-Physics Mechanics Astronomy, 2009, 52(12): 1913-1918
  • 加载中

Get Citation
LI Jian, SONG Dan-Jie, GUO Xiao-Jing and JING Bo. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation[J]. Chinese Physics C, 2012, 36(1): 31-36. doi: 10.1088/1674-1137/36/1/005
LI Jian, SONG Dan-Jie, GUO Xiao-Jing and JING Bo. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation[J]. Chinese Physics C, 2012, 36(1): 31-36.  doi: 10.1088/1674-1137/36/1/005 shu
Milestone
Received: 2011-03-28
Revised: 2011-05-03
Article Metric

Article Views(2495)
PDF Downloads(441)
Cited by(0)
Policy on re-use
To reuse of subscription content published by CPC, the users need to request permission from CPC, unless the content was published under an Open Access license which automatically permits that type of reuse.
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Email This Article

Title:
Email:

A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

Abstract: In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two.

    HTML

Reference (1)

目录

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return