Abstract
A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state |φ −〉 is used as the carrier. One photon of |φ −〉 state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.
Similar content being viewed by others
References
Bennett, C.H.: Phys. Rev. Lett. 68, 3121–3124 (1992)
Bennett, C.H., Brassard, G., Mermin, N.D.: Phys. Rev. Lett. 68, 557–559 (1992)
Chen, S.J., Liu, D.K., You, L.X., et al.: Chin. Sci. Bull. 58, 1145–1149 (2013)
Cui, K., Wang, J., Zhang, H., et al.: Optik - Int. J. Light and Elect. Opt. 126(23), 4747–4750 (2015)
Jasim, O.K., Abbas, S., El-Horbaty, E.M., et al.: Procedia Comput. Sci. 65, 701–710 (2015)
Vernam, G.S.: J. Am. Inst. Elect. Eng. 45, 109–115 (1926)
Bennett, CH, Brassard, G.: . In: proceeding of the IEEE international conference on computers, Systems and Signal Processing, pp 175–179 (1984)
Beige, A., Englert, B.G., Kurtsiefer, C., et al.: J. Phys. S-Math. Gen. 35, L407–L413 (2002)
Tsai, C.W., Hwang, T.: Sci. Chin. Ser. G-Phys. Mech. Astron. 56, 1903–1908 (2013)
Yuan, H., Zhang, Q., Hong, L., et al.: Int. J. Theor. Phys. 53, 2558–2564 (2014)
Xu, S., Chen, X., Wang, L., et al.: Int. J. Theor. Phys. 54, 2436–2445 (2015)
Li, J., Jin, H.F., Jing, B.: Sci China Phys Mech Astron. 54, 1612–1618 (2011)
Yang, Y.: Int. J. Theor. Phys. 53, 2216–2221 (2014)
Li, W., Chen, J., Wang, X., et al.: Int. J. Theor. Phys. 54, 100–105 (2015)
Feng, Z., Ou-Yang, Y., Zhou, V., et al.: Opt. Commun. 340, 80–85 (2015)
Long, G.L., Liu, X.S.: Phys. Rev. A 65, 032302 (2002)
Li, C.Y., Zhou, H.Y., Wang, Y., et al.: Chin. Phys. Lett. 22, 1049–1502 (2005)
Alléaume, R., Branciard, C., Bouda, J., et al.: Theor. Comput. Sci. 560, 62–81 (2014)
Yang, Y., Sun, S., Pan, Q., et al.: Optik - Int. J. Light and Elect. Opt. 126(23), 3838–3843 (2015)
Wen, L., Yong-Bin, W., Wei, C.: Commun. Theor. Phys. 57(4), 583–588 (2012)
Li, X.H., Deng, F.G., Zhou, H.Y.: Phys Rev A 74, 054302 (2006)
Zhang, Z., Man, Z., Li, Y.: Phys. Lett. A 333(1–2), 46–50 (2004)
Boström, K., Felbinger, T.: Phys. Lett. A 372(22), 3953–3956 (2008)
Fei, G., FenZhuo, G., QiaoYan, W., et al.: Sci. China Ser. G Phys. Mech. 51(12), 1853–1860 (2008)
Li, J., Li, L., Jin, H., et al. Phys. Lett. A 377(39), 2729–2734 (2013)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant No.61472048, No.61402058, No.61572246), Beijing Natural Science Foundation(4152038), China Postdoctoral Science Foundation funded project No.2014M561826.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, N., Li, J., Li, LL. et al. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad. Int J Theor Phys 55, 3579–3587 (2016). https://doi.org/10.1007/s10773-016-2986-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-016-2986-y