Abstract
The unique features of quantum walk, such as the possibility of the walker to be in superposition of the position space and get entangled with the position space, provide inherent advantages that can be captured to design highly secure quantum communication protocols. Here we propose two quantum direct communication protocols, a quantum secure direct communication protocol and a controlled quantum dialogue (CQD) protocol using discrete-time quantum walk on a cycle. The proposed protocols are unconditionally secure against various attacks such as the intercept-resend attack, the denial of service attack, and the man-in-the-middle attack. Additionally, the proposed CQD protocol is shown to be unconditionally secure against an untrusted service provider and both the protocols are shown more secure against the intercept resend attack as compared to the qubit-based LM05/DL04 protocol.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. arXiv preprint arXiv:2003.06557 (2020)
Bennett, Charles H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)
Ekert, Artur K.: Quantum cryptography based on bell’s theorem. Phys. Rev. Lett. 67(6), 661 (1991)
Lo, Hoi-Kwong, Chau, Hoi Fung: Is quantum bit commitment really possible? Phys. Rev. Lett. 78(17), 3410 (1997)
Bostrom, Kim, Felbinger, Timo: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)
Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)
Deng, Fu-Guo, Long, Gui Lu, Liu, Xiao-Shu: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)
Deng, Fu-Guo, Long, Gui Lu: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)
Lucamarini, Marco, Mancini, Stefano: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)
Zhou, Lan, Sheng, Yu-Bo, Long, Gui-Lu: Device-independent quantum secure direct communication against collective attacks. Sci. Bull. 65, 12 (2020)
Niu, P.H., Zhou, Z.R., Lin, Z.S., Sheng, Y.B., Yin, L.G., Long, G.L.: Measurement-device-independent quantum communication without encryption. Sci. Bull. 63, 1345 (2018)
Zhou, ZengRong, Sheng, YuBo, Niu, PengHao, Yin, LiuGuo, Long, GuiLu, Hanzo, Lajos: Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron. 63, 230362 (2020)
Nguyen, Ba An: Quantum dialogue. Phys. Lett. A 328(1), 6–10 (2004)
Thapliyal, Kishore, Pathak, Anirban: Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using bell states and permutation of particles. Quantum Inf. Process. 14(7), 2599–2616 (2015)
Jian-Yong, Hu, Bo, Yu., Jing, Ming-Yong, Xiao, Lian-Tuan, Jia, Suo-Tang, Qin, Guo-Qing, Long, Gui-Lu: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016)
Zhang, Wei, Ding, Dong-Sheng, Sheng, Yu-Bo, Zhou, Lan, Shi, Bao-Sen, Guo, Guang-Can: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)
Zhu, Feng, Zhang, Wei, Sheng, Yubo, Huang, Yidong: Experimental long-distance quantum secure direct communication. Sci. Bull. 62, 1519 (2017)
Aharonov, Yakir, Davidovich, Luiz, Zagury, Nicim: Quantum random walks. Phys. Rev. A 48(2), 1687 (1993)
Santha, M.: Quantum walk based search algorithms, vol. 31–46 (2008)
Chawla, Prateek, Ambarish, C.V., Chandrashekar, C.M.: Quantum percolation in quasicrystals using continuous-time quantum walk. J. Phys. Commun. 3(12), 125004 (2019)
Badhani, H., Chandrashekar, C.M.: Gravitationally induced entanglement between two quantum walkers. arXiv preprint arXiv:1907.06953 (2019)
Yang, Yuguang, Yang, Jiajie, Zhou, Yihua, Shi, Weimin, Chen, Xiubo, Li, Jian, Zuo, Huijuan: Quantum network communication: a discrete-time quantum-walk approach. Sci. China Inf. Sci. 61(4), 042501 (2018)
Vlachou, Chrysoula, Krawec, Walter, Mateus, Paulo, Paunkovic, Nikola, Souto, Andre: Quantum key distribution with quantum walks. Quantum Inf. Process. 17(11), 288 (2018)
Vlachou, Chrysoula, Rodrigues, J., Mateus, Paulo, Paunkovic, N., Souto, Andre: Quantum walk public-key cryptographic system. Int. J. Quantum Inf. 13(07), 1550050 (2015)
Banerjee, Subhashish, Srikanth, R., Chandrashekar, C.M., Rungta, Pranaw: Symmetry-noise interplay in quantum walk on an n-cycle. Phys. Rev. A 78(5), 052316 (2008)
Kempe, Julia: Quantum random walks: an introductory overview. Contemp. Phys. 44(4), 307–327 (2003)
Meyer, D.A.: From quantum cellular automata to quantum lattice gases. J. Stat. Phys. 85(5–6), 551–574 (1996)
Chandrashekar, C.M., Srikanth, R., Laflamme, R.: Optimizing the discrete time quantum walk using a SU(2) coin. Phys. Rev. A 77(3), 032326 (2008)
Wang, Jingbo, Manouchehri, Kia: Physical Implementation of Quantum Walks. Springer, Berlin (2013)
Little, M.J., et al.: 2D optical switch. U.S. Patent No. 6,396,976 (28 May 2002)
Donald, D.K.: Thermal optical switches for light. U.S. Patent No. 6,212,308 (3 Apr. 2001)
Dorn, R., Kersten, P., Rehm, W., Wischmann, W.: Optical switch. U.S. Patent No. 5,319,492 (7 Jun. 1994)
Sarkar, Anupam, Chandrashekar, C.M.: Multi-bit quantum random number generator from a single qubit quantum walk. Sci. Rep. 9(1), 12323 (2019)
Saxena, A., Thapliyal, K., Pathak, A.: Continuous variable controlled quantum dialogue and secure multiparty quantum computation. arXiv preprint arXiv:1902.00458 (2019)
Thapliyal, Kishore, Pathak, Anirban: Quantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commerce. Quantum Inf. Process. 18(6), 191 (2019)
Thapliyal, Kishore, Sharma, Rishi Dutt, Pathak, Anirban: Protocols for quantum binary voting. Int. J. Quantum Inf. 15(01), 1750007 (2017)
Ince, R.A.A., Panzeri, S., Schultz, S.R.: Summary of information theoretic quantities. arXiv preprint arXiv:1501.01854 (2015)
Acknowledgements
SS and CMC would like to thank Department of Science and Technology, Government of India, for the Ramanujan Fellowship Grant No.:SB/S2/RJN-192/2014. We also acknowledge the support from Interdisciplinary Cyber Physical Systems (ICPS) programme of the Department of Science and Technology, India, Grant No.:DST/ICPS/QuST/Theme-1/2019/1.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
1.1 LM05/DL04 protocol
This qubit-based protocol was introduced in [8, 9]. In this protocol, the encoding rules for the message sender are as follows:
To encode the bit 0, do nothing to the incoming qubit.
To encode the bit 1, apply the operator \(iY=ZX\) on the incoming qubit. The transformations are as follows:
The protocol is as follows:
-
1.
Alice chooses n random qubits from the set {\(|0\rangle ,|1\rangle ,|+\rangle ,|-\rangle \)} and sends them to Bob.
-
2.
Out of these n qubits received from Alice, Bob randomly chooses n/2 of them and classically sends their coordinates to Alice.
-
3.
Alice publicly announces the states of the n/2 qubits which Bob chose in step 2. Bob measures each of the n/2 qubits in their corresponding bases and checks for eavesdropping. If the error is within a tolerable limit, then the protocol continues to step 4. Else, the protocol is discarded and they start all over again.
-
4.
Among the remaining n/2 qubits, Bob randomly chooses n/4 of them and encodes the message in them according to the encoding rules above and does nothing to the remaining n/4 qubits. He sends all these n/2 qubits back to Alice.
-
5.
After Alice confirms receiving the n/2 qubits, Bob sends the coordinates of the qubits on which he did not encode the message. Alice uses these qubits to check for eavesdropping just like how Bob does it in step 3.
-
6.
After confirming no eavesdropping, Alice measures the remaining qubits in their respective bases to obtain the message sent by Bob.
1.2 Mutual information
Let us take two random variables, say x and y. The mutual information \(I_{XY}\) between two random variables x and y is the decrease in uncertainty of one random variable when the value of the other random variable is observed, measured, or determined. If x and y are discrete, the formula for \(I_{XY}\) is given by [37]
where p(x, y) is the joint probability mass function and p(x) and p(y) are the individual probability mass functions.
If x and y are continuous, then the formula for \(I_{XY}\) is given by
where p(x, y) is the joint probability density function and p(x) and p(y) are the individual probability density functions.
There can also be a case where one of the random variables is discrete and the other is continuous. For example, if x is discrete and y is continuous, then the formula for \(I_{XY}\) becomes
where p(x) is the probability mass function of x, p(y) is the probability density function of y, and p(x, y) is a function that is a probability density-mass function that is discrete in x and continuous in y.
This concept of mutual information can also be generalised to \(r=mn>2\) random variables \(\{x_{1},x_{2},...,x_{m}\}\) and \(\{y_{1},y_{2},...,y_{n}\}\) where \(x_{i}\) are discrete and \(y_{i}\) are continuous. The generalised mutual information \(I_{mutual}\) is given by [37]
1.2.1 Mutual information for the intercept-resend attack for the LM05/DL04 protocol
Let us consider the first transmission from Alice to Bob. In this transmission, Alice first selects either of the four states and prepares them and sends them to Bob. Eve intercepts this channel before the state reaches Bob and randomly chooses a basis for each incoming state and measures the state in that basis. Let \(a,e\in \{0,1,+,-\}\). Let the probability of Alice sending the qubit a and Eve receiving the qubit e be p(a, e). For example, the probability p(0, 0) is
Similarly,
and similar probabilities for \(p(1,e),p(+,e)\), and \(p(-,e),\) where \(e\in \{0,1,+,-\}\).
Hence, the mutual information \(I_{AE}\) for the LM05/DL04 protocol is given by
(We can see that for all a and e, \(p(a)=p(e)=\frac{1}{4}\). Hence, \(p(a)p(e)=\frac{1}{16}\)).
Rights and permissions
About this article
Cite this article
Srikara, S., Chandrashekar, C.M. Quantum direct communication protocols using discrete-time quantum walk. Quantum Inf Process 19, 295 (2020). https://doi.org/10.1007/s11128-020-02793-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-020-02793-4