Skip to main content
Log in

Quantum direct communication protocols using discrete-time quantum walk

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

The unique features of quantum walk, such as the possibility of the walker to be in superposition of the position space and get entangled with the position space, provide inherent advantages that can be captured to design highly secure quantum communication protocols. Here we propose two quantum direct communication protocols, a quantum secure direct communication protocol and a controlled quantum dialogue (CQD) protocol using discrete-time quantum walk on a cycle. The proposed protocols are unconditionally secure against various attacks such as the intercept-resend attack, the denial of service attack, and the man-in-the-middle attack. Additionally, the proposed CQD protocol is shown to be unconditionally secure against an untrusted service provider and both the protocols are shown more secure against the intercept resend attack as compared to the qubit-based LM05/DL04 protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. arXiv preprint arXiv:2003.06557 (2020)

  2. Bennett, Charles H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)

    Article  ADS  MathSciNet  Google Scholar 

  3. Ekert, Artur K.: Quantum cryptography based on bell’s theorem. Phys. Rev. Lett. 67(6), 661 (1991)

    Article  ADS  MathSciNet  Google Scholar 

  4. Lo, Hoi-Kwong, Chau, Hoi Fung: Is quantum bit commitment really possible? Phys. Rev. Lett. 78(17), 3410 (1997)

    Article  ADS  Google Scholar 

  5. Bostrom, Kim, Felbinger, Timo: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)

    Article  ADS  Google Scholar 

  6. Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)

    Article  ADS  Google Scholar 

  7. Deng, Fu-Guo, Long, Gui Lu, Liu, Xiao-Shu: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)

    Article  ADS  Google Scholar 

  8. Deng, Fu-Guo, Long, Gui Lu: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)

    Article  ADS  Google Scholar 

  9. Lucamarini, Marco, Mancini, Stefano: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)

    Article  ADS  Google Scholar 

  10. Zhou, Lan, Sheng, Yu-Bo, Long, Gui-Lu: Device-independent quantum secure direct communication against collective attacks. Sci. Bull. 65, 12 (2020)

    Article  Google Scholar 

  11. Niu, P.H., Zhou, Z.R., Lin, Z.S., Sheng, Y.B., Yin, L.G., Long, G.L.: Measurement-device-independent quantum communication without encryption. Sci. Bull. 63, 1345 (2018)

    Article  Google Scholar 

  12. Zhou, ZengRong, Sheng, YuBo, Niu, PengHao, Yin, LiuGuo, Long, GuiLu, Hanzo, Lajos: Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron. 63, 230362 (2020)

    Article  Google Scholar 

  13. Nguyen, Ba An: Quantum dialogue. Phys. Lett. A 328(1), 6–10 (2004)

    Article  ADS  MathSciNet  Google Scholar 

  14. Thapliyal, Kishore, Pathak, Anirban: Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using bell states and permutation of particles. Quantum Inf. Process. 14(7), 2599–2616 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  15. Jian-Yong, Hu, Bo, Yu., Jing, Ming-Yong, Xiao, Lian-Tuan, Jia, Suo-Tang, Qin, Guo-Qing, Long, Gui-Lu: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016)

    Article  Google Scholar 

  16. Zhang, Wei, Ding, Dong-Sheng, Sheng, Yu-Bo, Zhou, Lan, Shi, Bao-Sen, Guo, Guang-Can: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)

    Article  ADS  Google Scholar 

  17. Zhu, Feng, Zhang, Wei, Sheng, Yubo, Huang, Yidong: Experimental long-distance quantum secure direct communication. Sci. Bull. 62, 1519 (2017)

    Article  Google Scholar 

  18. Aharonov, Yakir, Davidovich, Luiz, Zagury, Nicim: Quantum random walks. Phys. Rev. A 48(2), 1687 (1993)

    Article  ADS  Google Scholar 

  19. Santha, M.: Quantum walk based search algorithms, vol. 31–46 (2008)

  20. Chawla, Prateek, Ambarish, C.V., Chandrashekar, C.M.: Quantum percolation in quasicrystals using continuous-time quantum walk. J. Phys. Commun. 3(12), 125004 (2019)

    Article  Google Scholar 

  21. Badhani, H., Chandrashekar, C.M.: Gravitationally induced entanglement between two quantum walkers. arXiv preprint arXiv:1907.06953 (2019)

  22. Yang, Yuguang, Yang, Jiajie, Zhou, Yihua, Shi, Weimin, Chen, Xiubo, Li, Jian, Zuo, Huijuan: Quantum network communication: a discrete-time quantum-walk approach. Sci. China Inf. Sci. 61(4), 042501 (2018)

    Article  MathSciNet  Google Scholar 

  23. Vlachou, Chrysoula, Krawec, Walter, Mateus, Paulo, Paunkovic, Nikola, Souto, Andre: Quantum key distribution with quantum walks. Quantum Inf. Process. 17(11), 288 (2018)

    Article  ADS  MathSciNet  Google Scholar 

  24. Vlachou, Chrysoula, Rodrigues, J., Mateus, Paulo, Paunkovic, N., Souto, Andre: Quantum walk public-key cryptographic system. Int. J. Quantum Inf. 13(07), 1550050 (2015)

    Article  MathSciNet  Google Scholar 

  25. Banerjee, Subhashish, Srikanth, R., Chandrashekar, C.M., Rungta, Pranaw: Symmetry-noise interplay in quantum walk on an n-cycle. Phys. Rev. A 78(5), 052316 (2008)

    Article  ADS  Google Scholar 

  26. Kempe, Julia: Quantum random walks: an introductory overview. Contemp. Phys. 44(4), 307–327 (2003)

    Article  ADS  Google Scholar 

  27. Meyer, D.A.: From quantum cellular automata to quantum lattice gases. J. Stat. Phys. 85(5–6), 551–574 (1996)

    Article  ADS  MathSciNet  Google Scholar 

  28. Chandrashekar, C.M., Srikanth, R., Laflamme, R.: Optimizing the discrete time quantum walk using a SU(2) coin. Phys. Rev. A 77(3), 032326 (2008)

    Article  ADS  Google Scholar 

  29. Wang, Jingbo, Manouchehri, Kia: Physical Implementation of Quantum Walks. Springer, Berlin (2013)

    MATH  Google Scholar 

  30. Little, M.J., et al.: 2D optical switch. U.S. Patent No. 6,396,976 (28 May 2002)

  31. Donald, D.K.: Thermal optical switches for light. U.S. Patent No. 6,212,308 (3 Apr. 2001)

  32. Dorn, R., Kersten, P., Rehm, W., Wischmann, W.: Optical switch. U.S. Patent No. 5,319,492 (7 Jun. 1994)

  33. Sarkar, Anupam, Chandrashekar, C.M.: Multi-bit quantum random number generator from a single qubit quantum walk. Sci. Rep. 9(1), 12323 (2019)

    Article  ADS  Google Scholar 

  34. Saxena, A., Thapliyal, K., Pathak, A.: Continuous variable controlled quantum dialogue and secure multiparty quantum computation. arXiv preprint arXiv:1902.00458 (2019)

  35. Thapliyal, Kishore, Pathak, Anirban: Quantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commerce. Quantum Inf. Process. 18(6), 191 (2019)

    Article  ADS  Google Scholar 

  36. Thapliyal, Kishore, Sharma, Rishi Dutt, Pathak, Anirban: Protocols for quantum binary voting. Int. J. Quantum Inf. 15(01), 1750007 (2017)

    Article  Google Scholar 

  37. Ince, R.A.A., Panzeri, S., Schultz, S.R.: Summary of information theoretic quantities. arXiv preprint arXiv:1501.01854 (2015)

Download references

Acknowledgements

SS and CMC would like to thank Department of Science and Technology, Government of India, for the Ramanujan Fellowship Grant No.:SB/S2/RJN-192/2014. We also acknowledge the support from Interdisciplinary Cyber Physical Systems (ICPS) programme of the Department of Science and Technology, India, Grant No.:DST/ICPS/QuST/Theme-1/2019/1.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. M. Chandrashekar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

1.1 LM05/DL04 protocol

This qubit-based protocol was introduced in [8, 9]. In this protocol, the encoding rules for the message sender are as follows:

To encode the bit 0, do nothing to the incoming qubit.

To encode the bit 1, apply the operator \(iY=ZX\) on the incoming qubit. The transformations are as follows:

$$\begin{aligned} iY|0\rangle= & {} -|1\rangle \\ iY|1\rangle= & {} |0\rangle \\ iY|\pm \rangle= & {} \pm |\mp \rangle \end{aligned}$$

The protocol is as follows:

  1. 1.

    Alice chooses n random qubits from the set {\(|0\rangle ,|1\rangle ,|+\rangle ,|-\rangle \)} and sends them to Bob.

  2. 2.

    Out of these n qubits received from Alice, Bob randomly chooses n/2 of them and classically sends their coordinates to Alice.

  3. 3.

    Alice publicly announces the states of the n/2 qubits which Bob chose in step 2. Bob measures each of the n/2 qubits in their corresponding bases and checks for eavesdropping. If the error is within a tolerable limit, then the protocol continues to step 4. Else, the protocol is discarded and they start all over again.

  4. 4.

    Among the remaining n/2 qubits, Bob randomly chooses n/4 of them and encodes the message in them according to the encoding rules above and does nothing to the remaining n/4 qubits. He sends all these n/2 qubits back to Alice.

  5. 5.

    After Alice confirms receiving the n/2 qubits, Bob sends the coordinates of the qubits on which he did not encode the message. Alice uses these qubits to check for eavesdropping just like how Bob does it in step 3.

  6. 6.

    After confirming no eavesdropping, Alice measures the remaining qubits in their respective bases to obtain the message sent by Bob.

1.2 Mutual information

Let us take two random variables, say x and y. The mutual information \(I_{XY}\) between two random variables x and y is the decrease in uncertainty of one random variable when the value of the other random variable is observed, measured, or determined. If x and y are discrete, the formula for \(I_{XY}\) is given by [37]

$$\begin{aligned} I_{XY}=\underset{x}{\sum }\underset{y}{\sum }p(x,y)log_{2}\frac{p(x,y)}{p(x)p(y)} \end{aligned}$$
(15)

where p(xy) is the joint probability mass function and p(x) and p(y) are the individual probability mass functions.

If x and y are continuous, then the formula for \(I_{XY}\) is given by

$$\begin{aligned} I_{XY}=\underset{x}{\int }\underset{y}{\int }p(x,y)log_{2}\frac{p(x,y)}{p(x)p(y)}dxdy \end{aligned}$$
(16)

where p(xy) is the joint probability density function and p(x) and p(y) are the individual probability density functions.

There can also be a case where one of the random variables is discrete and the other is continuous. For example, if x is discrete and y is continuous, then the formula for \(I_{XY}\) becomes

$$\begin{aligned} I_{XY}=\underset{x}{\sum }\underset{y}{\int }p(x,y)log_{2}\frac{p(x,y)}{p(x)p(y)}dy \end{aligned}$$
(17)

where p(x) is the probability mass function of x, p(y) is the probability density function of y, and p(xy) is a function that is a probability density-mass function that is discrete in x and continuous in y.

This concept of mutual information can also be generalised to \(r=mn>2\) random variables \(\{x_{1},x_{2},...,x_{m}\}\) and \(\{y_{1},y_{2},...,y_{n}\}\) where \(x_{i}\) are discrete and \(y_{i}\) are continuous. The generalised mutual information \(I_{mutual}\) is given by [37]

$$\begin{aligned} I_{mutual}= & {} \underset{x_{1},x_{2},...,x_{n}}{\sum }\underset{y_{1},...,y_{n}}{\int }p(x_{1},x_{2},...,x_{m},y_{1},y_{2},...,y_{n})log_{2}\nonumber \\&\frac{p(x_{1},x_{2},...,x_{m},y_{1},y_{2},...,y_{n})}{p(x_{1})p(x_{2})...p(x_{m})p(y_{1})p(y_{2})...p(y_{n})}dy_{1}dy_{2}...dy_{n}. \end{aligned}$$
(18)

1.2.1 Mutual information for the intercept-resend attack for the LM05/DL04 protocol

Let us consider the first transmission from Alice to Bob. In this transmission, Alice first selects either of the four states and prepares them and sends them to Bob. Eve intercepts this channel before the state reaches Bob and randomly chooses a basis for each incoming state and measures the state in that basis. Let \(a,e\in \{0,1,+,-\}\). Let the probability of Alice sending the qubit a and Eve receiving the qubit e be p(ae). For example, the probability p(0, 0) is

$$\begin{aligned} p(0,0)= & {} \overset{probability\,of\,Alice\,choosing\,0}{\frac{1}{4}}\times \overset{probability\,of\,Eve\,choosing\,the\,computational\,Z\,basis}{\frac{1}{2}}\nonumber \\&\times \overset{probability\,of\,Eve\,getting\,0}{1}=\frac{1}{8}. \end{aligned}$$
(19)

Similarly,

$$\begin{aligned} p(0,1)= & {} \frac{1}{4}\times \frac{1}{2}\times 0=0, \end{aligned}$$
(20)
$$\begin{aligned} p(0,+)= & {} \frac{1}{4}\times \frac{1}{2}\times \frac{1}{2}=\frac{1}{16}, \end{aligned}$$
(21)
$$\begin{aligned} p(0,-)= & {} \frac{1}{4}\times \frac{1}{2}\times \frac{1}{2}=\frac{1}{16}, \end{aligned}$$
(22)

and similar probabilities for \(p(1,e),p(+,e)\), and \(p(-,e),\) where \(e\in \{0,1,+,-\}\).

Hence, the mutual information \(I_{AE}\) for the LM05/DL04 protocol is given by

$$\begin{aligned} I_{AE}= & {} \underset{a}{\sum }\underset{e}{\sum }p(a,e)log_{2}\frac{p(a,e)}{p(a)p(e)}\nonumber \\= & {} 4\left( \frac{1}{8}log_{2}\frac{\frac{1}{8}}{\frac{1}{16}}+\frac{1}{16}log_{2}\frac{\frac{1}{16}}{\frac{1}{16}}+\frac{1}{16}log_{2}\frac{\frac{1}{16}}{\frac{1}{16}}\right) =0.5. \end{aligned}$$
(23)

(We can see that for all a and e, \(p(a)=p(e)=\frac{1}{4}\). Hence, \(p(a)p(e)=\frac{1}{16}\)).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Srikara, S., Chandrashekar, C.M. Quantum direct communication protocols using discrete-time quantum walk. Quantum Inf Process 19, 295 (2020). https://doi.org/10.1007/s11128-020-02793-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-020-02793-4

Keywords

Navigation