Abstract
A notion of asymmetric quantum dialogue (AQD) is introduced. Conventional protocols of quantum dialogue are essentially symmetric as the users (Alice and Bob) can encode the same amount of classical information. In contrast, the proposed scheme for AQD provides different amount of communication powers to Alice and Bob. The proposed scheme offers an architecture, where the entangled state to be used and the encoding scheme to be shared between Alice and Bob depend on the amount of classical information they want to exchange with each other. The general structure for the AQD scheme has been obtained using a group theoretic structure of the operators introduced in Shukla et al. (Phys Lett A 377:518, 2013). The effect of different types of noises (e.g., amplitude damping and phase damping noise) on the proposed scheme is investigated, and it is shown that the proposed scheme for AQD is robust and it uses an optimized amount of quantum resources.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179 (1984)
Pathak, A.: Elements of Quantum Computation and Quantum Communication. CRC Press, Boca Raton (2013)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)
Goldenberg, L., Vaidman, L.: Quantum cryptography based on orthogonal states. Phys. Rev. Lett. 75, 1239 (1995)
Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)
Shukla, C., Banerjee, A., Pathak, A.: Improved protocols of secure quantum communication using W states. Int. J. Theor. Phys. 52, 1914 (2013)
Long, G.-L., Deng, F.-G., Wang, C., Li, X.-H., Wen, K., Wang, W.-Y.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2, 251 (2007)
Man, Z.X., Zhang, Z.J., Li, Y.: Quantum dialogue revisited. Chin. Phys. Lett. 22, 22 (2005)
Banerjee, A., Pathak, A.: Maximally efficient protocols for direct secure quantum communication. Phys. Lett. A 376, 2944 (2012)
Pathak, A.: Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: different alternative approaches. Quantum Inf. Process. 14, 2195 (2015)
Yu, Z.B., Gong, L.H., Wen, R.H.: Novel multiparty controlled bidirectional quantum secure direct communication based on continuous-variable states. Int. J. Theor. Phys. 55, 1447 (2016)
An, N.B.: Quantum dialogue. Phys. Lett. A 328, 6 (2004)
An, N.B.: Secure dialogue without a prior key distribution. J. Korean Phys. Soc. 47, 562 (2005)
Shi, G.-F.: Bidirectional quantum secure communication scheme based on Bell states and auxiliary particles. Opt. Commun. 283, 5275 (2010)
Wen, X., Liu, Y., Zhou, N.: Secure quantum telephone. Opt. Commun. 275, 278 (2007)
Sun, Y., Wen, Q.-Y., Gao, F., Zhu, F.-C.: Improving the security of secure quantum telephone against an attack with fake particles and local operations. Opt. Commun. 282, 2278 (2009)
Naseri, M.: An efficient protocol for quantum secure dialogue with authentication by using single photons. Int. J. Quantum Inf. 9, 1677 (2011)
Jain, S., Muralidharan, S., Panigrahi, P.K.: Secure quantum conversation through non-destructive discrimination of highly entangled multipartite states. Eur. Phys. Lett. 87, 60008 (2009)
Shukla, C., Kothari, V., Banerjee, A., Pathak, A.: On the group-theoretic structure of a class of quantum dialogue protocols. Phys. Lett. A 377, 518 (2013)
Thapliyal, K., Sharma, R. D., Pathak, A.: Orthogonal-State-based and semi-quantum protocols for quantum private comparison in noisy environment. arXiv:1608.00101 (2016)
Xia, Y., Fu, C.-B., Zhang, S., Hong, S.-K., Yeon, K.-H., Um, C.-I.: Quantum dialogue by using the GHZ state. J. Korean Phys. Soc. 48, 24 (2006)
Dong, L., Xiu, X.-M., Gao, Y.-J., Chi, F.: Quantum dialogue protocol using a class of three-photon W states. Commun. Theor. Phys. 52, 853 (2009)
Gao, G.: Two quantum dialogue protocols without information leakage. Opt. Commun. 283, 2288 (2010)
Wang, H., Zhang, Y.Q., Liu, X.F., Hu, Y.P.: Efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Inf. Process. 15, 2593 (2016)
Zhou, N.R., Hua, T.X., Wu, G.T., He, C.S., Zhang, Y.: Single-photon secure quantum dialogue protocol without information leakage. Int. J. Theor. Phys. 53, 3829 (2014)
Zhang, L.-L., Zhan, Y.-B.: Quantum dialogue by using the two-qutrit entangled states. Mod. Phys. Lett. B 23, 2993 (2009)
Gao, G.: Information leakage in quantum dialogue by using the two-qutrit entangled states. Mod. Phys. Lett. B 28, 1450094 (2014)
Yu, Z.B., Gong, L.H., Zhu, Q.B., Cheng, S., Zhou, N.R.: Efficient three-party quantum dialogue protocol based on the continuous variable GHZ states. Int. J. Theor. Phys. 55, 3147 (2016)
Hwang, T., Luo, Y.-P.: Probabilistic authenticated quantum dialogue. Quantum Inf. Process. 14, 4631 (2015)
Zheng, C., Long, G.F.: Quantum secure direct dialogue using Einstein–Podolsky–Rosen pairs. Sci. China Phys. Mech. Astron. 57, 1238 (2014)
Ye, T.-Y.: Quantum secure direct dialogue over collective noise channels based on logical Bell states. Quantum Inf. Process. 14, 1487 (2015)
Sharma, V., Thapliyal, K., Pathak, A., Banerjee, S.: A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols. Quantum Inf. Process. 15, 4681 (2016)
Thapliyal, K., Pathak, A.: Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particles. Quantum Inf. Process. 14, 2599 (2015)
Yang, C.W., Hwang, T.: Quantum dialogue protocols immune to collective noise. Quantum Inf. Process. 12, 2131 (2013)
Boileau, J.C., Gottesman, D., Laflamme, R., Poulin, D., Spekkens, R.W.: Robust polarization-based quantum key distribution over a collective-noise channel. Phys. Rev. A 92, 017901 (2004)
Chang, C.H., Yang, C.W., Hzu, G.R., Hwang, T., Kao, S.H.: Quantum dialogue protocols over collective noise using entanglement of GHZ state. Quantum Inf. Process. 15, 2971 (2016)
Sharma, R.D., Thapliyal, K., Pathak, A., Pan, A.K., De, A.: Which verification qubits perform best for secure communication in noisy channel? Quantum Inf. Process. 15, 1703 (2016)
Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13, 2391 (2014)
Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, New Delhi (2008)
Verstraete, F., Dehaene, J., Moor, B.De, Verschelde, H.: Four qubits can be entangled in nine different ways. Phys. Rev. A 65, 052112 (2002)
Chterental, O., Djokovic, D.Z.: Normal forms and tensor ranks of pure states of four qubits. In: Ling, G.D. (ed.) Linear Algebra Research Advances, chap. 4, pp. 133–167. Nova Science, New York (2007)
Borsten, L., Dahanayake, D., Duff, M.J., Marrani, A., Rubens, W.: Four-qubit entanglement classification from string theory. Phys. Rev. Lett. 105, 100507 (2010)
Gour, G., Wallach, N.R.: All maximally entangled four-qubit states. J. Math. Phys. 51, 112201 (2010)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)
Lin, C.Y., Yang, C.W., Hwang, T.: Authenticated quantum dialogue based on Bell states. Int. J. Theor. Phys. 54, 780 (2015)
Kanamori, Y., Yoo, S.M., Gregory, D.A., Sheldon, F.T.: On quantum authentication protocols. In: IEEE Global Telecommunications Conference (GLOBECOM ’05), vol. 3. IEEE (2005)
Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A. 62, 022305 (2000)
Zhang, Z., Zeng, G., Zhou, N., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A. 356, 199 (2006)
Wang, M., Ma, W., Shen, D., Wang, L.: A quantum dialogue protocol based on four-qubit entangled state. Int. J. Theor. Phys. 54, 1388 (2015)
Song, J., Zhang, S.: Comment on: “Quantum exam”. Phys. Lett. A 350, 174 (2006)
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)
Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.-J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)
Li, X.-H., Deng, F.-G., Zhou, H.-Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)
Tan, Y.G., Cai, Q.Y.: Classical correlation in quantum dialogue. Int. J. Quantum Inf. 6, 325 (2008)
Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)
Acknowledgements
AB acknowledges support from the Council of Scientific and Industrial Research, Government of India (Scientists’ Pool Scheme). CS thanks Japan Society for the Promotion of Science (JSPS), Grant-in-Aid for JSPS Fellows No. 15F15015. She also thanks IISER Kolkata for the hospitality provided during the initial phase of the work. KT and AP thank Defense Research and Development Organization (DRDO), India, for the support provided through the Project No. ERIP/ER/1403163/M/01/1603.
Author information
Authors and Affiliations
Corresponding author
Appendix: Modified Pauli groups and the notation used
Appendix: Modified Pauli groups and the notation used
Modified Pauli groups and the notations used to denote them in the present work were introduced earlier in [20, 39]. Here, for consistency, we briefly summarize the definition and the notation used.
It is easy to verify that the set of Pauli operators \(\{I_{2}, \sigma _{x}, i\sigma _{y}, \sigma _{z}\}\) forms a group under multiplication \(G_{1}^{\prime }=\{ \pm I_{2},\pm iI_{2},\pm \sigma _{x},\pm i\sigma _{x},\pm \sigma _{y},\pm i\sigma _{y},\pm \sigma _{z},\pm i\sigma _{z}\} \) (cf. Section 10.5.1 of [40]). The closure property of \(G_{1}^{\prime }\) is satisfied under normal matrix multiplication because of the inclusion of ±1 and ±i. However, if any of the operators \(\sigma _{i},-\sigma _{i}, i\sigma _{i}\) or \(-i\sigma _{i}\) operates on a quantum state, the effect would be the same. Keeping this in mind, if global phase is ignored from the product of matrices (which is consistent with quantum mechanics), we obtain a modified Pauli group \(G_{1}=\{I_{2}, \sigma _{x}, i\sigma _{y}, \sigma _{z}\}=\{I_{2},X, iY, Z\}\). Clearly, under the above-defined multiplication rule, \(G_{1}\) is an Abelian group of order 4 and its generators are \(\langle X,Z\rangle ,\langle X,iY\rangle \) and \(\langle iY,Z\rangle \). Similarly, we may define the modified generalized Pauli group \(G_{n}=G_{1}^{\otimes n}\) as a group of order \(2^{2^{n}}=4^{n}\) and whose elements are all n-fold tensor products of Pauli matrices [20]. For example,
In Ref. [20], it was discussed in detail how to construct subgroups of \(G_{2}\). Here, we list 11 subgroups of \(G_{2}\), which are used in this paper (each is of order 8):
where \(G_{n}^{j}(m)\) denotes jth subgroup of order \(m<4^{n}\) of the group \(G_{n}\) whose order is \(4^{n}.\)
Rights and permissions
About this article
Cite this article
Banerjee, A., Shukla, C., Thapliyal, K. et al. Asymmetric quantum dialogue in noisy environment. Quantum Inf Process 16, 49 (2017). https://doi.org/10.1007/s11128-016-1508-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-016-1508-4