Abstract
We propose a new quantum private communication protocol, in which the anonymity of the sender and the privacy of the quantum information are perfectly protected except with exponentially small probability. Furthermore, this protocol uses single particles to construct anonymous entanglement instead of multipartite entangled states, and thus it reduces quantum resources compared with the previous work.
Similar content being viewed by others
References
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)
Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol. 1(1), 65–75 (1988)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press, New York (1984)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)
Wang, X.B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94(23), 230503 (2005)
Wang, T.Y., Wen, Q.Y., Chen, C.B.: Cryptanalysis and improvement of a multi-user quantum key distribution protocol. Opt. Commun. 283(24), 5261–5263 (2010)
Sun, Y., Wen, Q.Y., Gao, F., et al.: Robust variations of the Bennett-Brassard 1984 protocol against collective noise. Phys. Rev. A 80(3), 032321 (2009)
Gao, F., Qin, S.J., Guo, F., et al.: Dense-coding attack on threeparty quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630–635 (2011)
Boströem, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(23), 187902 (2002)
Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)
Chen, X.B., Wang, T.Y., Du, J.Z., et al.: Controlled quantum secure direct communication with quantum encryption. Int. J. Quantum Inf. 6(3), 543–551 (2008)
Chen, X.B., Wen, Q.Y., Guo, F.Z., et al.: Controlled quantum secure direct communication with W state. Int. J. Quantum Inf. 6(4), 899–906 (2008)
Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Multiparty controlled quantum secure direct communication with phase encryption. Int. J. Quantum Inf. 9(2), 801–807 (2011)
Qin, S.J., Gao, F.Z., Wen, Q.Y., et al.: Cryptanalysis of the Hillery-Buežk-Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76(6), 062324 (2007)
Wang, T.Y., Wen, Q.Y., Chen, X.B., et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)
Wang, T.Y., Wen, Q.Y.: Security of a kind of quantum secret sharing with single photons. Quantum Inf. Comput. 11(5–6), 434–443 (2011)
Chen, X.B., Niu, X.X., Zhou, X.J., et al.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. (2012). doi:10.1007/s11128-012-0379-6
Zeng, G.H., Christoph, H.K.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)
Yang, Y.G., Zhou, Z., Teng, Y.W., et al.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61(3), 773–778 (2011)
Wang, T.Y., Wen, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455–463 (2012)
Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)
Li, Y., Zeng, G.H.: Quantum anonymous voting system based on entangled state. Opt. Rev. 15(5), 1–5 (2008)
Horoshko, D., Kilin, S.: Quantum anonymous voting with anonymity check. Phys. Lett. A 375(8), 1172–1175 (2011)
Bonanome, M., Bužek, V., Hillery, M., et al.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84(2), 022331 (2011)
Boykin, P.O.: Information security and quantum mechanics: security of quantum protocols. PhD thesis, University of California, Los Angeles (2002)
Christandl, M., Wehner, S.: Quantum anonymous transmissions. In: Proc. Asiacrypt, pp. 217–235. Springer, Berlin (2005)
Bennett, C.H., Brassard, G., Crépeau, C., et al.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70(13), 1895–1899 (1993)
Chen, X.B., Xu, G., Yang, Y.X., et al.: Centrally controlled quantum teleportation. Opt. Commun. 283(23), 4802–4809 (2010)
Chen, X.B., Wen, Q.Y., Xu, G., et al.: Comment on “General relation between the transformation operator and an invariant under stochastic local operations and classical communication in quantum teleportation”. Phys. Rev. A 79(3), 036301 (2009)
Chen, X.B., Wen, Q.Y., Sun, Z.X., et al.: Deterministic and exact entanglement teleportation via the W state. Chin. Phys. B 19(1), 010303 (2010)
Wang, T.Y., Wen, Q.Y.: Controlled quantum teleportation with bell states. Chin. Phys. B 20(4), 040307 (2011)
Bouda, J., Šprojcar, J.: Anonymous transmission of quantum information. In: Proc. the First Int. Conf. on Quantum, Nano, and Micro Technologies 2007, pp. 12–17. IEEE Press, New York (2007)
Brassard, G., Broadbent, A., Fitzsimons, J., et al.: Anonymous quantum communication. In: Proc. Asiacrypt 2007, pp. 460–473. Springer, Berlin (2007)
Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Quantum communications with an anonymous receiver. Sci. China Ser. G, Phys. Astron. 53(12), 2227–2231 (2010)
Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Economical quantum anonymous transmissions. J. Phys. B, At. Mol. Opt. Phys. 43(24), 245501 (2010)
Broadbent, A., Tapp, A.: Information-theoretic security without an honest majority. In: Proc. Asiacrypt 2007, pp. 410–426. Springer, Berlin (2007)
Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)
Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Comment on “experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101(20), 208901 (2008)
Feng, Y., Duan, R.Y., Ying, M.S.: Unambiguous discrimination between mixed quantum states. Phys. Rev. A 70(1), 012308 (2004)
Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “Quantum exam”. Phys. Lett. A 360(6), 748–750 (2007)
Qin, S.J., Wen, Q.Y., Zhu, F.C.: An external attack on the Brádler-Dušek protocol. J. Phys. B, At. Mol. Opt. Phys. 40(24), 4661–4664 (2007)
Gao, F., Lin, S., Wen, Q.Y., et al.: A special eavesdropping on one-sender versus n-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561–1564 (2008)
Qin, S.J., Gao, F., Guo, F.Z., et al.: Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”. Phys. Rev. A 82(3), 036301 (2010)
Gao, F., Qin, S.J., Wen, Q.Y., et al.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283(1), 192–195 (2010)
Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189–3193 (2008)
Wang, T.Y., Wen, Q.Y., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)
Wang, T.Y., Qin, S.J., Wen, Q.Y., et al.: Analysis and improvement of multiparty controlled quantum secure direct communicating protocol. Acta Phys. Sin. 57(12), 7452–7456 (2008)
Deng, F.G., Li, X.H., Zhou, H.Y., et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)
Acknowledgements
We are grateful to the anonymous referees for helpful comments. This work was supported by the National Natural Science Foundation of China (Grant Nos. 61152002, 61202317), the Open Foundation of State Key Laboratory of Information Security (Grant No. 01-04-2), the Young Key Teacher Foundation of Henan Province (Grant No. 2012GGJS-157), and the Natural Science Foundation of the Education Bureau of Henan Province of China (Grant No. 2010B120008).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Cai, XQ., Niu, HF. Quantum Private Communication with an Anonymous Sender. Int J Theor Phys 52, 411–419 (2013). https://doi.org/10.1007/s10773-012-1346-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-012-1346-9