Abstract
In order to improve the eavesdropping detection efficiency in a two-step quantum direct communication protocol, an improved eavesdropping detection strategy using the four-particle cluster state is proposed, in which the four-particle cluster state is used to detect eavesdroppers. During the security analysis, the method of the entropy theory is introduced, and two detection strategies are compared quantitatively using the constraint between the information that the eavesdropper can obtain and the interference that has been introduced. If the eavesdroppers intend to obtain all information, the eavesdropping detection rate of the original two-step quantum direct communication protocol using EPR pair block as detection particles will be 50%; while the proposed strategy’s detection rate will be 75%. In the end, the security of the proposed protocol is discussed. The analysis results show that the eavesdropping detection strategy presented is more secure.
Article PDF
Similar content being viewed by others
References
Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing. In: Proceeding of the IEEE International Conference on Computer, Systems and Signal Processing, Bangalore, 1984. 175–179
Bennett C H, Brassard G, Crepeau C, et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys Rev Lett, 1993, 70: 1895–1899
Peng F, Xie G J, Wu T H. Optimizing quantum teleportation circuit using genetic algorithm. In: Proceeding of 2009 IEEE International Conference on Granular Computing, 2009. 466–470
Pan J W. Recent progress in quantum teleportation experiments. In: Proceeding of 2011 Conference on Lasers and Electro-Optics (CLEO), 2011. 1–2
Prakash H. Quantum teleportation. In: Proceeding of 2009 International Conference on Emerging Trends in Electronic and Photonic Devices & Systems, 2009. 18–23
Hari P. Quantum teleportation. In: Proceedings of the International Conference on Emerging Trends in Electronic and Photonic Devices & Systems, 2009
Akira F. Quantum teleportation and quantum information processing. In: Proceedings of the Quantum Electronics and Laser Science Conference, 2010
Li C Y, Li X H, Deng F G, et al. Complete multiple round quantum dense coding with quantum logical network. Chin Sci Bull, 2007, 59: 1162–1165
Zhao Y H, Wen X J. A covert communication protocol based on quantum dense coding. In: Proceedings of 2011 International Conference on Electronic and Mechanical Engineering and Information Technology, 2011. 3376–3379
Li C Y, Li X H, Deng F G, et al. Complete multiple round quantum dense coding with quantum logical network. Chin Sci Bull, 2007, 52: 1162–1165
Hillery M, Buzek V, Berthiaume A. Quantum secret sharing. Phys Rev A, 1999, 59: 1829–1834
Yang Y G, Wen Q Y. Threshold quantum secret sharing between multi-party and multi-party. Sci China Ser G: Phys Mech Astron, 2008, 51: 1308–1315
Long G L, Liu X S. Theoretically efficient high-capacity quantumkey-distribution scheme. Phys Rev A, 2002, 65: 032302
Li J, Jin H F, Jing B. Improved quantum “ping-pong” protocol based on GHZ state and classical XOR operation. Sci China Phys Mech Astron, 2011, 54: 1612–1618
Shimizu K, Imoto N. Communication channels secured from eavesdropping via transmission of photonic Bell states. Phys Rev A, 1999, 60: 157–166
Yuan H, Song J, Zhou J, et al. High-capacity deterministic secure four-qubit W state protocol for quantum communication based on order rearrangement of particle pairs. Int J Theor Phys, 2011, 50: 2403–2409
Beige A, Englert B G, Kurtsiefer C, et al. Secure communication with a publicly known key. Acta Phys Pol A, 2002, 101: 357
Yang Y G, Wen Q Y. Threshold quantum secure direct communication without entanglement. Sci China Ser G: Phys Mech Astron, 2008, 51: 176–183
Li X H, Deng F G. Improving the security of secure direct communication based on the secret transmitting order of particles. Phys Rev A, 2006, 74: 054302
Li X H, Li C Y, Deng F G, et al. Quantum secure direct communication with quantum encryption based on pure entangled states. Chin Phys Lett, 2007, 16: 2149–2153
Deng F G, Long G L, Liu X S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys Rev A, 2003, 68: 042317
Nguyen B A. Quantum dialogue. Phys Rev A, 2004, 328: 6–10
Wang D, Chai X C, Zha X W, et al. Bidirectional quantum secure communication based on cluster state. In: Proceeding of 2010 International Symposium on Information Science and Engineering, 2010. 267–270
Zhang X J, Xie S C, Wang D. Three-party quantum secure direct communication base on partially entangled states. In: Proceedings of 2011 International Conference on Mechatronic Science, Electric Engineering and Computer, 2011. 1555–1558
Man Z X, Xia Y J. Improving of security of three-party quantum secure direct communication based on GHZ states. Chin Phys Lett, 2007, 24: 15–18
Chen Y, Man Z X, Xia Y J. Quantum bidirectional secure direct communication via entanglement swapping. Chin Phys Lett, 2007, 24: 19–22
Yang Y G, Wen Q Y. Quasi-secure quantum dialogue using single photons. Sci China Ser G-Phys Mech Astron, 2007, 50: 558–562
Boström K, Felbringer T. Deterministic secure direct communication using entanglement. Phys Rev Lett, 2002, 89: 187902
Brassard G, Salvail L. Secret-key reconciliation by public discussion. Lect Notes Comput Sci, 1994, 765: 410–423
Zhou Y Y, Zhou X J, Yang S J. Study on passive decoy-state protocol for quantum key distribution. In: Proceeding of 3rd International Conference on Advanced Computer Theory and Engineering, 2010. 91–94
Li C Y, Li X H, Deng F G, et al. Efficient quantum cryptography network entanglement and quantum memory. Chin Phys Lett, 2006, 23: 2897–2899
Cao W F, Yang Y G, Wen Q Y. Quantum secure direct communication with cluster states. Sci China Phys Mech Astron, 2010, 53: 1271–1275
Wang G Y, Fang X M, Tan X H. Quantum secure direct communication with cluster state. Chin Phys Lett, 2006, 23: 2658
Walther P, Pan J W, Aspelmeyer M, et al. De Broglie wavelength of a non-local four-photon state. Nature, 2004, 429: 158–161
Walther P, Resch K J, Rudolph E, et al. Experimental one-way quantum computing. Nature, 2005, 434: 169–176
Zhang W, Liu Y M, Wang Z Y, et al. Discriminating 16 mutually orthogonal 4-atom cluster states via cavity QED in teleporting arbitrary unknown two-atom state with a 4-atom cluster state as quantum channel. Int J Mod Phys C, 2008, 19: 741–747
Tokunaga Y, Kuwashiro S, Yamamoto T, et al. Generation of high-fidelity four-photon cluster state and quantum-domain demonstration of one-way quantum computing. Phys Rev Lett, 2008, 100: 210501
Raussendorf R, Briegel H J. One-way quantum computer. Phys Rev Lett, 2001, 86: 5188–5191
Wójcik A. Eavesdropping on the “ping-pong” quantum communication protocol. Phys Rev Lett, 2003, 90: 157901
Deng F G, Li X H, Li C Y, et al. Eavesdropping on the “ping-pong” quantum communication protocol freely in a noise channel. Chin Phys Lett, 2007, 16: 277–281
Cai Q Y. The “ping-pong” protocol can be attacked without eavesdropping. Phys Rev Lett, 2003, 91: 109801
Zhang Z J, Man Z X. The improved Boström-Felbinger protocol against attacks without eavesdropping. Int J Quant Inform, 2004, 2: 521–527
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is published with open access at Springerlink.com
Rights and permissions
This article is published under an open access license. Please check the 'Copyright Information' section either on this page or in the PDF for details of this license and what re-use is permitted. If your intended use exceeds what is permitted by the license or if you are unable to locate the licence and re-use information, please contact the Rights and Permissions team.
About this article
Cite this article
Li, J., Jin, H. & Jing, B. Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol. Chin. Sci. Bull. 57, 4434–4441 (2012). https://doi.org/10.1007/s11434-012-5516-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11434-012-5516-1