Quantum dialogue without information leakage based on the entanglement
swapping between any two Bell states and the shared secret Bell state
- URL: http://arxiv.org/abs/2205.01877v1
- Date: Wed, 4 May 2022 03:52:51 GMT
- Title: Quantum dialogue without information leakage based on the entanglement
swapping between any two Bell states and the shared secret Bell state
- Authors: Tian-Yu Ye, Li-Zhen Jiang
- Abstract summary: The proposed protocol integrates the ideas of block transmission, two-step transmission and unitary operation encoding together.
Security analysis shows that the proposed protocol can resist the general active attacks from an outside eavesdropper Eve.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In order to avoid the risk of information leakage during the information
mutual transmission between two authorized participants, i.e., Alice and Bob, a
quantum dialogue protocol based on the entanglement swapping between any two
Bell states and the shared secret Bell state is proposed. The proposed protocol
integrates the ideas of block transmission, two-step transmission and unitary
operation encoding together using the Bell states as the information carriers.
Besides the entanglement swapping between any two Bell states, a shared secret
Bell state is also used to overcome the information leakage problem, which not
only makes Bob aware of the prepared initial state but also is used for Bob's
encoding and entanglement swapping. Security analysis shows that the proposed
protocol can resist the general active attacks from an outside eavesdropper
Eve. Moreover, the relation between the maximal amount of information Eve can
gain and the detection probability is derived.
Related papers
- Realizing fracton order from long-range quantum entanglement in programmable Rydberg atom arrays [45.19832622389592]
Storing quantum information requires battling quantum decoherence, which results in a loss of information over time.
To achieve error-resistant quantum memory, one would like to store the information in a quantum superposition of degenerate states engineered in such a way that local sources of noise cannot change one state into another.
We show that this platform also allows to detect and correct certain types of errors en route to the goal of true error-resistant quantum memory.
arXiv Detail & Related papers (2024-07-08T12:46:08Z) - Semiquantum secret sharing by using x-type states [4.397981844057195]
A semiquantum secret sharing protocol based on x-type states is proposed.
It can accomplish the goal that only when two classical communicants cooperate together can they extract the shared secret key of a quantum communicant.
Detailed security analysis turns out that this protocol is completely robust against an eavesdropper.
arXiv Detail & Related papers (2022-08-03T08:58:45Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Fault tolerant authenticated quantum dialogue using logical Bell states [0.0]
Two fault tolerant authenticated quantum dialogue (AQD) protocols are proposed in this paper.
logical Bell states as the quantum resource are employed to combat the collective-dephasing noise and the collective-rotation noise.
In each of two proposed protocols, the information transmitted through the classical channel is assumed to be eavesdroppable and modifiable.
arXiv Detail & Related papers (2022-05-05T03:36:41Z) - Fault tolerant channel-encrypting quantum dialogue against collective
noise [0.0]
Two fault tolerant channel-encrypting quantum dialogue protocols against collective noise are presented.
One is against collective-dephasing noise, while the other is against collective-rotation noise.
Einstein-Podolsky-Rosen pairs, which play the role of private quantum key, are securely shared between two participants.
arXiv Detail & Related papers (2022-05-05T02:56:29Z) - Information leakage resistant quantum dialogue against collective noise [0.0]
Two information leakage resistant quantum dialogue (QD) protocols over a collective-noise channel are proposed.
Two secret messages are encoded on the initial logical qubits via two unitary operations.
detailed security analysis shows that Eve's several famous active attacks can be effectively overcome.
arXiv Detail & Related papers (2022-05-05T02:23:47Z) - Large payload bidirectional quantum secure direct communication without
information leakage [0.0]
Two remote authorized parties, Alice and Bob, can safely exchange their individual secret messages without worrying about the information leakage problem.
Our protocol uses a shared secret GHZ state to overcome the information leakage problem.
arXiv Detail & Related papers (2022-05-05T02:02:51Z) - Quantum cryptography with classical communication: parallel remote state
preparation for copy-protection, verification, and more [125.99533416395765]
Many cryptographic primitives are two-party protocols, where one party, Bob, has full quantum computational capabilities, and the other party, Alice, is only required to send random BB84 states to Bob.
We show how such protocols can generically be converted to ones where Alice is fully classical, assuming that Bob cannot efficiently solve the LWE problem.
This means that all communication between (classical) Alice and (quantum) Bob is classical, yet they can still make use of cryptographic primitives that would be impossible if both parties were classical.
arXiv Detail & Related papers (2022-01-31T18:56:31Z) - Quantum secure direct communication with private dense coding using
general preshared quantum state [59.99354397281036]
We study secure direct communication by using a general preshared quantum state and a generalization of dense coding.
For a practical application, we propose a concrete protocol and derive an upper bound of information leakage.
arXiv Detail & Related papers (2021-12-30T16:12:07Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.