Single-photon-memory measurement-device-independent quantum secure
direct communication
- URL: http://arxiv.org/abs/2212.05661v1
- Date: Mon, 12 Dec 2022 02:23:57 GMT
- Title: Single-photon-memory measurement-device-independent quantum secure
direct communication
- Authors: Xiang-Jie Li, Dong Pan, Gui-Lu Long, and Lajos Hanzo
- Abstract summary: Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
- Score: 63.75763893884079
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum secure direct communication (QSDC) uses the quantum channel to
transmit information reliably and securely. In order to eliminate the security
loopholes resulting from practical detectors, the
measurement-device-independent (MDI) QSDC protocol has been proposed. However,
block-based transmission of quantum states is utilized in MDI-QSDC, which
requires practical quantum memory that is still unavailable at the time of
writing. For circumventing this impediment, we propose a single-photon-memory
MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
The performance of the proposed protocol is characterized by simulations
considering realistic experimental parameters, and the results show that it is
feasible to implement SPMQC by relying on present-day technology.
Related papers
- Asynchronous measurement-device-independent quantum digital signatures [0.9786690381850356]
Quantum digital signatures (QDSs) distribute and measure quantum states by key generation protocols and then sign messages via classical data processing.
Here, we propose an asynchronous measurement-device-independent (MDI) QDS protocol with asynchronous two-photon interference strategy and one-time universal hashing method.
Our findings present an efficient and practical MDI-QDS scheme, paving the way for large-scale data processing with non-repudiation in quantum networks.
arXiv Detail & Related papers (2024-07-11T02:09:55Z) - Memory-assisted measurement-device-independent quantum secret sharing [14.312422858194394]
Measurement-device-independent quantum secret sharing (MDI-QSS) can eliminate all the security loopholes associated with imperfect measurement devices.
We propose a high-efficient quantum memory (QM)-assisted MDI-QSS protocol, which employs the QM-assisted synchronization of three heralded single-photon sources.
arXiv Detail & Related papers (2024-05-27T09:06:26Z) - Mixed-encoding one-photon-interference quantum secure direct communication [0.9517611876453678]
One-photon-interference QSDC (OPI-QSDC) is a technique that enhances the transmission distance and ensures secure point-to-point information transmission.
This paper proposes a mixed-encoding one-photon-interference QSDC protocol that removes the need for phase locking technology.
arXiv Detail & Related papers (2024-04-03T14:56:06Z) - One-photon-interference quantum secure direct communication [2.9464311367375755]
Measurement-device-independent (MDI) QSDC protocols can eliminate the security loopholes associated with measurement devices.
We propose a one-photon-interference MDI QSDC protocol which transcends the need for quantum memory, ideal single-photon sources, or entangled light sources.
arXiv Detail & Related papers (2024-04-03T14:51:58Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Verification of Continuous-Variable Quantum Memories [0.0]
verification of quantum memories (non-EB channels) is a task in which an honest user wants to test the quantum memory of an untrusted, remote provider.
Here, we study the MDI certification of non-EB channels in continuous variable (CV) systems.
arXiv Detail & Related papers (2023-05-12T14:28:35Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.