WANG He, ZHANG Yuqing, WU Gaofei, et al., “Authenticated Quantum Dialogue Without Information Leakage,” Chinese Journal of Electronics, vol. 27, no. 2, pp. 270-275, 2018, doi: 10.1049/cje.2018.01.010
Citation: WANG He, ZHANG Yuqing, WU Gaofei, et al., “Authenticated Quantum Dialogue Without Information Leakage,” Chinese Journal of Electronics, vol. 27, no. 2, pp. 270-275, 2018, doi: 10.1049/cje.2018.01.010

Authenticated Quantum Dialogue Without Information Leakage

doi: 10.1049/cje.2018.01.010
Funds:  This work is supported by the National Key Research and Development Project of China (No.2016YFB0800703), the National Natural Science Foundation of China (No.61572460, No.61272481, No.61602361), the China Postdoctoral Science Foundation (No.2016M602776), the National Information Security Special Projects of National Development and Reform Commission of China (No.(2012)1424), the Open Project Program of the State Key Laboratory of Information Security (No.2017-ZD-01), and the China 111 Project (No.B16037).
More Information
  • Corresponding author: ZHANG Yuqing (corresponding author) received his Ph.D. degree in cryptography from Xidian University in 2000. He is a professor in the University of Chinese Academy of Sciences. He is a member of IEEE. His research interests include cryptography, network and information system security, and trust management. (Email:zhangyq@nipc.org.cn)
  • Received Date: 2017-03-01
  • Rev Recd Date: 2017-10-10
  • Publish Date: 2018-03-10
  • A lot of authenticated quantum dialogue protocols are springing up. Many of them have the problem of information leakage, or suffer from Man-In-TheMiddle attack. Some protocols can guarantee security, but have relatively low efficiency. Based on the above situation, we present a novel authenticated quantum dialogue protocol by using Bell states and entanglement swapping. In this protocol, we adopt Einstein-Podolsky-Rosen (EPR) pairs to detect eavesdropping and transmit secret messages. We employ polarized photons to achieve authentication of users' identity information. Compared with other quantum dialogue schemes with authentication, our protocol has several advantages. The transmitted particles are passed once and do not carry any secret messages. The proposed protocol can overcome the drawback of information leakage and resist against typical attacks. The efficiency is acceptable.
  • loading
  • C.H. Bennett and G. Brassard, "Quantum cryptography:Public key distribution and coin tossing", Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India, pp.175-179, 1984.
    C.H. Bennett, "Quantum cryptography using any two nonorthogonal states", Physical Review Letters, Vol.68, No.21, pp.3121-3124, 1992.
    A.K. Ekert, "Quantum cryptography based on Bells theorem", Physical Review Letters, Vol.67, No.6, pp.661-663, 1991.
    A. Cabello, "Quantum key distribution in the Holevo limit", Physical Review Letters, Vol.85, No.26, pp.5635-5638, 2000.
    F.G. Deng and G.L. Long, "Controlled order rearrangement encryption for quantum key distribution", Physical Review A, Vol.68, No.4, pp.4343-4349, 2002.
    F.G. Deng and G.L. Long, "Bidirectional quantum key distribution protocol with practical faint laser pulses", Physical Review A, Vol.70, No.1, pp.235-238, 2004.
    X.H. Li, F.G. Deng and H.Y. Zhou, "Efficient quantum key distribution over a collective noise channel", Physical Review A, Vol.78, No.2, Article ID 022321, 2008.
    A. Beige, B.G. Englert, et al., "Secure communication with a publicly known key", Acta Physica Polonica, Vol.101, No.1, pp.357-368, 2001.
    K. Bostrom and T. Felbinger, "Deterministic secure direct communication using entanglement", Physical Review Letters, Vol.89, No.18, Article ID 187902, 2002.
    F.G. Deng, G.L. Long and X.S. Liu, "Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block", Physical Review A, Vol.68, No.4, 042317, 2003.
    Z.X. Man, Z.J. Zhang and Y. Li, "Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations", Chinese Physics Letters, Vol.22, No.1, pp.18-21, 2005.
    G.Y. Wang, X.M. Fang and X.H. Tan, "Quantum secure direct communication with cluster state", Chinese Physics Letters, Vol.23, No.10, pp.2658-2661, 2006.
    A.D. Zhu, Y. Xia and Q.B. Fan, "Secure direct communication based on secret transmitting order of particles", Physical Review A, Vol.73, No.2, pp.457-460, 2006.
    B.A. Nguyen, "Quantum dialogue", Physics Letters A, Vol.328, No.1, pp.6-10, 2004.
    Z.X. Man, Z.J. Zhang and Y. Li, "Quantum dialogue revisited", Chinese Physics Letters, Vol.22, No.1, pp.22-24, 2005.
    Z.X. Man, Y.J. Xia and Z.J. Zhang, "Secure deterministic bidirectional communication without entanglement", International Journal of Quantum Information, Vol.4, No.4, pp.739-746, 2006.
    Y. Xia, J. Song and J. Nie, "Controlled secure quantum dialogue using a pure entangled GHZ states", Communications in Theoretical Physics, Vol.48, No.11, pp.841-846, 2007.
    Y. Chen, Z.X. Man and Y.J. Xia, "Quantum bidirectional secure direct communication via entanglement swapping", Chinese Physics Letters, Vol.24, No.1, pp.19-22, 2007.
    F. Gao, F.Z Guo and Q.Y. Wen, "Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication", Science China Physics, Mechanics and Astronomy, Vol.51, No.5, pp.559-566, 2008.
    Y.G. Tan and Q.Y. Cai, "Classical correlation in quantum dialogue", International Journal of Quantum Information, Vol.6, No.2, pp.325-329, 2008.
    T.Y. Ye and L.Z. Jiang, "Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared Bell state", Physica Scripta, Vol.89, No.1, pp.169-174, 2014.
    H. Wang, Y.Q. Zhang, et al., "Two quantum dialogue schemes based on Bell states and two-qutrit entangled states without information leakage", Journal of National University of Defense Technology, Vol.34, No.2, pp.10-13, 2012.
    H. Wang, Y.Q. Zhang and Y.P. Hu, "Efficient quantum dialogue by using the two-qutrit entangled states without information leakage", International Journal of Theoretical Physics, Vol.52, No.6, pp.1745-1750, 2013.
    H. Wang, X.F. liu, Y.Q. Zhang, et al., "Efficient quantum dialogue using entangled states and entanglement swapping without information leakage", Quantum Information Processing, Vol.15, No.6, 2593-2603, 2016.
    H. Lee, J. Lim and H.J. Yang, "Quantum direct communication with authentication", Physical Review A, Vol.73, No.4, Article ID 042305, 2006.
    Z.J. Zhang, J. Liu, et al., "Comment on quantum direct communication with authentication", Physical Review A, Vol.75, No.2, pp.243-262, 2010.
    D. Liu, C.X. Pei, D.X. Quan, et al.,"A new quantum secure direct communication scheme with authentication", Chinese Physics Letters, Vol.27, No.5, pp.23-25, 2010.
    F. Gao, S.J. Qin, F.Z. Guo, et al., "Cryptanalysis of quantum secure direct communication and authentication scheme via Bell states", Chinese Physics Letters, Vol.28, No.2, pp.20303-20306, 2011.
    M. Naseri, "An efficient protocol for quantum secure dialogue with authentication by using single photons", International Journal of Quantum Information, Vol.9, No.07n08, pp.1677-1684, 2011.
    D. Shen, W. Ma, X. Yin, et al., "Quantum dialogue with authentication based on Bell states", International Journal of Theoretical Physics, Vol.52, No.6, pp.1825-1835, 2013.
    T.H, Lin, C.Y. Lin and T. Hwang, "Man-in-the-middle attack on quantum dialogue with authentication based on Bell states", International Journal of Theoretical Physics, Vol.52, No.6, pp.3199-3203, 2013.
    M. Naseri, "Revisiting quantum authentication scheme based on entanglement swapping", International Journal of Theoretical Physics, Vol.55, No.5, pp.2428-2435, 2016.
    C.Y. Lin, C.W. Yang and T. Hwang, "Authenticated quantum dialogue based on Bell states", International Journal of Theoretical Physics, Vol.54, No.3, pp.780-786, 2015.
    J. LI, X.X Ye, et al., "Improved eavesdropping detection strategy based on extended three-particle greenberger-hornezeilinger state in two-step quantum direct communication protocol", Chinese Journal of Electronics, Vol.21, No.4, pp.736-739, 2012.
    T.Y. Ye, "Fault-tolerant authenticated quantum dialogue using logical Bell states", Quantum Information Processing, Vol.14, No.9, pp.3499-3514, 2015.
    F.G. Deng, X.H. Li and H.Y. Zhou, "Improving the security of multiparty quantum secret sharing against Trojan horse attack", Physical Review A, Vol.72, Article ID 044302, 2005.
    J. Li, Z. Pan, J. Zheng, et al., "The security analysis of quantum SAGR04 protocol in collective-rotation noise channel",Chinese Journal of Electronics, Vol.24, No.4, pp.689-693, 2015.
    Z.H. Liu, H.W. Chen and W.J. Liu, "Information leakage problem in high-capacity quantum secure communication with authentication using Einstein-Podolsky-Rosen pairs", Chinese Physics Letters, Vol.33, No.7, pp.14-15, 2016.
    G. Gao and Y. Wang, "Cryptanalysis of controlled mutual quantum entity authentication using entanglement swapping", Communications in Theoretical Physics, Vol.67, No.1, pp.33-36, 2017.
    M. Xiao, Y.R. Cao and X.L. Song, "Efficient and secure authenticated quantum dialogue protocols over collective-noise channels", Chinese Physics Letters, Vol.34, No.3, pp.6-10, 2017.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (415) PDF downloads(192) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return