Improved Eavesdropping Detection Strategy Based on Extended Three-particle Greenberger-Horne-Zeilinger State in Two-step Quantum Direct Communication Protocol[J]. Chinese Journal of Electronics, 2012, 21(4): 736-739.
Citation: Improved Eavesdropping Detection Strategy Based on Extended Three-particle Greenberger-Horne-Zeilinger State in Two-step Quantum Direct Communication Protocol[J]. Chinese Journal of Electronics, 2012, 21(4): 736-739.

Improved Eavesdropping Detection Strategy Based on Extended Three-particle Greenberger-Horne-Zeilinger State in Two-step Quantum Direct Communication Protocol

  • Received Date: 2012-02-01
  • Rev Recd Date: 2012-03-01
  • Publish Date: 2012-10-25
  • In order to improve the eavesdropping detection efficiency in two-step quantum direct communication protocol, an improved eavesdropping detection strategy using extended three-particle GHZ state is proposed, in which extended three-particle GHZ state is used to detect eavesdroppers. During the security analysis, the method of the entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information which eavesdropper can obtain and the interference introduced. If the eavesdroppers intend to obtain all information, the eavesdropping detection rate of the original two-step quantum direct communication protocol by using EPR pair block as detection particles is 50%; while the proposed strategy’s detection rate is 59%. In the end, the security of the proposed protocol is discussed. The analysis results show that the eavesdropping detection strategy presented is more secure.
  • loading
  • C.H. Bennett and G. Brassard, “Quantum cryptography:Public-key distribution and coin tossing”, Proceeding of theIEEE International Conference on Computer, Systems and SignalProcessing, Bangalore, India, pp.175-179, 1984.
    C.H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peresand W.K. Wooters, “Teleporting an unknown quantum statevia dual classical and Einstein-Podolsky-Rosen channels”, Phys.Rev. Lett., Vol.70, 1993.
    Kim. Yoon-Ho, S.P. Kulik and Shih. Yanhua, “Quantum teleportationwith a complete Bell state measurement”, J. Mod.Opt., Vol.49, pp.221-236, 2002.
    J. Li, H.F. Jin and B. Jing, “Improved quantum “Ping-pong”protocol based on GHZ state and classical XOR Operation”,Sci. China Ser. G, Vol.54, No.9, pp.1612-1618, 2011.
    Z.J. Zhang, Y.M. Liu and D.Wang, “Perfect teleportation of arbitraryn-qubit states using different quantum channels”, Phys.Lett. A, Vol.372, pp.28-32, 2007.
    J. Li, D.J. Song, X.J. Guo and B. Jing, “Improved quantum“Ping-pong” protocol based on five-qubit GHZ state and classicalCNOT operation”, Int. J. Theor. Phys., Vol.51, No.1,pp.292-302, 2012.
    H. Yuan, Q. He, X.Y. Hu et al., “Deterministic secure quantumcommunication with cluster state and bell-basis measurements”,Commun. Theor. Phys., Vol.50, 2008.
    J. Li, D.J. Song, X.J. Guo and B. Jing, “An improved “Pingpong”protocol based on four-qubit genuine entangled state”,Chinese Jaurnal of Electronics, Vol.20, No.3, pp.457-460, 2011.
    Prakash. Hari, “Quantum teleportation”, International Conferenceon Emerging Trends in Electronic and Photonic Devicesand Systems, 2009.
    J. Li, D.J. Song, X.J. Guo and B. Jing, “Quantum secure directcommunication protocol based on five-particles cluster stateand classical XOR operation”, Acta Electronica Sinica, Vol.36,No.1, pp.31-36, 2012. (in Chinese)
    F. Akira, “Quantum teleportation and quantum informationprocessing”, Quantum Electronics and Laser Science Conference,2010.
    J. Li, H.F. Jin and B. Jing, “Improved security detection strategyfor quantum “Ping-Pong” protocol and its security analysis”,Chin. Commun., Vol.8, No.3, pp.170-179, 2011.
    J. Li, D.J. Song, X.J. Guo and B. Jing, “An improved securitydetection strategy based on W state in “Ping-pong” Protocol”,Chinese Journal of Electronics, Vol.21, No.1, pp.117-120, 2012.
    M. Hillery, V. Buzek and A. Berthiaume, “Quantum secret sharing”,Phys. Rev. A, Vol.59, pp.1829-1834, 1999.
    S.K. Singh and R. Srikanth, “Generalized quantum secret sharing”,Phys. Rev. A, Vol.71, pp.012328, 2005.
    G.L. Long and X.S. Liu, “Theoretically efficient high-capacityquantum- key- distribution scheme”, Phys. Rev. A, Vol.65,032302, 2002.
    F.G. Deng, G.L. Long and X.S. Liu, “Two-step quantum directcommunication protocol using the Einstein-Podolsky-Rosenpair block”, Phys. Rev. A, Vol.68, 042317, 2003.
    G.L. Long, F.G. Deng, C. Wang X.H. Li, K. Wen and W.Y.Wang, “Quantum secure direct communication and deterministicsecure quant communication”, Front. Phys. China, Vol.2,No.3, pp.251-272, 2007.
    K. Boström and T. Felbringer, “Deterministic secure directcommunication using entanglement”, Phys. Rev. Lett., Vol.89,pp.187902, 2002.
    F. Gao, F.Z. Guo, Q.Y. Wen et al., “Comparing the efficiency ofdifferent detection strategies of the ‘Ping-pong’ protocol”, Sci.China, Ser. G-Phys Mech. Astron, Vol.39, No.2, pp.161-166,2009. (in Chinese)
    A. Wójcik, “Eavesdropping on the “Ping-pong” quantumcommunication protocol”, Phys. Rev. Lett., Vol.90, No.5,pp.157901, 2003.
    F.G. Deng, X.H. Li, C.Y. Li et al., “Eavesdropping on the“Ping-pong” quantum communication protocol freely in a noisechannel”, Chin. Phys. Lett., Vol.16, pp.277-281, 2007.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (331) PDF downloads(1165) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return