40 research outputs found
Semi-quantum communication: Protocols for key agreement, controlled secure direct communication and dialogue
Semi-quantum protocols that allow some of the users to remain classical are
proposed for a large class of problems associated with secure communication and
secure multiparty computation. Specifically, first time semi-quantum protocols
are proposed for key agreement, controlled deterministic secure communication
and dialogue, and it is shown that the semi-quantum protocols for controlled
deterministic secure communication and dialogue can be reduced to semi-quantum
protocols for e-commerce and private comparison (socialist millionaire
problem), respectively. Complementing with the earlier proposed semi-quantum
schemes for key distribution, secret sharing and deterministic secure
communication, set of schemes proposed here and subsequent discussions have
established that almost every secure communication and computation tasks that
can be performed using fully quantum protocols can also be performed in
semi-quantum manner. Further, it addresses a fundamental question in context of
a large number problems- how much quantumness is (how many quantum parties are)
required to perform a specific secure communication task? Some of the proposed
schemes are completely orthogonal-state-based, and thus, fundamentally
different from the existing semi-quantum schemes that are
conjugate-coding-based. Security, efficiency and applicability of the proposed
schemes have been discussed with appropriate importance.Comment: 19 pages 1 figur
A novel two-party semiquantum key distribution protocol based on GHZ-like states
In this paper, we propose a novel two-party semiquantum key distribution
(SQKD) protocol by only employing one kind of GHZ-like state. The proposed SQKD
protocol can create a private key shared between one quantum party with
unlimited quantum abilities and one classical party with limited quantum
abilities without the existence of a third party. The proposed SQKD protocol
doesn't need the Hadamard gate or quantum entanglement swapping. Detailed
security analysis turns out that the proposed SQKD protocol can resist various
famous attacks from an outside eavesdropper, such as the Trojan horse attacks,
the entangle-measure attack, the double CNOT attacks, the measure-resend attack
and the intercept-resend attack.Comment: 15 pages, 2 figures, 1 tabl
Semiquantum private comparison via cavity QED
In this paper, we design the first semiquantum private comparison (SQPC)
protocol which is realized via cavity quantum electrodynamics (QED) by making
use of the evolution laws of atom. With the help of a semi-honest third party
(TP), the proposed protocol can compare the equality of private inputs from two
semiquantum parties who only have limited quantum capabilities. The proposed
protocol uses product states as initial quantum resource and employs none of
unitary operations, quantum entanglement swapping operation or delay lines.
Security proof turns out that it can defeat both the external attack and the
internal attack.Comment: 16 pages, 2 figures, 2 table
Quantum Conference
A notion of quantum conference is introduced in analogy with the usual notion
of a conference that happens frequently in today's world. Quantum conference is
defined as a multiparty secure communication task that allows each party to
communicate their messages simultaneously to all other parties in a secure
manner using quantum resources. Two efficient and secure protocols for quantum
conference have been proposed. The security and efficiency of the proposed
protocols have been analyzed critically. It is shown that the proposed
protocols can be realized using a large number of entangled states and group of
operators. Further, it is shown that the proposed schemes can be easily reduced
to protocol for multiparty quantum key distribution and some earlier proposed
schemes of quantum conference, where the notion of quantum conference was
different.Comment: 12 pages, 1 figur