6,790 research outputs found

    Secure quantum dialogue via cavity QED

    Full text link
    In this paper, a secure quantum dialogue protocol via cavity QED is suggested by using the evolution law of atom in cavity QED. The present protocol employs both the two-step transmission and the unitary operation encoding. Two security checks are adopted to ensure its transmission security against the active attacks from an outside eavesdropper. The present protocol avoids the information leakage problem by using the entanglement swapping between any two Bell states via cavity QED together with the shared secret Bell state. Compared with the previous information leakage resistant quantum dialogue protocol via cavity QED, the present protocol takes advantage in quantum measurement.Comment: 6 pages, 2 table

    A novel two-party semiquantum key distribution protocol based on GHZ-like states

    Full text link
    In this paper, we propose a novel two-party semiquantum key distribution (SQKD) protocol by only employing one kind of GHZ-like state. The proposed SQKD protocol can create a private key shared between one quantum party with unlimited quantum abilities and one classical party with limited quantum abilities without the existence of a third party. The proposed SQKD protocol doesn't need the Hadamard gate or quantum entanglement swapping. Detailed security analysis turns out that the proposed SQKD protocol can resist various famous attacks from an outside eavesdropper, such as the Trojan horse attacks, the entangle-measure attack, the double CNOT attacks, the measure-resend attack and the intercept-resend attack.Comment: 15 pages, 2 figures, 1 tabl

    A lightweight three-user secure quantum summation protocol without a third party based on single-particle states

    Full text link
    In this paper, a lightweight three-user secure quantum summation protocol is put forward by using single-particle states, which can accomplish the goal that three users cooperate together to calculate the modulo 2 addition of their private messages without the help of a third party. This protocol only requires single-particle states rather than quantum entangled states as the initial quantum resource, and only needs single-particle measurements and Bell basis measurements. This protocol needs none of quantum entanglement swapping, the Pauli operations, the controlled-not (CNOT) operation, the Hadamard gate or a pre-shared private key sequence. Security analysis proves that this protocol is secure against both the outside attacks and the participant attacks. Compared with the existing two-dimensional three-user quantum summation protocols, this protocol more or less takes advantage over them on the aspects of the initial quantum resource, users' quantum measurement, the usage of quantum entanglement swapping, the usage of Pauli operations, the usage of CNOT operation or the usage of Hadamard gate.Comment: 1 Tabl

    A novel hybrid protocol for semiquantum key distribution and semiquantum secret sharing

    Full text link
    In this paper, a novel hybrid protocol for semiquantum key distribution (SQKD) and semiquantum secret sharing (SQSS) was constructed by using GHZ-like states. This protocol is capable of establishing two different private keys between one quantum party and two semiquantum parties respectively, and making two semiquantum parties share another private key of the quantum party in the meanwhile. The usages of delay lines, Pauli operations, Hadamard gates and quantum entanglement swapping are not required. Moreover, the semiquantum parties are not necessary to be equipped with any quantum memory. We validate in detail that this protocol resists various attacks from Eve, including the Trojan horse attacks, the entangle-measure attack, the double controlled-not (CNOT) attacks, the measure-resend attack and the intercept-resend attack. To our best knowledge, this protocol is the only protocol which possesses the functions of both SQKD and SQSS simultaneously until now.Comment: 16 pages,1 figure, 3 table

    Semiquantum secret sharing by using x-type states

    Full text link
    In this paper, a semiquantum secret sharing (SQSS) protocol based on x-type states is proposed, which can accomplish the goal that only when two classical communicants cooperate together can they extract the shared secret key of a quantum communicant. Detailed security analysis turns out that this protocol can resist the participant attack and the outside attack. This protocol has some merits: (1) it only requires one kind of quantum entangled state as the initial quantum resource; (2) it doesn't employ quantum entanglement swapping or unitary operations; and (3) it needn't share private keys among different participants beforehand.Comment: 18 pages, 1 figure, 3 table
    • …
    corecore