6,790 research outputs found
Secure quantum dialogue via cavity QED
In this paper, a secure quantum dialogue protocol via cavity QED is suggested
by using the evolution law of atom in cavity QED. The present protocol employs
both the two-step transmission and the unitary operation encoding. Two security
checks are adopted to ensure its transmission security against the active
attacks from an outside eavesdropper. The present protocol avoids the
information leakage problem by using the entanglement swapping between any two
Bell states via cavity QED together with the shared secret Bell state. Compared
with the previous information leakage resistant quantum dialogue protocol via
cavity QED, the present protocol takes advantage in quantum measurement.Comment: 6 pages, 2 table
A novel two-party semiquantum key distribution protocol based on GHZ-like states
In this paper, we propose a novel two-party semiquantum key distribution
(SQKD) protocol by only employing one kind of GHZ-like state. The proposed SQKD
protocol can create a private key shared between one quantum party with
unlimited quantum abilities and one classical party with limited quantum
abilities without the existence of a third party. The proposed SQKD protocol
doesn't need the Hadamard gate or quantum entanglement swapping. Detailed
security analysis turns out that the proposed SQKD protocol can resist various
famous attacks from an outside eavesdropper, such as the Trojan horse attacks,
the entangle-measure attack, the double CNOT attacks, the measure-resend attack
and the intercept-resend attack.Comment: 15 pages, 2 figures, 1 tabl
A lightweight three-user secure quantum summation protocol without a third party based on single-particle states
In this paper, a lightweight three-user secure quantum summation protocol is
put forward by using single-particle states, which can accomplish the goal that
three users cooperate together to calculate the modulo 2 addition of their
private messages without the help of a third party. This protocol only requires
single-particle states rather than quantum entangled states as the initial
quantum resource, and only needs single-particle measurements and Bell basis
measurements. This protocol needs none of quantum entanglement swapping, the
Pauli operations, the controlled-not (CNOT) operation, the Hadamard gate or a
pre-shared private key sequence. Security analysis proves that this protocol is
secure against both the outside attacks and the participant attacks. Compared
with the existing two-dimensional three-user quantum summation protocols, this
protocol more or less takes advantage over them on the aspects of the initial
quantum resource, users' quantum measurement, the usage of quantum entanglement
swapping, the usage of Pauli operations, the usage of CNOT operation or the
usage of Hadamard gate.Comment: 1 Tabl
A novel hybrid protocol for semiquantum key distribution and semiquantum secret sharing
In this paper, a novel hybrid protocol for semiquantum key distribution
(SQKD) and semiquantum secret sharing (SQSS) was constructed by using GHZ-like
states. This protocol is capable of establishing two different private keys
between one quantum party and two semiquantum parties respectively, and making
two semiquantum parties share another private key of the quantum party in the
meanwhile. The usages of delay lines, Pauli operations, Hadamard gates and
quantum entanglement swapping are not required. Moreover, the semiquantum
parties are not necessary to be equipped with any quantum memory. We validate
in detail that this protocol resists various attacks from Eve, including the
Trojan horse attacks, the entangle-measure attack, the double controlled-not
(CNOT) attacks, the measure-resend attack and the intercept-resend attack. To
our best knowledge, this protocol is the only protocol which possesses the
functions of both SQKD and SQSS simultaneously until now.Comment: 16 pages,1 figure, 3 table
Semiquantum secret sharing by using x-type states
In this paper, a semiquantum secret sharing (SQSS) protocol based on x-type
states is proposed, which can accomplish the goal that only when two classical
communicants cooperate together can they extract the shared secret key of a
quantum communicant. Detailed security analysis turns out that this protocol
can resist the participant attack and the outside attack. This protocol has
some merits: (1) it only requires one kind of quantum entangled state as the
initial quantum resource; (2) it doesn't employ quantum entanglement swapping
or unitary operations; and (3) it needn't share private keys among different
participants beforehand.Comment: 18 pages, 1 figure, 3 table
- …