Abstract

Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

Highlights

  • Et al proposed a deterministic secure quantum communication (DSQC) protocol based on a three-particle W state and a quantum one-time pad[18]

  • Existing quantum secure direct communication (QSDC) and DSQC protocols fall into two categories: those based on entanglement and those based on single photon

  • The developments in generating entangled states technologies laid the foundation for the implementation of entanglement-based QSDC and DSQC protocols, and many entanglement-based protocols have been demonstrated in experiments in recent years[9]

Read more

Summary

Introduction

Et al proposed a DSQC protocol based on a three-particle W state and a quantum one-time pad[18]. Alice randomly prepares a set of qudits and sends them to Bob (forward transmission), who uses some of the received photons to assess the security of the quantum channel. After Alice receives these photons, Bob publishes the position and order of the photons carrying the checking message Alice measures these photons with the same basis when she prepares them to evaluate the security of the quantum channel. If the quantum channel is secure, Bob publishes the order of the remaining photons By measuring these photons with the same basis as when she prepared them, Alice directly obtains Bob’s secret message. The use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency compared with existing single photon-based DSQC protocols. We give a THA model and show that THA will significantly increase the multi-photon rate, leading to detection

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call