Figure - available from: Quantum Information Processing
This content is subject to copyright. Terms and conditions apply.
The circuit of the coding functions for the collective-rotation noise

The circuit of the coding functions for the collective-rotation noise

Source publication
Article
Full-text available
In this paper, two quantum dialogue (QD) protocols based on the entanglement of GHZ states are proposed to resist the collective noise. Besides, two new coding functions are designed for each of the proposed protocols, which can resist two types of collective noise: collective-dephasing noise and collective-rotation noise, respectively. Furthermore...

Similar publications

Article
Full-text available
We propose a Bell measurement free scheme to implement a quantum repeater in GaAs/AlGa double qunatum dot systems.we prove the four pairs of double quantum dots compose an entanglement unit, given the the initial state is singlet states. Our shceme differs from the famous Duan-Lukin-Cirac-zoller(DLCZ) protocol in that Bell measurements are unnecces...
Article
Full-text available
A new scenario for energy distribution, security and shareability is presented that assumes the availability of quantum information heat engines and a thermal bath. It is based on the convertibility between entropy and work in the presence of a thermal reservoir. Our approach to the informational content of physical systems that are distributed bet...
Article
Full-text available
A basic diagnostic of entanglement in mixed quantum states is known as the positive partial transpose (PT) criterion. Such criterion is based on the observation that the spectrum of the partially transposed density matrix of an entangled state contains negative eigenvalues, in turn, used to define an entanglement measure called the logarithmic nega...
Article
Full-text available
Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained mu...
Preprint
Full-text available
A basic diagnostic of entanglement in mixed quantum states is known as the positive partial transpose (PT) criterion. Such criterion is based on the observation that the spectrum of the partially transposed density matrix of an entangled state contains negative eigenvalues, in turn, used to define an entanglement measure called the logarithmic nega...

Citations

... Exploring a decoherence-free subspace (DFS) tailored to the particular noise profile is a widely employed approach for mitigating collective noise [13,14] and concurrently constructing the corresponding logical qubits [15]. Since QD protocols involve communication between two parties, the transmitted photons undergo bidirectional quantum channels [16,17] and need to deal with the Trojan horse attacks [18,19]. ...
Article
Full-text available
This paper proposes two efficient block transmission and two efficient two-step transmission quantum dialogue (QD) protocols that are robust against collective-dephasing and collective-rotation noises, respectively. To counter collective noise, the carriers used to carry the message must correspond to the decoherence-free states under this collective noise. In addition to carrying messages, these quantum states and their combinations are used to ensure the security of transmission and prevent message distortion. In quantum communications, decoy photons are often used to detect eavesdroppers and always account for half of the total number of qubits, which is a burden on scarce quantum resources. Due to quantum state disclosure, the decoy photons used for inspection can no longer be utilized for transmission. Therefore, a dictionary is employed as an encoding mechanism to achieve self-checking without revealing these states. This approach enables photons to detect eavesdroppers while concurrently carrying keys. The proposed QD protocols can eliminate the consumption of decoy photons, significantly improve the qubit efficiency, and conduct security analysis to ensure that there is no information leakage. Two transmission modes with the same efficiency can be selected according to the noisy environment and time windows.
... Searching for Decoherence-free Subspace (DFS) under the specific noise is a common method for resisting them [9,10], and can also construct corresponding logical qubits [11][12][13][14][15]. In 2016 and 2019, there are QD protocols for the bidirectional transmission of photons [16,17], also called two-way transmission, but they need to deal with additional Trojan horse attacks [18,19]. After 2020, in addition to traditional particle-based QD protocols, some QD protocols based on polarization and spatial-mode degrees of freedom (PSDF) for single photons are proposed [20][21][22]. ...
... In addition, the Z and X gates can be converted through the Hadamard gate, and the controlled X (controlled-NOT) and controlled Z gates can also be converted as in (15). As a result, the preparation of a cluster state is in (16). Figure 4 shows the circuit for the generation and the computational process can be found in (17). ...
... In [16], each GHZ state can carry 2 classical bits. Alice prepares n GHZ states, while Bob utilizes n auxiliary two-qubit states. ...
Article
Full-text available
This study proposes two efficient fault-tolerant quantum dialogue (QD) protocols that are robust against the collective-dephasing and collective-rotation noises, respectively. In the proposed protocol, the message carriers are decoherence-free quantum states that are resistant to the corresponding collective noise, provided that all quantum photon pairs of a transmitted unit remain within the same time window. These quantum states and their combinations are used to compose the decoy photon pairs to ensure the security of the transmission. An observation on the Bell measurement has allowed an EPR pair as a message carrier to require only one of its photons for protection. That is, the measurement of one single photon in an EPR pair will gain no information of its actual Bell state. This property has effectively reduced the number of decoy photons in the quantum transmission. Since the photons used in the message carriers are particles of EPR pairs, the proposed two fault-tolerant QD protocols required only half of the decoy photons to ensure the same level of security. In the transmission, one photon of each EPR pair is separated using a reordering mechanism and a quantum logic circuit is designed and implemented to demonstrate the concept in practice. The reduction of decoy photons has significantly improved the qubit efficiency of the proposed QD protocols compared with other relevant existing works. Furthermore, the proposed schemes also have no information leakage problem.
... Then, many high-quality QSDC protocols are constructed from different angles [25][26][27]. In 2016, Chang [28] proposed quantum dialogue protocols over collective noise using entanglement of GHZ state, which resist the collective noise. Wang [29] presented efficient quantum dialogue using entangled states and entanglement swapping without information leakage. ...
Article
Full-text available
Due to the influence of external environment and internal factors, the security of quantum dialogue is facing huge challenges. In order to improve the security of quantum dialogue, we proposed the feasible and efficient quantum dialogue protocol with hyperentangled states in discrete-time quantum walk. In the proposed protocol, the trusted third party and both communicating parties entangle themselves via GHZ states and distribute their secret keys. The communicating party(Alice) prepares and signs her message and obtains an entangled quantum set of message and signature. And the other communicating party(Bob) verifies Alice’s signature with the the trusted third party’s help. Then, Alice and Bob perform a discrete-time quantum walk in the network until they meet at a node. Meanwhile, Alice and Bob have a quantum dialogue at the node where they meet. We provide detailed security analysis of the proposed protocol. Security analysis of the proposed protocol against both inside and outside attacks proves that attackers cannot extract any secret information.
... Because they can eliminate the effects of collective noise better, the decoherence-free states have been widely applied to design QD protocols against collective noise. [35][36][37][38][39][40][41][42] However, to our knowledge, the specific CQD protocols against collective noise have been rarely studied so far. In consequence, we take into account how to design the CQD protocols against collective noise. ...
Article
Full-text available
Quantum system is inevitably affected by the external environment in the real world. Two controlled quantum dialogue protocols are put forward based on logical χ -type states under collective noise environment. One is against collective-dephasing noise, while the other is against collective-rotation noise. Compared with existing protocols, there exist several outstanding advantages in our proposed protocols: Firstly, the χ -type state is utilized as quantum channels, it possesses better entanglement properties than GHZ state, W state as well as cluster state, which make it difficult to be destroyed by local operations. Secondly, two kinds of logical χ -type states are constructed by us in theory, which can be perfectly immune to the effects of collective noise. Thirdly, the controller can be offline after quantum distribution and permission announcement, without waiting for all the participants to complete the information coding. Fourthly, the security analysis illuminates that our protocols can not only be free from the information leakage, but also resist against the intercept-and-resend attack, the entanglement-and-measure attack, the modification attack, the conspiring attack, and especially the dishonest controller’s attacks.
... As we know, GHZ states are three-particle maximally entangled states, and are popularly used in quantum cryptography [2][3][4][5][6][7][8][9][10][11][12][13]. Unfortunately, after careful analysis, we discover that the detection strategy toward the intercept-resend attack adopted in some present quantum ...
Article
Full-text available
In this paper, we investigate how to enlarge the detection probability of the security check process, because it is of utmost importance for quantum secure communication. We first describe one specific kind transmission of GHZ states, and then analyze its detection probability of intercept-resend attack. Finally, we improve the detection strategy by suggesting a better choice of measurement basis for the communicants. Our research is worth of reference when designing a quantum communication protocol.
... The first QD protocol was proposed by Nguyen [395], which was proven to be insecure later [396]. Since then, a lot of protocols were proposed, including protocols based on single photons [397][398][399][400][401][402][403][404], Bell states [405][406][407][408], GHZ states [409][410][411], W states [412,413], four-qubit cluster states [414,415]. In addition to the design of protocols, the security of protocols has also attracted a lot of attention in recent years [416][417][418][419][420][421]. ...
Article
The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which offers unconditional security based on some principles of quantum mechanics, has become a significant branch and hotspot in the field of modern cryptography research. In this paper, we review the research and development of several important and well-studied branches of quantum cryptography in terms of theory and experiment, including quantum key distribution, quantum secret sharing, quantum secure direct communication, quantum signature, and quantum private query. We also briefly review the research and development of some other branches which are currently in the stage of theoretical research but receive widespread concern from academia, including quantum private comparison, quantum anonymous voting, quantum secure multi-party summation, quantum sealed-bid auction, quantum public key cryptosystem, quantum key agreement, quantum dialogue, and quantum identity authentication. In addition, we discuss some open issues and future research directions for the branches referred to above.
... Decoherence-free subspace (DFS) can help realize reliable particle transmission under collective noise channel [70,71]. At present, there have been some relevant studies on robust QD protocols by constructing DFS [52,58,[62][63][64][66][67][68][69]. In existing schemes that consider channel noise, we found that these protocols usually have a huge quantum resource cost or require complicated quantum operations. ...
... In this paper, we propose three new robust quantum dialogue protocols immune to collectiveamplitude-damping noise, collective-rotation noise and collective-dephasing noise, respectively. In this section, we adopt the definition of the qubit efficiency [52,68] which is defined as η ¼ c q , where c and q are the number of the exchanged secret message and the number of qubits used, respectively. Let n be the number of logical states and δ be the number of decoy states. ...
... The qubit efficiency of our QD protocols is η ¼ Table 1 gives the comparisons among several kinds of QD protocols against collective noise (collective-dephasing noise and collective-rotation noise). As described in Ref. [68], though the scheme [44] is better than the proposed schemes in qubit efficiency, Alice and Bob have to reorder the qubit sequences. Although the qubit efficiency of the proposed schemes is same as that in Ref. [68], no GHZ states are necessary in the proposed schemes. ...
Article
Full-text available
Quantum dialogue (QD) belongs to two-way quantum secure direct communication. Particles are usually affected by noise during transmission in the quantum channel. In this paper, we propose three new robust quantum dialogue protocols immune to collective-amplitude-damping noise, collective-rotation noise and collective-dephasing noise, respectively. Based on logical qubits, both parties can communicate with each other directly without being disturbed by quantum channel noise. The security analysis shows that the proposed QD protocols can resist common outsider attacks without information leakage.
... In 2016, CH Chang et al. proposed two quantum dialogue protocols based on GHZ state to resist collective noise. The protocol designed two new encoding functions, which can resist collective phase noise and collective rotating noise, respectively [31]. In 2016, H Wang et al. proposed a new quantum dialogue protocol using generalized Bell states and entanglement exchanges. ...
Conference Paper
With the development of quantum technology, the application of quantum characteristics to wireless networks has become a research hotspot. In this paper, a quantum handshake method based on quantum dialogue and wireless network has been proposed. At first, quantum computation is introduced and the IEEE802.11i is carefully discussed and analyzed. Then, by combining quantum dialogue with IEEE802.11i wireless network, a quantum handshake method is put forward, which can effectively guarantee the communication security of data in a wireless network. In terms of transmission time and security, quantum handshake method is better than classic handshake. In addition, the proposed scheme has high security and practicability.
... Shor et al. [2] proposed a key distribution protocol with entanglement purification and proved the security of BB84. Then, a series of quantum cryptographic protocols were designed, including quantum key distribution [3][4][5][6], quantum dialogue [7], quan- ...
Article
Full-text available
The collective noises, which include the collective-dephasing noise and the collective-rotation noise, are the topical noises in quantum key agreement (QKA). How to eliminate the influence of the collective noises on quantum communication is a problem to be solved urgently. In this paper, based on logical quantum states, by using controlled-Z, controlled-NOT and unitary operations, two QKA protocols which can be immune to the collective-dephasing noise and the collective-rotation noise are proposed, respectively. The security analysis indicates that these two protocols can resist participant attack and outsider attacks which include Trojan-horse attacks, intercept-resend attack, measure-resend attack and entangle-measure attack. By comparing with the proposed two-party QKA protocols against the collective noises, it is clear that our protocols are more efficient.
... Meanwhile, the authors thought that the information leakage problem doesn't exist in this QD protocol. Furthermore, many other researchers held the same viewpoints [38,39]. However, if checking carefully, one can find this is not the truth. ...
Article
Full-text available
Information leakage in quantum dialogue (QD) or bidirectional quantum secure direct communication (BQSDC) was found ten years ago, but enough attention was not paid and even wrong conclusions were drawn. It is indeed necessary to emphasize the importance. Here, we find information leakage exists in the QD protocol based on entanglement swapping between any two Bell states and the shared secret Bell state. To be specific, half of the interchanged information is leaked out unconsciously. This is not allowed in a truly secure QD protocol. Afterward, this QD protocol is improved to the one without information leakage. Compared with the original one, there are some obvious advantages in the improved version.