Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.1.3

Secure Direct Communication protocol Using Entanglement Swapping  

Hong Chang-ho (Graduate School of Information Security(GSIS), Korea University)
Lee Hwa-yean (Graduate School of Information Security(GSIS), Korea University)
Kim Ji-in (Department of Physics, Korea University)
Lim Jong-in (Graduate School of Information Security(GSIS), Korea University)
Yang Hyung-jin (Graduate School of Information Security(GSIS), Korea University, Department of Display Semiconductor, Korea University)
Abstract
We propose a direct communication protocol using entanglement swapping. The safety of this protocol is guaranteed by the basic properties of entanglement swapping. This protocol is efficient to transmit two classical bits of information per one session. This efficiency is better than that of ping-pong protocol suggested by Bostrom and Felbinger. Even if an eavesdropper intervenes in midway, the eavesdropper will be detected with the probability of $75\%$ in the verification process of one bit. Therefore the perfect security is guaranteed if we use enough amount of bits for the verification process.
Keywords
Entanglement Swapping; Quantum Direct Communication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Bouwmeester. J. W. Pan, K. Mattle, M. Eibl, H. Weinfurter, and A. Zeilinger, 'Experimental quantum teleportation.' . 390(6660) :575-579, 1997   DOI   ScienceOn
2 A. Cabello, 'Quantum key distribution without alternative measurements.' Phys. Rev. A 61, 052312, 2000   DOI   ScienceOn
3 K. Bostrom and T. Felbinger, 'Deterministic Secure Direct Communication Using Entanglement.' Phys. Rev. Lett. 89, 187902, 2002   DOI   ScienceOn
4 Won-Young Hwang, 'Quantum key distribution with high loss.' Phys. Rev. Lett. 91, 057901, 2003   DOI   ScienceOn
5 N. Lutkenhaus, 'Security against individual attacks for realistic quantum key distribution.' Phys. Rev. A 61, 052304, 2000   DOI   ScienceOn
6 M. Hillery, V. Buzek, and A. Berthiaume, 'Quantum secret sharing.' Phys. Rev. A 59, 1829, 1999   DOI   ScienceOn
7 M. Zukowski, A. Zeilinger, M. A. Horne, and A. K. Ekert, 'Event-ready-detectors Bell experiment via entanglement swapping.' Phys. Rev. Lett. 71, 4287, 1993   DOI   ScienceOn
8 MAN Zhong-Xiao, ZHANG Zhan-Jun and LI Young, 'Deterministic secure direct communication by using swapping quantum entanglement and local unitary operation.' Chin. Phys. Lett. 22, No. 1, 2005
9 A. Ekert, 'Quantum cryptography based on Bell's theorem.' Phys. Rev. Lett. 67, 661, 1991   DOI   ScienceOn
10 H. Bechmann-Pasquinucci and N. Gisin. 'Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography.' Phys, Rev. A 59, 4238, 1999   DOI
11 T Gao, F L Yan and Z X Wang, 'Deterministic secure direct communication using GHZ states and swapping quantum entanglement.' J. Phys. A 38, 5761, 2005   DOI   ScienceOn
12 S. Bandyopadhyay, 'Teleportation and secret sharing with pure entangled states.' Phys. Rev. A 62, 012308, 2000   DOI   ScienceOn
13 A. beige, B. G. Englert, C. Kursiefer and H. Weinfurter, Acta Phys. Pol. A 101 357
14 Lo Hoi-Kwang Lo and H. F. Chau Science 283, 2050, 1999   DOI   ScienceOn
15 D. Bruss, 'Optimal Eavesdropping in Quantum Cryptography with Six States.' Phys. Rev. Lett. 81, 3018, 1998   DOI
16 S. Bose, V. Vedral, and P. L. Knight, 'Multiparticle generalization of entanglement swapping.' Phys. Rev. A 57, 822, 1998   DOI   ScienceOn
17 A. Cabello, 'Quantum key distribution without alternative measurements.' Phys. Rev. A 61, 052312, 2000   DOI   ScienceOn
18 C. H. Benett, G. Brassard, C. Crepeau, R. Jozsa, A. Pres, and W. Wootters, 'Teleporting an unknown quantum state via dual classical and EPR channels.' Phys. Rev. Lett. 70:1895-1899. 1993   DOI   ScienceOn
19 D. Boschi, S. Branca, F. D. Martini, L. Hardy, and S. Popescu. 'Experimental realization of teleporting an unknown pure quantum state via dual classical and Einstein-Podolski-Rosen channels.' Phys. Rev. Lett., 80:1121-1125, 1998   DOI   ScienceOn
20 M. A. Nielsen, E. Knill, and R. Laflamme. 'Complete quantum teleportation using nuclear magnetic resornance.' Nature. 396(6706):52-55, 1998   DOI   ScienceOn
21 D. Song, 'Secure key distribution by swapping quantum entanglement.' Phys. Rev. A 69, 034301, 2004   DOI   ScienceOn
22 B. Yurke and D. Stoler, 'Bell's-inequality experiments using independent-particle sources.' Phys. Rev. A 46, 2229, 1992   DOI   ScienceOn
23 M. Koashi and N. Imoto, 'Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps.' Phys. Rev. Lett. 79, 2383, 1997   DOI   ScienceOn