Secure Direct Communication protocol Using Entanglement Swapping |
Hong Chang-ho
(Graduate School of Information Security(GSIS), Korea University)
Lee Hwa-yean (Graduate School of Information Security(GSIS), Korea University) Kim Ji-in (Department of Physics, Korea University) Lim Jong-in (Graduate School of Information Security(GSIS), Korea University) Yang Hyung-jin (Graduate School of Information Security(GSIS), Korea University, Department of Display Semiconductor, Korea University) |
1 | D. Bouwmeester. J. W. Pan, K. Mattle, M. Eibl, H. Weinfurter, and A. Zeilinger, 'Experimental quantum teleportation.' . 390(6660) :575-579, 1997 DOI ScienceOn |
2 | A. Cabello, 'Quantum key distribution without alternative measurements.' Phys. Rev. A 61, 052312, 2000 DOI ScienceOn |
3 | K. Bostrom and T. Felbinger, 'Deterministic Secure Direct Communication Using Entanglement.' Phys. Rev. Lett. 89, 187902, 2002 DOI ScienceOn |
4 | Won-Young Hwang, 'Quantum key distribution with high loss.' Phys. Rev. Lett. 91, 057901, 2003 DOI ScienceOn |
5 | N. Lutkenhaus, 'Security against individual attacks for realistic quantum key distribution.' Phys. Rev. A 61, 052304, 2000 DOI ScienceOn |
6 | M. Hillery, V. Buzek, and A. Berthiaume, 'Quantum secret sharing.' Phys. Rev. A 59, 1829, 1999 DOI ScienceOn |
7 | M. Zukowski, A. Zeilinger, M. A. Horne, and A. K. Ekert, 'Event-ready-detectors Bell experiment via entanglement swapping.' Phys. Rev. Lett. 71, 4287, 1993 DOI ScienceOn |
8 | MAN Zhong-Xiao, ZHANG Zhan-Jun and LI Young, 'Deterministic secure direct communication by using swapping quantum entanglement and local unitary operation.' Chin. Phys. Lett. 22, No. 1, 2005 |
9 | A. Ekert, 'Quantum cryptography based on Bell's theorem.' Phys. Rev. Lett. 67, 661, 1991 DOI ScienceOn |
10 | H. Bechmann-Pasquinucci and N. Gisin. 'Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography.' Phys, Rev. A 59, 4238, 1999 DOI |
11 | T Gao, F L Yan and Z X Wang, 'Deterministic secure direct communication using GHZ states and swapping quantum entanglement.' J. Phys. A 38, 5761, 2005 DOI ScienceOn |
12 | S. Bandyopadhyay, 'Teleportation and secret sharing with pure entangled states.' Phys. Rev. A 62, 012308, 2000 DOI ScienceOn |
13 | A. beige, B. G. Englert, C. Kursiefer and H. Weinfurter, Acta Phys. Pol. A 101 357 |
14 | Lo Hoi-Kwang Lo and H. F. Chau Science 283, 2050, 1999 DOI ScienceOn |
15 | D. Bruss, 'Optimal Eavesdropping in Quantum Cryptography with Six States.' Phys. Rev. Lett. 81, 3018, 1998 DOI |
16 | S. Bose, V. Vedral, and P. L. Knight, 'Multiparticle generalization of entanglement swapping.' Phys. Rev. A 57, 822, 1998 DOI ScienceOn |
17 | A. Cabello, 'Quantum key distribution without alternative measurements.' Phys. Rev. A 61, 052312, 2000 DOI ScienceOn |
18 | C. H. Benett, G. Brassard, C. Crepeau, R. Jozsa, A. Pres, and W. Wootters, 'Teleporting an unknown quantum state via dual classical and EPR channels.' Phys. Rev. Lett. 70:1895-1899. 1993 DOI ScienceOn |
19 | D. Boschi, S. Branca, F. D. Martini, L. Hardy, and S. Popescu. 'Experimental realization of teleporting an unknown pure quantum state via dual classical and Einstein-Podolski-Rosen channels.' Phys. Rev. Lett., 80:1121-1125, 1998 DOI ScienceOn |
20 | M. A. Nielsen, E. Knill, and R. Laflamme. 'Complete quantum teleportation using nuclear magnetic resornance.' Nature. 396(6706):52-55, 1998 DOI ScienceOn |
21 | D. Song, 'Secure key distribution by swapping quantum entanglement.' Phys. Rev. A 69, 034301, 2004 DOI ScienceOn |
22 | B. Yurke and D. Stoler, 'Bell's-inequality experiments using independent-particle sources.' Phys. Rev. A 46, 2229, 1992 DOI ScienceOn |
23 | M. Koashi and N. Imoto, 'Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps.' Phys. Rev. Lett. 79, 2383, 1997 DOI ScienceOn |