|
related topics |
{alice, bob, state} |
{photon, photons, single} |
{states, state, optimal} |
{operator, operators, space} |
{level, atom, field} |
{key, protocol, security} |
{cos, sin, state} |
|
Deterministic Secure Direct Communication Using Ping-pong protocol
without public channel
Qing-yu Cai
abstract: Based on an EPR pair of qubits and allowing asymptotically secure key
distribution, a secure communication protocol is presented. Bob sends either of
the EPR pair qubits to Alice. Alice receives the travel qubit. Then she can
encode classical information by local unitary operations on this travel qubit.
Alice send the qubit back to Bob. Bob can get Alice's information by
measurement on the two photons in Bell operator basis. If Eve in line, she has
no access to Bob's home qubit. All her operations are restricted to the travel
qubit. In order to find out which opeartion Alice performs, Eve's operation
must include measurements. The EPR pair qubits are destroyed. Bob's measurement
on the two photons in Bell operator basis can help him to judge whether Eve
exist in line or not. In this protocal, a public channel is not necessary.
- oai_identifier:
- oai:arXiv.org:quant-ph/0301048
- categories:
- quant-ph
- comments:
- 3 figures
- arxiv_id:
- quant-ph/0301048
- created:
- 2003-01-13
Full article ▸
|
|
related documents |
0511050v3 |
0010103v5 |
0012139v2 |
0303112v1 |
0504213v1 |
0612149v1 |
0212164v1 |
0305168v3 |
0511130v1 |
0601126v1 |
0002021v2 |
0008078v1 |
9605025v1 |
0502131v2 |
0510029v1 |
0508002v2 |
0304141v3 |
0501174v1 |
0612016v1 |
0312223v1 |
0501075v1 |
0311168v1 |
0005102v1 |
0304035v1 |
0504150v2 |
|