Bidirectional quantum secure communication scheme based on Bell states and auxiliary particles

Abstract A bidirectional quantum secure communication protocol is presented. By introducing the auxiliary particle and utilizing the special character of Bell state, “correlation extractability”, our scheme cannot only discard the drawback, “information leakage”, but also is easy to implement.

[1]  张寿,et al.  Secure quantum dialogue based on single-photon , 2006 .

[2]  Charles H. Bennett,et al.  Purification of noisy entanglement and faithful teleportation via noisy channels. , 1995, Physical review letters.

[3]  Su-Juan Qin,et al.  Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .

[4]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[5]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[6]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[7]  Harald Weinfurter,et al.  Secure Communication with a Publicly Known Key , 2001 .

[8]  Ekert,et al.  "Event-ready-detectors" Bell experiment via entanglement swapping. , 1993, Physical review letters.

[9]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[10]  王瑞敏,et al.  Linear superposition method for (2+1)-dimensional nonlinear wave equations , 2006 .

[11]  Ming-Liang Hu,et al.  Quantum secure dialogue by using single photons , 2010 .

[12]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[13]  Jian-Wei Pan,et al.  Polarization entanglement purification using spatial entanglement. , 2001, Physical review letters.

[14]  Wen Qiao-Yan,et al.  A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .

[15]  Qiaoyan Wen,et al.  Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .

[16]  Guo-Fang Shi,et al.  Bidirectional quantum secure communication based on a shared private Bell state , 2009 .

[17]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[18]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[19]  Shor,et al.  Scheme for reducing decoherence in quantum computer memory. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[20]  H. Weinfurter,et al.  Experimental Entanglement Swapping: Entangling Photons That Never Interacted , 1998 .

[21]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[22]  Qiao-Yan Wen,et al.  Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication , 2008 .

[23]  Zhang Zhan-jun,et al.  Quantum dialogue revisited , 2005 .

[24]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[25]  Qing-yu Cai,et al.  Classical correlation in quantum dialogue , 2008, 0802.0358.

[26]  Richard B Miles,et al.  Coherent Rayleigh-Brillouin scattering. , 2002, Physical review letters.

[27]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.