Cai–Li Communication Protocol in Noisy Quantum Channel

Since the original Cai–Li protocol [Chin. Phys. Lett. 21 (2004) 601] can be used only in an ideal quantum communication, we present the modified Cai–Li protocol that can be used in the a noisy quantum channel by using Calderbank–Shor–Steane (CSS) codes to correct errors. We also give a tight bound on the connection between information Eve eavesdropped with a measurement attack in line B→A and detection probability, which shows that the Cai–Li protocol can be used as a quasisecure direct quantum communication.

[1]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[2]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[3]  Goldenberg,et al.  Quantum cryptography based on orthogonal states. , 1995, Physical review letters.

[4]  Cai Qing-yu,et al.  Deterministic secure communication without using entanglement , 2004 .

[5]  Shor,et al.  Good quantum error-correcting codes exist. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[6]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[7]  Charles H. Bennett,et al.  Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.

[8]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[9]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[10]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[11]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[12]  Harald Weinfurter,et al.  Secure Communication with a Publicly Known Key , 2001 .

[13]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[14]  Masato Koashi,et al.  Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps , 1997 .

[15]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[16]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[17]  A. Steane Multiple-particle interference and quantum error correction , 1996, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.