Controlled three-party communication using GHZ-like state and imperfect Bell-state measurement

We present a controlled three-party communication protocol using Greenberger-Horne-Zeilinger (GHZ)-like state and imperfect Bell-state measurement. Using the idea of controlled quantum teleportation, it can realize the secret information transmission between the legitimate participants under the control of the controller. It needs no unitary operation to recover the original state for the receiver, and it saves half of communication cost publicized by the sender. The order rearrangement of particles and data block transmission ensure the security of communication. With imperfect Bell-state measurement, it is tolerant of some noise effects and is feasible by using the present optical technique.

[1]  G. Rigolin Quantum teleportation of an arbitrary two-qubit state and its relation to multipartite entanglement , 2004, quant-ph/0407219.

[2]  Fuguo Deng,et al.  Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.

[3]  Li Dong,et al.  A controlled quantum dialogue protocol in the network using entanglement swapping , 2008 .

[4]  Zhan-jun Zhang Comment on : Quantum direct communication with authentication , 2006, quant-ph/0604125.

[5]  Zhang Zhan-jun,et al.  Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations , 2005 .

[6]  Yan Xia,et al.  Controlled Quantum Dense Coding in a Four-particle Non-maximally Entangled State via Local Measurements , 2005 .

[7]  F. L. Yan,et al.  A scheme for secure direct communication using EPR pairs and teleportation , 2004 .

[8]  I. Chuang,et al.  Quantum Computation and Quantum Information: Bibliography , 2010 .

[9]  Chuan Wang,et al.  Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state , 2005 .

[10]  Zhi-Xi Wang,et al.  Deterministic secure direct communication using GHZ states and swapping quantum entanglement , 2004, quant-ph/0406082.

[11]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[12]  Hwayean Lee,et al.  Quantum direct communication with authentication , 2005, quant-ph/0512051.

[13]  Li Dong,et al.  MULTIPARTY CONTROLLED DETERMINISTIC SECURE QUANTUM COMMUNICATION THROUGH ENTANGLEMENT SWAPPING , 2008 .

[14]  Kaoru Shimizu,et al.  Communication channels secured from eavesdropping via transmission of photonic Bell states , 1999 .

[15]  P. Xue,et al.  Conditional efficient multiuser quantum cryptography network , 2002 .

[16]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[17]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[18]  Li Dong,et al.  Controlled deterministic secure quantum communication using five-qubit entangled states and two-step security test , 2009 .

[19]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[20]  Y. P. Zhang,et al.  Study of runaway electron behaviour during electron cyclotron resonance heating in the HL-2A Tokamak , 2009 .

[21]  Vaidman Teleportation of quantum states. , 1993, Physical review. A, Atomic, molecular, and optical physics.

[22]  N. Lutkenhaus,et al.  Bell measurements for teleportation , 1998, quant-ph/9809063.

[23]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[24]  X. Xiu,et al.  Information transmission with Einstein–Podolsky–Rosen pairs and imperfect Bell-state measurement , 2010 .

[25]  Zhi-Xi Wang,et al.  Quantum Secure Conditional Direct Communication via EPR Pairs , 2005 .

[26]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[27]  Yan Xia,et al.  Controlled Secure Direct Communication by Using GHZ Entangled State , 2005 .

[28]  E. Knill,et al.  A scheme for efficient quantum computation with linear optics , 2001, Nature.

[29]  Gilles Brassard,et al.  Teleportation as a quantum computation , 1998 .

[30]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[31]  Yan Xia,et al.  Controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding , 2007 .

[32]  H. Weinfurter,et al.  Experimental quantum teleportation , 1997, Nature.

[33]  Q. Cai Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.

[34]  Ping Zhou,et al.  Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs , 2006 .

[35]  Zhang Xiao-long,et al.  Quantum secure direct communication with Greenberger–Horne–Zeilinger-type state (GHZ state) over noisy channels , 2009 .

[36]  Fuguo Deng,et al.  Quantum secure direct communication with high-dimension quantum superdense coding , 2005 .

[37]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[38]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[39]  Quan Zhang,et al.  Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state , 2006 .

[40]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[41]  N. Gisin,et al.  Quantum teleportation with a three-Bell-state analyzer. , 2006 .

[42]  Qiaoyan Wen,et al.  Quantum secure direct communication with χ -type entangled states , 2008 .

[43]  Wang Chuan,et al.  Quantum secure direct communication and deterministic secure quantum communication , 2007 .

[44]  Shou Zhang,et al.  Secure direct communication based on secret transmitting order of particles , 2006, quant-ph/0601119.

[45]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[46]  N Gisin,et al.  Quantum teleportation with a three-Bell-state analyzer. , 2005, Physical review letters.

[47]  He-Shan Song,et al.  Quantum secure direct communication scheme using a W state and teleportation , 2006 .

[48]  Li Dong,et al.  A revised controlled deterministic secure quantum communication with five-photon entangled state , 2010 .

[49]  G. Long,et al.  Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.

[50]  N. Gisin,et al.  From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.

[51]  Harald Weinfurter,et al.  Secure Communication with a Publicly Known Key , 2001 .

[52]  N. Lütkenhaus,et al.  Maximum efficiency of a linear-optical Bell-state analyzer , 2001 .