Two quantum dialogue protocols without information leakage

Abstract By swapping the entanglement of Bell states, we propose two quantum dialogue protocols, which have two different characters, one with the “two-step” character and the other with the “ping-pong” character. The common merits of two dialogue protocols are that the information leakage does not exist.

[1]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[2]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.

[3]  Chuan Wang,et al.  Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state , 2005 .

[4]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[5]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[6]  Man Zhong-Xiao,et al.  Improvement of Security of Three-Party Quantum Secure Direct Communication Based on GHZ States , 2007 .

[7]  Qiao-Yan Wen,et al.  Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication , 2008 .

[8]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[9]  Chuan Wang,et al.  Quantum key distribution using polarization and frequency hyperentangled photons , 2009 .

[10]  Qing-yu Cai,et al.  Classical correlation in quantum dialogue , 2008, 0802.0358.

[11]  Zhang Zhan-jun,et al.  Quantum dialogue revisited , 2005 .

[12]  Su-Juan Qin,et al.  Comment on: “Three-party quantum secure direct communication based on GHZ states” [Phys. Lett. A 354 (2006) 67] , 2008 .

[13]  Gao Gan,et al.  Efficient Quantum Secure Communication Protocol by Rearranging Particle Orders , 2009 .

[14]  Gan Gao,et al.  Reexamining the security of the improved quantum secret sharing scheme , 2009 .

[15]  David Chaum,et al.  Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .

[16]  Shou Zhang,et al.  Secure direct communication based on secret transmitting order of particles , 2006, quant-ph/0601119.

[17]  Dong Liu,et al.  Field experiment on a robust hierarchical metropolitan quantum cryptography network , 2009 .

[18]  Yan Xia,et al.  Controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding , 2007 .

[19]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[20]  Ekert,et al.  "Event-ready-detectors" Bell experiment via entanglement swapping. , 1993, Physical review letters.

[21]  Hwayean Lee,et al.  Quantum direct communication with authentication , 2005, quant-ph/0512051.

[22]  F. L. Yan,et al.  A scheme for secure direct communication using EPR pairs and teleportation , 2004 .

[23]  G. Long,et al.  Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.

[24]  Cai Qing-yu,et al.  Deterministic secure communication without using entanglement , 2004 .

[25]  Guo-Fang Shi,et al.  Bidirectional quantum secure communication based on a shared private Bell state , 2009 .

[26]  Qing-yu Cai,et al.  Improving the capacity of the Boström-Felbinger protocol , 2003, quant-ph/0311168.

[27]  Marco Lucamarini,et al.  Secure deterministic communication without entanglement. , 2005, Physical review letters.

[28]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[29]  H. Weinfurter,et al.  Information leakage via side channels in freespace BB84 quantum cryptography , 2009 .

[30]  Gao Gan Quantum Secure Communication by Using GHZ State in High-Dimensional Hilbert Space , 2008 .

[31]  Fuguo Deng,et al.  Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.

[32]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[33]  Alberto M. Marino,et al.  Deterministic secure communications using two-mode squeezed states , 2006 .

[34]  Long Gui-Lu,et al.  Quantum Privacy Amplification for a Sequence of Single Qubits , 2006 .