A New Quantum Secure Direct Communication Scheme with Authentication

A new quantum secure direct communication (QSDC) scheme with authentication is proposed based on polarized photons and EPR pairs. EPR pairs are used to transmit information, while polarized photons are used to detect Eve and their encoding bases are used to transmit authentication information. Alice and Bob have their own identity number which is shared by legal users only. The identity number is encoded on the bases of polarized photons and distilled if there is no Eve. Compared with other QSDC schemes with authentication, this new scheme is considerably easier and less expensive to implement in a practical setting.

[1]  N. Gisin,et al.  Quantum Cryptography with Polarized Photons in Optical Fibres: Experiment and Practical Limits , 1994 .

[2]  Zeng Gui-hua,et al.  A quantum identification scheme based on polarization modulation , 2005 .

[3]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[4]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[5]  Li Zhi-qiang,et al.  Efficient Quantum Secure Direct Communication with Authentication , 2007 .

[6]  Guihua Zeng,et al.  Cross-center quantum identification scheme based on teleportation and entanglement swapping , 2005 .

[7]  杨宇光,et al.  An efficient quantum secure direct communication scheme with authentication , 2007 .

[8]  Man Zhong-xiao,et al.  Quantum secure direct communication via partially entangled states , 2007 .

[9]  Tang Chao-jing,et al.  Multiparty Simultaneous Quantum Identity Authentication Based on Entanglement Swapping , 2006 .

[10]  M. Dušek,et al.  Quantum identification system , 1998, quant-ph/9809024.

[11]  Wen Qiao-Yan,et al.  High Efficiency of Two Efficient QSDC with Authentication Is at the Cost of Their Security , 2009 .

[12]  Jian-Wei Pan,et al.  Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.

[13]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[14]  N. Gisin,et al.  Quantum key distribution over 67 km with a plug , 2002 .

[15]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[16]  M. Ramzan,et al.  Multiparty Quantum Cryptographic Protocol , 2008, 0902.2528.

[17]  P R Tapster,et al.  Quantum cryptography: A step towards global key distribution , 2002, Nature.

[18]  Quan Zhang,et al.  Multiparty simultaneous quantum identity authentication based on entanglement swapping , 2006 .

[19]  Guihua Zeng,et al.  Identity verification in quantum key distribution , 2000 .

[20]  D. Bethune,et al.  An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light , 2000, IEEE Journal of Quantum Electronics.

[21]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[22]  Zhan-jun Zhang Comment on : Quantum direct communication with authentication , 2006, quant-ph/0604125.

[23]  Zhang Zhan-jun,et al.  Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations , 2005 .

[24]  Q. Cai Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.

[25]  N. Gisin,et al.  Underwater quantum coding , 1995, Nature.

[26]  Wang Jian,et al.  Quantum broadcast communication , 2006, quant-ph/0604179.

[27]  Takashi Mihara,et al.  Quantum identification schemes with entanglements , 2002 .

[28]  Pan Wei,et al.  Quantum Secure Direct Communication Based on Authentication , 2008 .

[29]  G. Guo,et al.  Stability of phase-modulated quantum key distribution systems , 2004, quant-ph/0408031.

[30]  Christian Kurtsiefer,et al.  LETTER TO THE EDITOR: Secure communication with single-photon two-qubit states , 2001 .

[31]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[32]  Fuguo Deng,et al.  Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.

[33]  Hwayean Lee,et al.  Quantum direct communication with authentication , 2005, quant-ph/0512051.