Efficient Quantum Cryptography Network without Entanglement and Quantum Memory

An efficient quantum cryptography network protocol is proposed with d-dimensional polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0. The users code the information on the single photons with some unitary operations. To prevent the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum states and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.

[1]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[2]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[3]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[4]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[5]  Charles H. Bennett,et al.  Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.

[6]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[7]  S. Barnett,et al.  Multi-user Quantum Cryptography on Optical Networks , 1995 .

[8]  Biham,et al.  Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[9]  Paul D. Townsend,et al.  Quantum cryptography on multiuser optical fibre networks , 1997, Nature.

[10]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[11]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[12]  Deng Fu-Guo,et al.  A Theoretical Scheme for Multi-user Quantum Key Distribution with N Einstein-Podolsky-Rosen Pairs on a Passive Optical Network , 2002 .

[13]  P. Xue,et al.  Conditional efficient multiuser quantum cryptography network , 2002 .

[14]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[15]  C. P. Sun,et al.  Quasi-spin-wave quantum memories with a dynamical symmetry. , 2003, Physical review letters.

[16]  G. Long,et al.  Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.

[17]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[18]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[19]  Fuguo Deng,et al.  Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .

[20]  Fuguo Deng,et al.  Quantum secure direct communication with high-dimension quantum superdense coding , 2005 .

[21]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[22]  Wang Yan,et al.  Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005, 0705.1746.

[23]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[24]  Zhou Ping,et al.  Efficient Multiparty Quantum Secret Sharing with Greenberger?Horne?Zeilinger States , 2006 .

[25]  Zhou Ping,et al.  Quantum Secure Direct Communication Network with Two-Step Protocol , 2006 .

[26]  Yan Wang,et al.  Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.