Quantum Dialogue Protocol Using a Class of Three-Photon W States

A theoretical protocol of quantum dialogue is proposed, which uses a class of three-photon W states as quantum channel. After two-step security check, four-bit secret message can be transmitted to each other by transmitting of single photon with the aid of two-bit classical information.

[1]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[2]  张寿,et al.  Secure quantum dialogue based on single-photon , 2006 .

[3]  Xiu Xiao-Ming,et al.  Quantum Secure Direct Communication Using W State , 2008 .

[4]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[5]  F. L. Yan,et al.  A scheme for secure direct communication using EPR pairs and teleportation , 2004 .

[6]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[7]  P. Xue,et al.  Conditional efficient multiuser quantum cryptography network , 2002 .

[8]  A. Pati,et al.  Perfect teleportation and superdense coding with W states , 2006, quant-ph/0610001.

[9]  Masato Koashi,et al.  Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.

[10]  Li Dong,et al.  A controlled quantum dialogue protocol in the network using entanglement swapping , 2008 .

[11]  Qing-yu Cai,et al.  Classical correlation in quantum dialogue , 2008, 0802.0358.

[12]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[13]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[14]  He-Shan Song,et al.  Quantum secure direct communication scheme using a W state and teleportation , 2006 .

[15]  Zhang Zhan-jun,et al.  Quantum dialogue revisited , 2005 .

[16]  Nicolas Gisin,et al.  Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks , 2004 .

[17]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[18]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[19]  Jian-Wei Pan,et al.  Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.

[20]  Li Dong,et al.  MULTIPARTY QUANTUM STATE SHARING OF m-QUBIT STATE , 2007 .

[21]  Zhou Ping,et al.  Efficient Multiparty Quantum Secret Sharing with Greenberger?Horne?Zeilinger States , 2006 .

[22]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[23]  Q. Cai Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.

[24]  Xia Yan,et al.  Controlled Secure Quantum Communication Using Pure Entangled W Class States , 2008 .

[25]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[26]  Xiu Xiao-Ming,et al.  A Theoretical Scheme for Multiparty Multi-particle State Sharing , 2008 .

[27]  J. Cirac,et al.  Three qubits can be entangled in two inequivalent ways , 2000, quant-ph/0005115.

[28]  Guang-Can Guo,et al.  Quantum secret sharing without entanglement , 2002 .

[29]  Zhang Yu-feng,et al.  A Higher-Dimensional Hirota Condition and Its Judging Method , 2008 .

[30]  Su-Juan Qin,et al.  One-time pads cannot be used to improve the efficiency of quantum communication , 2007 .

[31]  Chuan Wang,et al.  Experimental realization of quantum cryptography communication in free space , 2005 .

[32]  Xia Yan,et al.  Controlled Secure Quantum Dialogue Using a Pure Entangled GHZ States , 2007 .

[33]  Barry C. Sanders,et al.  Continuous-variable quantum-state sharing via quantum disentanglement , 2004, quant-ph/0411191.

[34]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .