欢迎登录材料期刊网

材料期刊网

高级检索

量子明文直传通信方案是建立在量子力学基础上的一种新型量子通信方案.它可以确定性地直接传输明文,与需要事先分发量子密钥才能通信的量子密钥分发协议相比,更接近传统通信方式,因此成为近年来量子通信研究的热点问题.综述了目前量子明文直传通信的发展情况和最新成果,介绍了基于各种量子原理的典型量子直接通信方案,并对各方案进行分析比较,接着简要介绍了量子明文直传通信的实验研究情况,最后对将来的研究方向进行了总结和展望.

参考文献

[1] Wiesner S.Conjugate coding (Original Manuscript 1969)[J].Sigact News,1983,15:78-88.
[2] Gisin N,Ribordy G,Tittel W,et al.Quantum cryptography[J].Rev.Mod.Phys.,2002,74:145-195.
[3] Bost(o)m K,Felbinger T.Deterministic secure direct communication using entanglement[J].Phys.Rev.Lett.,2002,89(18):187902.
[4] Brassard G,Lütkenhaus N,Mor T,Sanders B C.Limitations on practical quantum cryptography[J].Phys.Rev.Lett.,2000,85(6):1330-1333.
[5] Bennett C H,Brassard G.in Proceeding of the IEEE International Conference on Computers,Systems,and Signal Processing[M].Bangalore,1984.175-179.
[6] Cai Qingyu,Li Baiwen.Improving the capacity of the Bostrom-Felbinger protocol[J].Phys.Rev.A,2004,69:054301.
[7] Cai Qingyu.Deterministic secure direct communication using Ping-pong protocol without public channel[OL].e-print quant-ph/0301048.
[8] Cai Qingyu.The "Ping-pong " protocol can be attacked without eavesdropping[J].Phys.Rev.Lett.,2003,91(10):109801.
[9] Cai Qingyu.An one-time-pad key communication protocol with entanglement[OL].e-print quant-ph/0309108.
[10] Hua LV,Cai Qingyu.N-Partner secure direct communication based on quantum nonlocality[OL].e-print quantph/0401078.
[11] Gao Ting,Yan Fengli,Wang Zhixi.Controlled quantum teleportation and secure direct communication[J].Chinese Phys.,2005,14:893-897.
[12] Cai Qingyu,Li Baiwen.Deterministic secure communication without using entanglement[J].Chin.Phys.Lett.,2004,21(4):601-603.
[13] Lo H K,Chau H F.Unconditional security of quantum key distribution over arbitrarily long distances[J].Science,1999,283:2050-2056.
[14] Shor P W,Preskill J.Simple proof of security of the BB84 quantum key distribution protocol[J].Phys.Rev.Lett.,2000,85(2):441-444.
[15] Mayers D.Shor and Preskill's and Mayers's security proof for the BB84 quantum key distribution protocol[J].Eur.Phys.J.D,2002,18:161-170.
[16] Lutkenhaus N.Security against individual attacks for realistic quantum key distribution[J].Phys,Rev.A,2000,61(5):052304.
[17] Deng F G,Long G L.Secure direct communication with a quantum one-time pad[J].Phys.Rev.A,2004,69:052319.
[18] Bennett C H.Quantum cryptography using any two nonorthogonal states[J].Phys.Rev.Lett.,1992,68(21):3121-3124.
[19] Zhang Z J,Man Z X.Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations[OL].e-print quant-ph/0403218.
[20] Zhang Z J,Man Z X.Secure bidirectional communication protocol without quantum channel[OL].e-print quantph/0403217.
[21] Xue Peng,Guo Guangcan.Secure direct communication using the ‘ olarization ' entangled atomic ensembles[J].J.Phys.B:At.Mol.Opt.Phys.,2004,37:711-722.
[22] Xue Peng,et al.Entanglement preparation and quantum communication with atoms in optical cavities[J].Phys.Rev.A,2004,69:052318.
[23] Wang Xiaoxin,Liu Yu,Wang Changqiang,et al.Experimental scheme of secure plaintext transmission with quantum direct communication[J].Acta Optica Sinica (光学学报),2005,25(3):425-428 (in Chinese).
[24] Wójcik A.Eavesdropping on the "Ping-pong" quantum communication protocol[J].Phys.Rev.Lett.,2003,90(15):157901.
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%