欢迎登录材料期刊网

材料期刊网

高级检索

提出一个基于第三方控制的量子双向传态方案;通信双方Alice、Bob和控制方Charlie事先共享一个六粒子团簇态,通信开始后, Alice、Bob分别对自己拥有的部分粒子作Bell基联合测量(BSM),若控制方同意双方通信,则对自己拥有的粒子对作测量,将粒子所处的态公布;通信双方根据控制方公布的测量结果,对各自的某些粒子作适当的幺正变换,即可在这些粒子上重建对方要传的态.由于加入了第三方的控制,双向传态的安全性得到了提高.

参考文献

[1] Chen Hui,Zhu Shixiong,Zhu Fuchen.Introduction of Quantum Private Communication(量子保密通信引论)[M].Beijing:Beijing Institute of Technology Press,2010:86-104 (in Chinese).
[2] Dai Kui,Song Hui,et al.Introduction of Technology of Quantum Information(量子信息技术引论)[M].Changsha:National University of Defense Technology Press,2001:65-67 (in Chinese).
[3] Chen Hui,Zhu Fuchen.A QKD and QA protocol through once quantum communication[J].Communications Technology(通信技术),2003,138(6):87-88 (in Chinese).
[4] Zhou Chunyuan,Wu Guang,Chen Xiuliang,et al.Quantum private communication in 50 km fiber[J].Science in China (Series G:Physics,Mechanics & Astronomy)(中国科学G辑:物理学力学天文学),2003,33(6):538-543 (in Chinese).
[5] Wang Chuan,Zhang Jingfu,et al.Quantum cryptography communication experiment in free space[J].Science in China (Series G:Physics,Mechanics&Astronomy)(中国科学G辑:物理学力学天文学),2005,35(2):149-157 (in Chinese).
[6] Deng Fuguo,Long Guilu,Liu Xiaoshu.Two-step quantum direct communication protocol using the EinsteinPodolsky-Rosen pair block[J].Phys.Rev.A,2003,68:042317.
[7] Deng Fuguo,Long Guilu.Secure direct communication with a quantum one-time pad[J].Phys.Rev.A,2004,69:052319.
[8] Lucamarini M,Mancini S.Secure deterministic communication without entanglement[J].Phys.Rev.Lett.,2005,94:140501.
[9] Wang Chuan,Deng Fuguo,Li Yansong,et al.Quantum secure direct communication with high-dimension quantum superdense coding[J].Phys.Rev.A,2005,71:044305.
[10] Wang Chuan,Deng Fuguo,Long Guilu.Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state[J].Opt.Commun.,2005,253:15-20.
[11] Gu Bin,Pei ShiXin,et al.Deterministic secure quantum communication over a collective-noise channel[J].Science in China (Series G:Physics,Mechanics & Astronomy)(中国科学G辑:物理学力学天文学),2005,52(12):1913-1918.
[12] Bennett C H,Brassard G,Crepeau C,et al.Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels[J].Phys.Rev.Lett.,1993,70:1895-1899.
[13] Deng Fuguo,Li Chunyan,Li Yansong,et al.Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement[J].Phys.Rev.A,2005,72:022338.
[14] Hong Zhihui,Nie Yiyou,Huang Yibin,et al.Controlled quantum teleportation via four particle cluster states[J].Chinese Journal of Quantum Electronics(量子电子学报),2008,25(4):458-461 (in Chinese).
[15] Li Yuanhua,Liu Junchang,Nie Yiyou.Quantum identification scheme of cross-center based on four-particle cluster state[J].Chinese Journal of Quantum Electronics(量子电子学报),2011,28(1):52-57 (in Chinese).
[16] Wang Yong,Fan Junbo,Wang Wei.Precaution of man-in-the-middle attack during quantum key distribution[J].Netinfo Security(信息网络安全),2004,7:51-52 (in Chinese).
[17] Zhou Rui,Zhu Yulan,Nie Yiyou,et al.Quantum signature protocol partly depending on arbitrage[J].Chinese Journal of Quantum Electronics(量子电子学报),2009,26(4):442-445 (in Chinese).
[18] Zhao Shengmei,Li Fei,Zheng Baoyu.The security of quantum key distribution under probabilistic clone/resend attack[J].Journal of Electronics&Information Technology(电子与信息学报),2005,27(10):1639-1641(in Chinese).
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%