提出一个基于第三方控制的量子双向传态方案;通信双方Alice、Bob和控制方Charlie事先共享一个六粒子团簇态,通信开始后, Alice、Bob分别对自己拥有的部分粒子作Bell基联合测量(BSM),若控制方同意双方通信,则对自己拥有的粒子对作测量,将粒子所处的态公布;通信双方根据控制方公布的测量结果,对各自的某些粒子作适当的幺正变换,即可在这些粒子上重建对方要传的态.由于加入了第三方的控制,双向传态的安全性得到了提高.
参考文献
[1] | Chen Hui,Zhu Shixiong,Zhu Fuchen.Introduction of Quantum Private Communication(量子保密通信引论)[M].Beijing:Beijing Institute of Technology Press,2010:86-104 (in Chinese). |
[2] | Dai Kui,Song Hui,et al.Introduction of Technology of Quantum Information(量子信息技术引论)[M].Changsha:National University of Defense Technology Press,2001:65-67 (in Chinese). |
[3] | Chen Hui,Zhu Fuchen.A QKD and QA protocol through once quantum communication[J].Communications Technology(通信技术),2003,138(6):87-88 (in Chinese). |
[4] | Zhou Chunyuan,Wu Guang,Chen Xiuliang,et al.Quantum private communication in 50 km fiber[J].Science in China (Series G:Physics,Mechanics & Astronomy)(中国科学G辑:物理学力学天文学),2003,33(6):538-543 (in Chinese). |
[5] | Wang Chuan,Zhang Jingfu,et al.Quantum cryptography communication experiment in free space[J].Science in China (Series G:Physics,Mechanics&Astronomy)(中国科学G辑:物理学力学天文学),2005,35(2):149-157 (in Chinese). |
[6] | Deng Fuguo,Long Guilu,Liu Xiaoshu.Two-step quantum direct communication protocol using the EinsteinPodolsky-Rosen pair block[J].Phys.Rev.A,2003,68:042317. |
[7] | Deng Fuguo,Long Guilu.Secure direct communication with a quantum one-time pad[J].Phys.Rev.A,2004,69:052319. |
[8] | Lucamarini M,Mancini S.Secure deterministic communication without entanglement[J].Phys.Rev.Lett.,2005,94:140501. |
[9] | Wang Chuan,Deng Fuguo,Li Yansong,et al.Quantum secure direct communication with high-dimension quantum superdense coding[J].Phys.Rev.A,2005,71:044305. |
[10] | Wang Chuan,Deng Fuguo,Long Guilu.Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state[J].Opt.Commun.,2005,253:15-20. |
[11] | Gu Bin,Pei ShiXin,et al.Deterministic secure quantum communication over a collective-noise channel[J].Science in China (Series G:Physics,Mechanics & Astronomy)(中国科学G辑:物理学力学天文学),2005,52(12):1913-1918. |
[12] | Bennett C H,Brassard G,Crepeau C,et al.Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels[J].Phys.Rev.Lett.,1993,70:1895-1899. |
[13] | Deng Fuguo,Li Chunyan,Li Yansong,et al.Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement[J].Phys.Rev.A,2005,72:022338. |
[14] | Hong Zhihui,Nie Yiyou,Huang Yibin,et al.Controlled quantum teleportation via four particle cluster states[J].Chinese Journal of Quantum Electronics(量子电子学报),2008,25(4):458-461 (in Chinese). |
[15] | Li Yuanhua,Liu Junchang,Nie Yiyou.Quantum identification scheme of cross-center based on four-particle cluster state[J].Chinese Journal of Quantum Electronics(量子电子学报),2011,28(1):52-57 (in Chinese). |
[16] | Wang Yong,Fan Junbo,Wang Wei.Precaution of man-in-the-middle attack during quantum key distribution[J].Netinfo Security(信息网络安全),2004,7:51-52 (in Chinese). |
[17] | Zhou Rui,Zhu Yulan,Nie Yiyou,et al.Quantum signature protocol partly depending on arbitrage[J].Chinese Journal of Quantum Electronics(量子电子学报),2009,26(4):442-445 (in Chinese). |
[18] | Zhao Shengmei,Li Fei,Zheng Baoyu.The security of quantum key distribution under probabilistic clone/resend attack[J].Journal of Electronics&Information Technology(电子与信息学报),2005,27(10):1639-1641(in Chinese). |
上一张
下一张
上一张
下一张
计量
- 下载量()
- 访问量()
文章评分
- 您的评分:
-
10%
-
20%
-
30%
-
40%
-
50%