Skip to main content

Effective Noise Estimation for Secure Quantum Direct Communication over Imperfect Channels

  • Conference paper
Computer Networks (CN 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 431))

Included in the following conference series:

  • 1116 Accesses

Abstract

In quantum communication actions of an eavesdropper are perceived by legitimate parties as some additional noise so correct estimation of the noise level is vital element of any protocol. The Ping-Pong protocol, one of the most widely recognized applications of entanglement for quantum direct communication, has been formulated with perfect quantum channels in mind and noise estimation is not addressed in its design. The control mode of the protocol’s seminal version cannot be used for this purpose as it is insensitive to phase flips of a signal qubit which at the same time contribute to errors observed in message mode. As a result, failures of the control mode are not related to errors in the message mode and, in consequence, in noisy environments it is possible to mount undetectable attacks which provide non-zero information gain to the eavesdropper. The control mode improvement which permits correct estimation of errors occurring in message mode is proposed and analyzed. The proposed modification explores the fact that local measurements in mutually unbiased bases reveal the coherence loss between distant components of the entangled system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Long, G.L., Deng, F.G., Wang, C., Li, X.H., Wen, K., Wang, W.Y.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2(3), 251–272 (2007)

    Article  Google Scholar 

  2. Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)

    Article  Google Scholar 

  3. Boström, K., Felbinger, T.: On the security of the ping-pong protocol. Phys. Lett. A 372(22), 3953–3956 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  4. Vasiliu, E.V.: Non-coherent attack on the Ping-Pong protocol with completely entangled pairs of qutrits. Quantum Inf. Process. 10, 189–202 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  5. Zawadzki, P.: Security of Ping-Pong protocol based on pairs of completely entangled qudits. Quantum Inf. Process. 11(6), 1419–1430 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  6. Jahanshahi, S., Bahrampour, A., Zandi, M.H.: Security enhanced direct quantum communication with higher bit-rate. Int. J. Quantum Inf. 11(2), 1350020 (2013)

    Article  MathSciNet  Google Scholar 

  7. Jahanshahi, S., Bahrampour, A., Zandi, M.H.: Three-particle deterministic secure and high bit-rate direct quantum communication protocol. Quantum Inf. Process. 12(7), 2441–2451 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  8. Ostermeyer, M., Walenta, N.: On the implementation of a deterministic secure coding protocol using polarization entangled photons. Opt. Commun. 281(17), 4540–4544 (2008)

    Article  Google Scholar 

  9. Wójcik, A.: Eavesdropping on the Ping-Pong quantum communication protocol. Phys. Rev. Lett. 90(15), 157901 (2003)

    Article  Google Scholar 

  10. Zawadzki, P.: Improving security of the Ping-Pong protocol. Quantum Inf. Process. 12(1), 149–155 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  11. Zawadzki, P.: The Ping-Pong protocol with a prior privacy amplification. Int. J. Quantum Inf. 10(3), 1250032 (2012)

    Article  Google Scholar 

  12. Zawadzki, P.: An analysis of the ping-pong protocol operation in a noisy quantum channel. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2013. CCIS, vol. 370, pp. 354–362. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  13. Zawadzki, P., Puchała, Z., Miszczak, J.: Increasing the security of the Ping-Pong protocol by using many mutually unbiased bases. Quantum Inf. Process. 12(1), 569–575 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  14. Fuchs, C.A., van de Graaf, J.: Cryptographic distinguishability measures for quantum-mechanical states. IEEE Trans. Inform. Theor. (4), 1216–1227 (1999)

    Google Scholar 

  15. Pavičić, M.: In quantum direct communication an undetectable eavesdropper can always tell ψ from φ Bell states in the message mode. Phys. Rev. A 87, 042326 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Zawadzki, P. (2014). Effective Noise Estimation for Secure Quantum Direct Communication over Imperfect Channels. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2014. Communications in Computer and Information Science, vol 431. Springer, Cham. https://doi.org/10.1007/978-3-319-07941-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07941-7_20

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07940-0

  • Online ISBN: 978-3-319-07941-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics