Abstract
An efficient bidirectional quantum secure communication protocol is proposed with two-photon entanglement. Compared with the previous protocol proposed by Shi et al., our protocol can achieve higher efficiency. Meanwhile, for the same length secret messages, only half of entangled photon pairs need to be prepared in our protocol. And the number of classical bits in public classical communication is also a half of that in the previous protocol. Moreover, the information leakage does not exist in our scheme.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, pp. 175–179. IEEE, New York (1984)
Ekert, A.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)
Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 557 (1992)
Bennett, C.H.: Quantum cryptography using any two nonorthogal states. Phys. Rev. Lett. 68, 3121 (1992)
Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)
Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)
Beige, A., Englert, B.G., Kurtsiefer, C., Weinfurter, H.: Secure communication with a publicly known key. Acta Phys. Pol. A 101, 357 (2002)
Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)
Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication ptotocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)
Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)
Yan, F.L., Zhang, X.Q.: A scheme for secure direct communication using EPR pairs and teleportation. Eur. Phys. J. B 41, 75–78 (2004)
Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501 (2005)
Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs. Phys. Lett. A 359, 359 (2006)
Chamoli, A., Bhandari, C.M.: Secure direct communication based on ping-pong protocol. Quantum Inf. Process. 8, 347 (2009)
Yang, Y.G., Teng, Y.W., et al.: Revisiting the security of secure direct communication based on ping-pong protocol [Quantum Inf. Process. 8,347 (2009)]. Quantum Inf. Process. 10, 317 (2011)
Nguyen, B.A.: Quantum dialogue. Phys. Lett. A 328, 6–10 (2004)
Man, Z.X., Zhang, Z.J., Li, Y.: Quantum dialogue revisited. Chin. Phys. Lett. 22, 22–24 (2005)
Man, Z.X., Xia, Y.J., Zhang, Z.J.: Secure deterministic bidirectional communication without entanglement. Int. J. Quantum Inf. 4, 739 (2006)
Yang, Y.G., Wen, Q.Y.: Quasi-secure quantum dialogue using single photons. Sci. China Ser. G 50, 558 (2007)
Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G 51, 559 (2008)
Tan, Y.G., Cai, Q.Y.: Classical correlation in quantum dialogue. Int. J. Quantum Inf. 6, 325 (2008)
Shi, G.F., Xi, X.Q., Tian, X.L., et al.: Bidirectional quantum secure communication based on a shared private Bell state. Opt. Commun. 282, 2460 (2009)
Shi, G.F., Xi, X.Q., et al.: Quantum secure dialogue by using single photons. Opt. Commun. 283, 1984 (2010)
Gao, G.: Two quantum dialogue protocols without information leakage. Opt. Commun. 283, 2288 (2010)
Shi, G.F.: Bidirectional quantum secure communication scheme based on Bell states and auxiliary particles. Opt. Commun. 283, 5275 (2010)
Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)
Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006)
Gisin, N., Ribordy, G., Tittel, W., et al.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)
Deng, F.G., Zhou, P. et al.: Robustness of two-way quantum communication protocols against Trojan horse attack. e-print quant-ph/0508168
Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)
Mayers, D.: Shor and Preskill’s and Mayers’s security proof for the BB84 quantum key distribution protocol. Eur. Phys. J. D 18, 161–170 (2002)
Acknowledgments
This work was supported by the National Science Foundation of China under Grant No. 61072140, the 111 Project under Grant No. B08038, the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No. 20100203110003, and a Project of Shandong Province Higher Educational Science and Technology Program under Grant No. J13LN60.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yin, XR., Ma, WP., Liu, WY. et al. Efficient bidirectional quantum secure communication with two-photon entanglement. Quantum Inf Process 12, 3093–3102 (2013). https://doi.org/10.1007/s11128-013-0584-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-013-0584-y