Skip to main content
Log in

Cryptanalysis and improvement of efficient quantum dialogue using entangled states and entanglement swapping without information leakage

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

The novel quantum dialogue (QD) protocol by using the three-dimensional Bell states and entanglement swapping (Wang et al. in Quantum Inf Process 15(6):2593–2603, 2016) is analyzed. It is shown that there is the information leakage problem in this QD protocol. To be specific, one quarter information of the secret messages exchanged is leaked out unconsciously. Afterward, it is improved to a truly secure one without information leakage. Besides, the security of the improved QD protocol is analyzed in detail. It is shown that the improved QD protocol has some obvious features compared with the original one.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98B(1), 190–200 (2015)

    Article  ADS  Google Scholar 

  2. Fu, Z., Huang, F., Sun, X., Vasilakos, A., Yang, C.-N.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. (2016). doi:10.1109/TSC.2016.2622697

    Google Scholar 

  3. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)

    Article  Google Scholar 

  4. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)

    Article  Google Scholar 

  5. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)

    Article  Google Scholar 

  6. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  7. Liu, Q., Cai, W.D., Shen, J., Fu, Z.J., Liu, X.D., Linge, N.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016)

    Article  Google Scholar 

  8. Kong, Y., Zhang, M.J., Ye, D.Y.: A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl.-Based Syst. 115, 123–132 (2017)

    Article  Google Scholar 

  9. Chen, X., Sheng, C., Yulei, W.: Coverless information hiding method based on the Chinese character encoding. J. Internet Technol. 18(2), 91–98 (2017)

    Google Scholar 

  10. Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 209–216 (2017)

    Google Scholar 

  11. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems & Signal Processing, pp. 175–179. Bangalore, India (1984)

  12. Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79(3), 032341 (2009)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  13. Li, Q., Chan, W.H., Zhang, S.Y.: Semiquantum key distribution with secure delegated quantum computation. Sci. Rep. 6, 19898 (2016)

    Article  ADS  Google Scholar 

  14. Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)

    Article  ADS  Google Scholar 

  15. Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)

    Article  ADS  Google Scholar 

  16. Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)

    Article  ADS  Google Scholar 

  17. Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)

    Article  ADS  Google Scholar 

  18. Wang, C., Deng, F.G., Li, Y.S., Liu, X.S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71(4), 044305 (2005)

    Article  ADS  Google Scholar 

  19. Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Quantum secure direct communication with \(\chi \)-type entangled states. Phys. Rev. A 78(6), 064304 (2008)

    Article  ADS  Google Scholar 

  20. Liu, Z.H., Chen, H.W., Liu, W.J., Xu, J., Wang, D., Li, Z.Q.: Quantum secure direct communication with optimal quantum superdense coding by using general four-qubit states. Quantum Inf. Process. 12(1), 587–599 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  21. Li, X.H.: Quantum secure direct communication. Acta Phys. Sin. 64(16), 0160307 (2015)

    Google Scholar 

  22. Nguyen, B.A.: Quantum dialogue. Phys. Lett. A 328(1), 6–10 (2004)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  23. Ji, X., Zhang, S.: Secure quantum dialogue based on single-photon. Chin. Phys. 15(7), 1418–1420 (2006)

    Article  ADS  Google Scholar 

  24. Xia, Y., Fu, C.B., Zhang, S., Hong, S.K., Yeon, K.H., Um, C.I.: Quantum dialogue by using the GHZ state. J. Korean Phys. Soc. 48(1), 24–27 (2006)

    Google Scholar 

  25. Chen, Y., Man, Z.X., Xia, Y.J.: Quantum bidirectional secure direct communication via entanglement swapping. Chin. Phys. Lett. 24(1), 19–22 (2007)

    Article  ADS  Google Scholar 

  26. Xia, Y., Song, J., Song, H.S.: Quantum dialogue using non-maximally entangled states based on entanglement swapping. Phys. Scr. 76(4), 363–369 (2007)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  27. Yang, Y.G., Wen, Q.Y.: Quasi-secure quantum dialogue using single photons. Sci. China Ser. G Phys. Mech. Astron. 50(5), 558–562 (2007)

    Article  ADS  Google Scholar 

  28. Dong, L., Xiu, X.M., Gao, Y.J., Chi, F.: Quantum dialogue protocol using a class of three-photon W states. Commun. Theor. Phys. 52(5), 853–856 (2009)

    Article  ADS  MATH  Google Scholar 

  29. Yin, A.H., Tang, Z.H.: Two-step efficient quantum dialogue with three-particle entangled W state. Int. J. Theor. Phys. 53(8), 2760–2768 (2014)

    Article  MATH  Google Scholar 

  30. Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G Phys. Mech. Astron. 51(5), 559–566 (2008)

    Article  ADS  Google Scholar 

  31. Tan, Y.G., Cai, Q.Y.: Classical correlation in quantum dialogue. Int. J. Quantum. Inf. 6(2), 325–329 (2008)

    Article  Google Scholar 

  32. Liu, Z.H., Chen, H.W.: Comment on “improvement of controlled bidirectional quantum direct communication using a GHZ state” [chin. Phys. Lett. 30 (2013) 040305]. Chin. Phys. Lett. 30(7), 079901 (2013)

  33. Liu, Z.-H., Chen, H.-W., Liu, W.-J.: Information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 55(11), 4681–4686 (2016)

    Article  MATH  Google Scholar 

  34. Liu, Z.-H., Chen, H.-W.: Analysis and revision of secure quantum dialogue via cavity QED. Int. J. Theor. Phys. (2017). doi:10.1007/s10773-017-3382-y

    MathSciNet  Google Scholar 

  35. Shi, G.F., Xi, X.Q., Tian, X.L., Yue, R.H.: Bidirectional quantum secure communication based on a shared private Bell state. Opt. Commun. 282(12), 2460–2463 (2009)

    Article  ADS  Google Scholar 

  36. Gao, G.: Two quantum dialogue protocols without information leakage. Opt. Commun. 283(10), 2288–2293 (2010)

    Article  ADS  Google Scholar 

  37. Shi, G.F., Xi, X.Q., Hu, M.L., Yue, R.H.: Quantum secure dialogue by using single photons. Opt. Commun. 283(9), 1984–1986 (2010)

    Article  ADS  Google Scholar 

  38. Yin, X.R., Ma, W.P., Liu, W.Y., Shen, D.S.: Efficient bidirectional quantum secure communication with two-photon entanglement. Quantum Inf. Process. 12(9), 3093–3102 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  39. Luo, Y.P., Lin, C.Y., Hwang, T.: Efficient quantum dialogue using single photons. Quantum Inf. Process. 13(11), 2451–2461 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  40. Hwang, T., Luo, Y.P.: Probabilistic authenticated quantum dialogue. Quantum Inf. Process. 14(12), 4631–4650 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  41. Ye, T.-Y.: Fault-tolerant quantum dialogue without information leakage based on entanglement swapping between two logical Bell states. Commun. Theor. Phys. 63(4), 431–438 (2015)

    Article  ADS  MATH  Google Scholar 

  42. Wang, H., Zhang, Y.Q., Liu, X.F., Hu, Y.P.: Efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Inf. Process. 15(6), 2593–2603 (2016)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  43. Liu, Z.-H., Chen, H.-W., Liu, W.-J.: Information leakage problem in high-capacity quantum secure communication with authentication using Einstein–Podolsky–Rosen pairs. Chin. Phys. Lett. 33(7), 070305 (2016)

    Article  Google Scholar 

  44. Liu, Z., Chen, H., Liu, W.: Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Int. J. Theor. Phys. 55(10), 4564–4576 (2016)

    Article  MATH  Google Scholar 

  45. Liu, Z.-H., Chen, H.-W.: Information leakage problem in quantum secure direct communication protocol based on the mixture of Bell state particles and single photons. Acta Phys. Sin. 66(13), 130304 (2017)

    Google Scholar 

  46. Liu, Z.H., Chen, H.W., Wang, D., Xue, X.L.: Classical-operation-based deterministic secure quantum communication. Int. J. Theor. Phys. 53(6), 2118–2129 (2014)

    Article  MATH  Google Scholar 

  47. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, New York (2010). (10th Anniversary Edition)

    Book  MATH  Google Scholar 

  48. Li, X.H., Deng, F.G., Li, C.Y., Liang, Y.J., Zhou, P., Zhou, H.Y.: Deterministic secure quantum communication without maximally entangled states. J. Korean Phys. Soc. 49(4), 1354–1359 (2006)

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61502101, 61170321), Natural Science Foundation of Jiangsu Province, China (Grant Nos. BK20140651, BK20140823), and funded by China Scholarship Council, PAPD and CICAEET.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi-Hao Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, ZH., Chen, HW. Cryptanalysis and improvement of efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Inf Process 16, 229 (2017). https://doi.org/10.1007/s11128-017-1668-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-017-1668-x

Keywords

Navigation