Skip to main content

Advertisement

Log in

Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

In this paper, we propose a deterministic secure three-party semi-quantum dialogue (SQD) protocol based on the GHZ states as the initial quantum resource. In the protocol, three communicants can obtain secret message between each other to realize a secure three-party dialogue, one of them has quantum capabilities and the other two have classical abilities. The information leakage problem is prevented in the proposed three-party SQD protocol by using the entangled correlation between three particles in the same GHZ state. In addition, under the premise of introducing decoy photons, the communicants utilize twice eavesdropping detection and a process similar to one-time key encryption to ensure that the SQD protocol can resist multiple types of attacks, such as intercept-measure-resend attack, flip attack, man-in-the-middle attack, Trojan horse attack and entangle-measure attack. Finally, the protocol only involves single-photon measurement, which reduces the participants’ operations on the quantum superposition state and the demand for quantum devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev Lett 67(6), 661–663 (1991)

    ADS  MathSciNet  MATH  Google Scholar 

  2. Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell theorem. Phys. Rev Lett 68, 557–559 (1992)

    ADS  MathSciNet  MATH  Google Scholar 

  3. Tiersch, M., Ganahl, E.J., Briegel, H.J.: Adaptive quantum computation in changing environments using projective simulation. Sci. Rep. 5, 12874 (2015)

    ADS  Google Scholar 

  4. Schuld, M., Sinayskiy, I., Petruccione, F.: The quest for a quantum neural network. Quantum Inf. Process. 13, 2567 (2014)

    ADS  MathSciNet  MATH  Google Scholar 

  5. Li, YaoChong, Zhou, Ri-Gui., RuiQing, Xu., Luo, Jia, WenWen, Hu.: A quantum deep convolutional neural network for image recognition. Quantum Sci. Technol. 5(4), 044003 (2020)

    ADS  Google Scholar 

  6. Li, Y.C., Zhou, R.-G., Xu, R.Q., Hu, W.W., Fan, P.: Quantum algorithm for the nonlinear dimensionality reduction with arbitrary kernel. Quantum Sci. Technol. (2020). https://doi.org/10.1088/2058-9565/abbe66

    Article  Google Scholar 

  7. Li, Y., Zhou, R., Xu, R., Luo, J., Jiang, S.: A quantum mechanics-based framework for EEG signal feature extraction and classification. IEEE Trans Emerg Top Comput (2020). https://doi.org/10.1109/TETC.2020.3000734

    Article  Google Scholar 

  8. Braunstein, S.L., Mann, A.: Measurement of the Bell operator and quantum teleportation. Phys. Rev A 51(3), 1727–1730 (1995)

    ADS  Google Scholar 

  9. Long, G., Liu, X.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)

    ADS  Google Scholar 

  10. Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)

    ADS  Google Scholar 

  11. Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A. 69, 521–524 (2004)

    Google Scholar 

  12. Jin, X.R., Ji, X., Zhang, Y.Q., et al.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354(1), 67–70 (2006)

    ADS  Google Scholar 

  13. Liu, D., Chen, J.L., Jiang, W.: High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 51(9), 2923–2929 (2012)

    MATH  Google Scholar 

  14. Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A. 59(3), 1829–1834 (1999)

    ADS  MathSciNet  MATH  Google Scholar 

  15. Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A. 59(1), 162–168 (1999)

    ADS  Google Scholar 

  16. Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A. 310(4), 247–251 (2003)

    ADS  MathSciNet  MATH  Google Scholar 

  17. Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum secret sharing schemes. Phys. Rev. A. 69(5), 052307 (2004)

    ADS  Google Scholar 

  18. Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys Rev A 68, 042315 (2003)

    ADS  Google Scholar 

  19. Deng, F.G., Long, G.L.: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys Rev A 70, 012311 (2004)

    ADS  Google Scholar 

  20. Wang, T., Wang, S., Ma, J.: Robust quantum private queries. Int. J. Theor. Phys. 55, 3309–3317 (2016)

    MathSciNet  MATH  Google Scholar 

  21. Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83(2), 022301 (2011)

    ADS  Google Scholar 

  22. Wang, M., Chen, X., Yang, Y.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. Astron. 56, 1636–1641 (2013)

    ADS  Google Scholar 

  23. Zhang, L., Sun, H., Zhang, K., et al.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process 16, 70 (2017)

    ADS  MathSciNet  MATH  Google Scholar 

  24. Nguyen, B.A.: Quantum dialogue. Phys. Lett A 328(1), 6–10 (2004)

    ADS  MathSciNet  MATH  Google Scholar 

  25. Ji, X., Zhang, S.: Secure quantum dialogue based on single-photon. Chin Phys 15, 1418–1420 (2006)

    Google Scholar 

  26. Yang, Y.G., Wen, Q.Y.: Quasi-secure quantum dialogue using single photons. Sci. China Ser. G-Phys. Mech. Astron. 50(5), 558–562 (2007)

    ADS  Google Scholar 

  27. Xia, Y., Fu, C.B., Zhang, S., et al.: Quantum dialogue by using the GHZ state. J.-Korean Phys. Soc. 48(1), 24–27 (2006)

    Google Scholar 

  28. Dong, L., Xiu, X.M., Gao, Y.J., et al.: Quantum Dialogue Protocol Using a Class of Three-Photon W States[J]. Commun. Theor. Phys. 52(5), 853–856 (2009)

    ADS  MATH  Google Scholar 

  29. Li, W., Zha, X., Yu, Y.: Secure quantum dialogue protocol based on four-qubit cluster state. Int. J Theor. Phys. 57, 371–380 (2018)

    MathSciNet  MATH  Google Scholar 

  30. Gao, F., Guo, F., Wen, Q., et al.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G-Phys. Mech. As 51, 559–566 (2008)

    Google Scholar 

  31. Shi, G.F., Xi, X.Q., Hu, M.L., et al.: Quantum secure dialogue by using single photons. Opt Commun 283(9), 1984–1986 (2010)

    ADS  Google Scholar 

  32. Luo, Y., Lin, C., Hwang, T.: Efficient quantum dialogue using single photons. Quantum Inf. Process 13, 2451–2461 (2014)

    ADS  MathSciNet  MATH  Google Scholar 

  33. Zhou, N., Hua, T., Wu, G., et al.: Single-photon secure quantum dialogue protocol without information leakage. Int. J Theor. Phys. 53, 3829–3837 (2014)

    MATH  Google Scholar 

  34. Yu, K.F., Yang, C.W., Liao, C.H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13, 1457 (2014)

    ADS  MathSciNet  MATH  Google Scholar 

  35. Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semi-quantum key distribution. Phys. Rev. A 79, 032341 (2009)

    ADS  MathSciNet  MATH  Google Scholar 

  36. Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. Phys. Rev. Lett. 99, 140501 (2007)

    ADS  MathSciNet  MATH  Google Scholar 

  37. Yang, C.: Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack. Quantum Inf. Process 19, 50 (2020)

    ADS  MathSciNet  Google Scholar 

  38. Gu, J., Lin, P., Hwang, T.: Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol.’ Quantum Inf. Process 17, 182 (2018)

    ADS  MathSciNet  MATH  Google Scholar 

  39. Xie, C., Li, L., Situ, H., et al.: Semi-quantum Secure Direct Communication Scheme Based on Bell States. Int. J Theor. Phys. 57, 1881–1887 (2018)

    MathSciNet  MATH  Google Scholar 

  40. Wang, J., Zhang, S., Zhang, Q., Tang, C.J.: Semi-quantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)

    ADS  Google Scholar 

  41. Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 13(11), 2417–2436 (2014)

    ADS  MathSciNet  MATH  Google Scholar 

  42. Krawec, W.O.: Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 15(5), 2067–2090 (2016)

    ADS  MathSciNet  MATH  Google Scholar 

  43. Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semi-quantum key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)

    ADS  Google Scholar 

  44. Li, Q., Chan, W.H., Long, D.Y.: Semi-quantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)

    ADS  Google Scholar 

  45. Tsai, C., Chang, Y., Lai, Y., et al.: Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process 19, 224 (2020)

    ADS  Google Scholar 

  46. Xie, C., Li, L.Z., Qiu, D.W.: A novel semi-quantum secret sharing scheme of specific bits. Int. J. Theor. Phys. 54(10), 3819–3824 (2015)

    MathSciNet  MATH  Google Scholar 

  47. Lin, P., Hwang, T., Tsai, C.: Efficient semi-quantum private comparison using single photons. Quantum Inf. Process 18, 207 (2019)

    ADS  MathSciNet  Google Scholar 

  48. Jiang, L.: Semi-quantum private comparison based on Bell states. Quantum Inf. Process 19, 180 (2020)

    ADS  MathSciNet  Google Scholar 

  49. Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16, 295 (2017)

    ADS  MathSciNet  MATH  Google Scholar 

  50. Ye, T.Y.: Semi-quantum dialogue based on single photons. Int. J. Theor. Phys. 57(5), 1440–1454 (2018)

    MathSciNet  MATH  Google Scholar 

  51. Pan, H.: Semi-Quantum Dialogue with Bell Entangled States. Int. J Theor. Phys. 59, 1364–1371 (2020)

    MathSciNet  MATH  Google Scholar 

  52. Yu, K.-F., Gu, J., Hwang, T., Gope, P.: Multi-party semi-quantum key distribution-convertible multiparty semi-quantum secret sharing. Quantum Inf. Process. 16(8), 194 (2017)

    ADS  MATH  Google Scholar 

  53. Yang, C.W., Tsai, C.W.: Advanced semi-quantum secure direct communication protocol based on bell states against flip attack. Quantum Inf Process 19, 126 (2020)

    ADS  MathSciNet  Google Scholar 

  54. Boyer, M., et al.: Semi-quantum key distribution. In: Quantum information, pp. 235–274. Springer, Berlin (2007)

    Google Scholar 

  55. Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A. 74, 054302 (2006)

    ADS  Google Scholar 

  56. Sun, Z., Qi, R., Lin, Z., Yin, L., Long, G., Lu, J.: Design and implementation of a practical quantum secure direct communication system. In 2018 IEEE Globecom Workshops (GC Wkshps) (pp. 1–6) (2018). IEEE.

  57. Sun, Z., et al.: Toward practical quantum secure direct communication: a quantum-memory-free protocol and code design. IEEE Trans. Commun. 68(9), 5778–5792 (2020)

    Google Scholar 

  58. Pan, D., et al.: Single-photon-memory two-step quantum secure direct communication relying on Einstein–Podolsky–Rosen pairs. IEEE Access 8, 121146–121161 (2020)

    Google Scholar 

  59. Qi, R., et al.: Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 8(1), e22 (2019)

    ADS  Google Scholar 

  60. Wu, J., et al.: Security of quantum secure direct communication based on Wyner’s wiretap channel theory. Quantum Eng. 1(4), e26 (2019)

    Google Scholar 

  61. Niu, P.-H., et al.: Security analysis of measurement-device-independent quantum secure direct communication. Quantum Inf. Process. 19(10), 1–14 (2020)

    MathSciNet  Google Scholar 

  62. Pan, D., et al.: Experimental free-space quantum secure direct communication and its security analysis. Photon. Res. 8(9), 1522–1531 (2020)

    Google Scholar 

  63. Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Tech. J. 28, 656–715 (1949)

    MathSciNet  MATH  Google Scholar 

  64. Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Zh.J.: Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302. Phys. Rev. A 73(4), 049901 (2006)

    ADS  Google Scholar 

  65. Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)

    ADS  MATH  Google Scholar 

  66. Zhang, M.H., Li, H.F., Peng, J.Y.: Semiquantum secure direct communication using ERP pairs. Quantum Inf. Process 16(5), 117 (2017)

    ADS  MATH  Google Scholar 

  67. Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)

    ADS  Google Scholar 

Download references

Acknowledgment

This work is supported by the Shanghai Science and Technology Project in 2020 under Grant No.20040501500.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoxue Zhang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, RG., Zhang, X. & Li, F. Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states. Quantum Inf Process 20, 153 (2021). https://doi.org/10.1007/s11128-021-03104-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-021-03104-1

Keywords

Navigation