Abstract
In this paper, we propose a deterministic secure three-party semi-quantum dialogue (SQD) protocol based on the GHZ states as the initial quantum resource. In the protocol, three communicants can obtain secret message between each other to realize a secure three-party dialogue, one of them has quantum capabilities and the other two have classical abilities. The information leakage problem is prevented in the proposed three-party SQD protocol by using the entangled correlation between three particles in the same GHZ state. In addition, under the premise of introducing decoy photons, the communicants utilize twice eavesdropping detection and a process similar to one-time key encryption to ensure that the SQD protocol can resist multiple types of attacks, such as intercept-measure-resend attack, flip attack, man-in-the-middle attack, Trojan horse attack and entangle-measure attack. Finally, the protocol only involves single-photon measurement, which reduces the participants’ operations on the quantum superposition state and the demand for quantum devices.


Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev Lett 67(6), 661–663 (1991)
Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell theorem. Phys. Rev Lett 68, 557–559 (1992)
Tiersch, M., Ganahl, E.J., Briegel, H.J.: Adaptive quantum computation in changing environments using projective simulation. Sci. Rep. 5, 12874 (2015)
Schuld, M., Sinayskiy, I., Petruccione, F.: The quest for a quantum neural network. Quantum Inf. Process. 13, 2567 (2014)
Li, YaoChong, Zhou, Ri-Gui., RuiQing, Xu., Luo, Jia, WenWen, Hu.: A quantum deep convolutional neural network for image recognition. Quantum Sci. Technol. 5(4), 044003 (2020)
Li, Y.C., Zhou, R.-G., Xu, R.Q., Hu, W.W., Fan, P.: Quantum algorithm for the nonlinear dimensionality reduction with arbitrary kernel. Quantum Sci. Technol. (2020). https://doi.org/10.1088/2058-9565/abbe66
Li, Y., Zhou, R., Xu, R., Luo, J., Jiang, S.: A quantum mechanics-based framework for EEG signal feature extraction and classification. IEEE Trans Emerg Top Comput (2020). https://doi.org/10.1109/TETC.2020.3000734
Braunstein, S.L., Mann, A.: Measurement of the Bell operator and quantum teleportation. Phys. Rev A 51(3), 1727–1730 (1995)
Long, G., Liu, X.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)
Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)
Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A. 69, 521–524 (2004)
Jin, X.R., Ji, X., Zhang, Y.Q., et al.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354(1), 67–70 (2006)
Liu, D., Chen, J.L., Jiang, W.: High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 51(9), 2923–2929 (2012)
Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A. 59(3), 1829–1834 (1999)
Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A. 59(1), 162–168 (1999)
Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A. 310(4), 247–251 (2003)
Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum secret sharing schemes. Phys. Rev. A. 69(5), 052307 (2004)
Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys Rev A 68, 042315 (2003)
Deng, F.G., Long, G.L.: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys Rev A 70, 012311 (2004)
Wang, T., Wang, S., Ma, J.: Robust quantum private queries. Int. J. Theor. Phys. 55, 3309–3317 (2016)
Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83(2), 022301 (2011)
Wang, M., Chen, X., Yang, Y.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. Astron. 56, 1636–1641 (2013)
Zhang, L., Sun, H., Zhang, K., et al.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process 16, 70 (2017)
Nguyen, B.A.: Quantum dialogue. Phys. Lett A 328(1), 6–10 (2004)
Ji, X., Zhang, S.: Secure quantum dialogue based on single-photon. Chin Phys 15, 1418–1420 (2006)
Yang, Y.G., Wen, Q.Y.: Quasi-secure quantum dialogue using single photons. Sci. China Ser. G-Phys. Mech. Astron. 50(5), 558–562 (2007)
Xia, Y., Fu, C.B., Zhang, S., et al.: Quantum dialogue by using the GHZ state. J.-Korean Phys. Soc. 48(1), 24–27 (2006)
Dong, L., Xiu, X.M., Gao, Y.J., et al.: Quantum Dialogue Protocol Using a Class of Three-Photon W States[J]. Commun. Theor. Phys. 52(5), 853–856 (2009)
Li, W., Zha, X., Yu, Y.: Secure quantum dialogue protocol based on four-qubit cluster state. Int. J Theor. Phys. 57, 371–380 (2018)
Gao, F., Guo, F., Wen, Q., et al.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G-Phys. Mech. As 51, 559–566 (2008)
Shi, G.F., Xi, X.Q., Hu, M.L., et al.: Quantum secure dialogue by using single photons. Opt Commun 283(9), 1984–1986 (2010)
Luo, Y., Lin, C., Hwang, T.: Efficient quantum dialogue using single photons. Quantum Inf. Process 13, 2451–2461 (2014)
Zhou, N., Hua, T., Wu, G., et al.: Single-photon secure quantum dialogue protocol without information leakage. Int. J Theor. Phys. 53, 3829–3837 (2014)
Yu, K.F., Yang, C.W., Liao, C.H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13, 1457 (2014)
Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semi-quantum key distribution. Phys. Rev. A 79, 032341 (2009)
Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. Phys. Rev. Lett. 99, 140501 (2007)
Yang, C.: Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack. Quantum Inf. Process 19, 50 (2020)
Gu, J., Lin, P., Hwang, T.: Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol.’ Quantum Inf. Process 17, 182 (2018)
Xie, C., Li, L., Situ, H., et al.: Semi-quantum Secure Direct Communication Scheme Based on Bell States. Int. J Theor. Phys. 57, 1881–1887 (2018)
Wang, J., Zhang, S., Zhang, Q., Tang, C.J.: Semi-quantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)
Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 13(11), 2417–2436 (2014)
Krawec, W.O.: Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 15(5), 2067–2090 (2016)
Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semi-quantum key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)
Li, Q., Chan, W.H., Long, D.Y.: Semi-quantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)
Tsai, C., Chang, Y., Lai, Y., et al.: Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process 19, 224 (2020)
Xie, C., Li, L.Z., Qiu, D.W.: A novel semi-quantum secret sharing scheme of specific bits. Int. J. Theor. Phys. 54(10), 3819–3824 (2015)
Lin, P., Hwang, T., Tsai, C.: Efficient semi-quantum private comparison using single photons. Quantum Inf. Process 18, 207 (2019)
Jiang, L.: Semi-quantum private comparison based on Bell states. Quantum Inf. Process 19, 180 (2020)
Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16, 295 (2017)
Ye, T.Y.: Semi-quantum dialogue based on single photons. Int. J. Theor. Phys. 57(5), 1440–1454 (2018)
Pan, H.: Semi-Quantum Dialogue with Bell Entangled States. Int. J Theor. Phys. 59, 1364–1371 (2020)
Yu, K.-F., Gu, J., Hwang, T., Gope, P.: Multi-party semi-quantum key distribution-convertible multiparty semi-quantum secret sharing. Quantum Inf. Process. 16(8), 194 (2017)
Yang, C.W., Tsai, C.W.: Advanced semi-quantum secure direct communication protocol based on bell states against flip attack. Quantum Inf Process 19, 126 (2020)
Boyer, M., et al.: Semi-quantum key distribution. In: Quantum information, pp. 235–274. Springer, Berlin (2007)
Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A. 74, 054302 (2006)
Sun, Z., Qi, R., Lin, Z., Yin, L., Long, G., Lu, J.: Design and implementation of a practical quantum secure direct communication system. In 2018 IEEE Globecom Workshops (GC Wkshps) (pp. 1–6) (2018). IEEE.
Sun, Z., et al.: Toward practical quantum secure direct communication: a quantum-memory-free protocol and code design. IEEE Trans. Commun. 68(9), 5778–5792 (2020)
Pan, D., et al.: Single-photon-memory two-step quantum secure direct communication relying on Einstein–Podolsky–Rosen pairs. IEEE Access 8, 121146–121161 (2020)
Qi, R., et al.: Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 8(1), e22 (2019)
Wu, J., et al.: Security of quantum secure direct communication based on Wyner’s wiretap channel theory. Quantum Eng. 1(4), e26 (2019)
Niu, P.-H., et al.: Security analysis of measurement-device-independent quantum secure direct communication. Quantum Inf. Process. 19(10), 1–14 (2020)
Pan, D., et al.: Experimental free-space quantum secure direct communication and its security analysis. Photon. Res. 8(9), 1522–1531 (2020)
Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Tech. J. 28, 656–715 (1949)
Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Zh.J.: Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302. Phys. Rev. A 73(4), 049901 (2006)
Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)
Zhang, M.H., Li, H.F., Peng, J.Y.: Semiquantum secure direct communication using ERP pairs. Quantum Inf. Process 16(5), 117 (2017)
Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)
Acknowledgment
This work is supported by the Shanghai Science and Technology Project in 2020 under Grant No.20040501500.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhou, RG., Zhang, X. & Li, F. Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states. Quantum Inf Process 20, 153 (2021). https://doi.org/10.1007/s11128-021-03104-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-021-03104-1