Please wait a minute...
Chinese Physics, 2007, Vol. 16(10): 2862-2866    DOI: 10.1088/1009-1963/16/10/006
GENERAL Prev   Next  

Unconditional secure two-way quantum dense key distribution

Lü Hua(吕桦)a)c)d)†, Chen Ai-Xi(陈爱喜)b), and Yan Xu-Dong(闫旭东)a)
a Department of Mathematics and Physics, Hubei University of Technology, Wuhan 430068, China; b Department of Physics, East China Jiaotong University, Nanchang 330013, China; c Wuhan Institute of Physics and Mathematics,Chinese Academy of Sciences, Wuhan 430071, Chinad University of the Chinese Academy of Science, Beijing 100049, China
Abstract  In this paper, we present a two-way quantum dense key distribution protocol. With double check modes, our scheme is secure regardless of the presence of noises. And with a quantum teleportation process, secret message can be encoded deterministically even if the quantum channel is highly lossy. Therefore, our scheme can be used in a realistic quantum channel regardless of the presence of noises and channel losses.
Keywords:  quantum cryptography      security      two-way communication  
Received:  09 November 2006      Revised:  13 April 2007      Accepted manuscript online: 
PACS:  03.67.Dd (Quantum cryptography and communication security)  
  03.65.Ud (Entanglement and quantum nonlocality)  
  05.40.Ca (Noise)  
  84.40.Ua (Telecommunications: signal transmission and processing; communication satellites)  
Fund: Project supported by the National Natural Science Foundation of China (Grant No~10504039).

Cite this article: 

Lü Hua(吕桦), Chen Ai-Xi(陈爱喜), and Yan Xu-Dong(闫旭东) Unconditional secure two-way quantum dense key distribution 2007 Chinese Physics 16 2862

[1] Experimental study on age and gender differences in microscopic movement characteristics of students
Jiayue Wang(王嘉悦), Maik Boltes, Armin Seyfried, Antoine Tordeux, Jun Zhang(张俊), and Wenguo Weng(翁文国). Chin. Phys. B, 2021, 30(9): 098902.
[2] Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme
Jing-Wen Zhang(张静文), Xiu-Bo Chen(陈秀波), Gang Xu(徐刚), and Yi-Xian Yang(杨义先). Chin. Phys. B, 2021, 30(7): 070309.
[3] Three-party reference frame independent quantum key distribution protocol
Comfort Sekga and Mhlambululi Mafu. Chin. Phys. B, 2021, 30(12): 120301.
[4] Controlling a sine wave gating single-photon detector by exploiting its filtering loophole
Lin-Xi Feng(冯林溪), Mu-Sheng Jiang(江木生), Wan-Su Bao(鲍皖苏), Hong-Wei Li(李宏伟), Chun Zhou(周淳), Yang Wang(汪洋). Chin. Phys. B, 2018, 27(8): 080305.
[5] A novel image encryption scheme based on Kepler's third law and random Hadamard transform
Yu-Ling Luo(罗玉玲), Rong-Long Zhou(周戎龙), Jun-Xiu Liu(刘俊秀), Sen-Hui Qiu(丘森辉), Yi Cao(曹弋). Chin. Phys. B, 2017, 26(12): 120504.
[6] Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs
Kushal Anjaria, Arun Mishra. Chin. Phys. B, 2017, 26(10): 100507.
[7] A self-cited pixel summation based image encryption algorithm
Guo-Dong Ye(叶国栋), Xiao-Ling Huang(黄小玲), Leo Yu Zhang(张愉), Zheng-Xia Wang(王政霞). Chin. Phys. B, 2017, 26(1): 010501.
[8] Intercept-resend attack on six-state quantum key distribution over collective-rotation noise channels
Kevin Garapo, Mhlambululi Mafu, Francesco Petruccione. Chin. Phys. B, 2016, 25(7): 070303.
[9] Improving the secrecy rate by turning foes to allies: An auction scheme
Ma Ya-Yan (马亚燕), Wang Bao-Yun (王保云). Chin. Phys. B, 2015, 24(9): 090209.
[10] An efficient three-party password-based key agreement protocol using extended chaotic maps
Shu Jian (舒剑). Chin. Phys. B, 2015, 24(6): 060509.
[11] An encryption scheme based on phase-shifting digital holography and amplitude-phase disturbance
Hua Li-Li (花丽丽), Xu Ning (徐宁), Yang Geng (杨庚). Chin. Phys. B, 2014, 23(6): 064201.
[12] Security of biased BB84 quantum key distribution with finite resource
Zhao Liang-Yuan (赵良圆), Li Hong-Wei (李宏伟), Yin Zhen-Qiang (银振强), Chen Wei (陈巍), You Juan (尤娟), Han Zheng-Fu (韩正甫). Chin. Phys. B, 2014, 23(10): 100304.
[13] A secure key agreement protocol based on chaotic maps
Wang Xing-Yuan (王兴元), Luan Da-Peng (栾大朋). Chin. Phys. B, 2013, 22(11): 110503.
[14] Improving the security of secure deterministic communication scheme based on quantum remote state preparation
Qin Su-Juan(秦素娟) and Wen Qiao-Yan(温巧燕). Chin. Phys. B, 2010, 19(2): 020310.
[15] Enhancing the security of quantum secret sharing against multiphoton attack
Zhang Bin-Bin(张彬彬), Wang Da-Qing(王大庆), Huang Shan-Shan(黄珊珊), and Liu Yu(刘玉). Chin. Phys. B, 2009, 18(6): 2149-2153.
No Suggested Reading articles found!