Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state*
Chang Yan†, Zhang Shi-Bin, Yan Li-Li, Han Gui-Hua
Department of Network Engineering, Chengdu University of Information Technology, Chengdu 610225, China

Corresponding author. E-mail: cyttkl@cuit.edu.cn

*Project supported by the National Natural Science Foundation of China (Grant No. 61402058), the Science and Technology Support Project of Sichuan Province of China (Grant No. 2013GZX0137), the Fund for Young Persons Project of Sichuan Province of China (Grant No. 12ZB017), and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions, China (Grant No. szjj2014-074).

Abstract

By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0′⟩ state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0′⟩. By using the |0′⟩ state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping–pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042.

Keyword: 03.67.Dd; 03.67.Hk; 03.67.–a; 03.65.Ud; quantum secure direct communication; decoherence noise; authentication; six-qubit decohevence-free state
1. Introduction

Cryptography is the way to guarantee the safety of a secret message stored or communicated in the public environment. Both classical cryptosystems and quantum cryptography can solve the problems of security. However, the latter has shown the advantage of higher security because of the strong security basis assured by the physical principles. Therefore, quantum cryptography[116] is now attracting a great deal of attention.

Quantum secure direct communication (QSDC) is a new concept in quantum cryptography which exchanges secret information securely using a quantum system. In a QSDC protocol, the secret message is transmitted directly without first establishing a key to encrypt it. In 2000, Long and Liu[5] developed an efficient pioneer two-step QSDC protocol. In that protocol, an Einstein– Podolsky– Rosen (EPR) pair is selected as the carrier qubit, and the qubits are transmitted in blocks, which improves the efficiency of eavesdropping detection. Later, many QSDC protocols[516] were proposed. However, most researches about quantum secure communication are based on ideal scenarios.[116] Noise is inevitable in a real scenario, which affects the safety and fidelity of the information exchanged. Therefore, studies of quantum cryptography in noisy scenarios are needed.

Channel noise is attracting a lot of attention.[1744] Researchers have found that the noises are usually caused by decoherence, which is caused by the coupling of a quantum system to its environment. Decoherence will make the quantum states fragile and easily destroyed, which leads to errors and leakage of secrets in the communication.[19] Collective decoherence is a kind of symmetry decoherence, which arises when the environment couples with the qubits without distinguishing between them.[19] For example, when the particles are delivered through some media such as the optical fiber, collective decoherence will appear. The alteration caused by collective decoherence can be described by a unitary operator U(t), where t denotes the time of transmission and indicates a temporal dependence. As mentioned in Ref. [20], if the time delay between the photons is small enough, the effect of collective noise on an N-qubit state can be modeled approximately as

where [U(t)]N = U(t)⊗ · · · ⊗ U(t) denotes the tensor product of N unitary transformations U(t).

Many strategies have been proposed to decrease or eliminate the effect of decoherence noise, such as an error-correcting code (ECC), [21] quantum error correction, [2226] entanglement purification, [2731] entanglement concentration, [3238] and quantum error rejection.[40] However, those methods will not work well when the interaction with the environment is not weak enough and the qubits are not affected with a low probability, such as, when the strong collective decoherence exists.[19]

Decoherence-free (DF) states are some interesting states which are invariant under collective decoherence no matter how strong the interaction is.[19] DF states have been applied to the protection of quantum information in many researches. The invariance property of the DF state can be described by the following equation:

This immunity against [U(t)]N] has been demonstrated in some studies.[20]

In this study, a robust QSDCA protocol against decoherence noise is proposed based on six-qubit DF states. The six-qubit DF states are used not only as the quantum carrier but also as the decoy state. In the process of secret transmission, four six-qubit DF states are used as the carrier, however only the | 0′ ⟩ state is prepared; the other three six-qubit DF states can be obtained by permuting the outputs of the setup for | 0′ ⟩ . In the process of eavesdropping detection, the | 0′ ⟩ state is used as the decoy state; the detection rate and the qubit error rate reach 81.3%, which will not change with the noise level. The stability and security of the proposed protocol are much higher than those of the ping– pong protocol not only in an ideal scenario but also in the decoherence noise scenario. Most attacks including the man-in-the-middle attack, intercept-resend attack, Trojan horse attack, and coherent attack can be resisted in our protocol. If the eavesdropper performs the intercept-resend attack, he only has 7.86 × 10− 4% chance to know one bit of C, which will not lead to the leakage of M1, unless KA is leaked because of the improper storage by Alice and Bob. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can only gain one bit of secret information with probability 0.042.

2. Description of QSDCA based on DF state

In this section, four 6-qubit DF states[4144] are selected as the carrier qubits. They are in the forms of

where , and denotes permuting the i-th qubit and the j-th qubit in the quantum state. These four states satisfy

Here, {| 0′ ⟩ , | 1′ ⟩ } and {| + ′ ⟩ , | − ′ ⟩ } construct two orthogonal bases in the 6-qubit DF state space. Indeed, one can prepare these four mutually orthogonal 6-qubit DF states just by combining the two setups of Ref.  [41]. By using six single-qubit measurements Z1Z2X3X4Z5Z6 (X1Z2Z3X4Z5Z6), we can distinguish | 0′ ⟩ and | 1′ ⟩ (| + ′ ⟩ and | − ′ ⟩ ), where Xi (Zi) (i = 1, … , 6) denotes measuring the i-th qubit in the X basis (Z basis).

Assume that Alice wants to send a secret message directly to Bob. The protocol is designed to help Alice and Bob finish their task safely. Alice and Bob share keys and with length N in advance, where and . The KA and KB represent Alice and Bob’ s identities, respectively. Alice’ s secret message is denoted as M (m1, m2, … , mS), where ms ∈ {0, 1}. Alice breaks up her secret message into k substrings (where parameter k is a natural number), the length of each substring is N.

Step 1 By adding and (m1, m2, … , mN) bitwise, Alice obtains C (c1, c2, … , cN) with length N.

Step 2 Alice prepares photon sequence SC according to C(c1, c2, … , cN). Firstly, Alice prepares N | 0′ ⟩ states, which form qubit sequence S. If ci is 0, Alice randomly performs 1 ↔ 3 operation or nothing on the i-th | 0′ ⟩ state in S; if ci is 1, Alice randomly performs 1 ↔ 3 and 2 ↔ 4 operations or 2 ↔ 4 operation on the i-th | 0′ ⟩ state in S.

Step 3 Alice prepares other N | 0′ ⟩ states, which form a decoy photon sequence ST. To detect the eavesdropping, Alice mixes ST into SC according to a rule and sends the mixed sequence to Bob. The rule is: if is 0, Alice inserts the i-th 6-qubit DF state of ST behind the i-th 6-qubit DF state of SC; if is 1, Alice inserts the i-th 6-qubit DF state of ST before the i-th 6-qubit DF state of SC.

Step 4 After Bob receives , Bob can extract ST from , because he knows . Bob measures the extracted ST with six single-qubit measurements Z1Z2Z3Z4Z5Z6. In the ideal case, every result should be in any of the 12 states: ∣ 010011⟩ 123456, ∣ 010101⟩ 123456, ∣ 010110⟩ 123456, ∣ 011001⟩ 123456, ∣ 011010⟩ 123456, ∣ 011100⟩ 123456, ∣ 100011⟩ 123456, ∣ 100101⟩ 123456, ∣ 100110⟩ 123456, ∣ 101001⟩ 123456, ∣ 101010⟩ 123456, ∣ 101100⟩ 123456. If the error rate is low enough, Bob believes that Alice is legal and no eavesdropping exists. In this condition, the communication goes on. Otherwise Bob interrupts it.

Step 5 If eavesdropping does not exist, Alice publicly announces the correct basis Z1Z2X3X4Z5Z6 or X1Z2Z3X4Z5Z6 of each 6-DF state in SC. Then Bob can measureSC correctly. According to the measurement result, Bob can restore C (c1, c2, … , cN). Then Bob obtains the secret message sent by Alice by adding and (c1, c2, … , cN) bitwise.

Step 6 Alice takes the next N bits of the secret message and begins the next transmission until all secret messages are sent.

3. Analysis
3.1. Correctness analysis
3.1.1. Correctness in the ideal scenario

In step 1, by adding and M1 (m1, m2, … , mN) bitwise, Alice obtains C (c1, c2, … , cN),

where denotes the bitwise adding operation. Then Alice encodes the message C on N | 0′ ⟩ states by permuting operations, therefore Alice forms a qubit sequence SC,

where PC denotes the permuting operations denominated by C, and S denotes the qubit sequence consisting of N | 0′ ⟩ states. After, Alice inserts decoy sequence ST to SC and obtains ,

where Z denotes inserting ST to SC according to KB.

After Bob receives , he recovers SC by extracting ST from according to KB,

where Z− 1 denotes extracting ST from according to KB. By measuring SC with correct bases, Bob obtains

where Ms denotes measuring SC with bases Z1Z2X3X4Z5Z6 or X1Z2Z3X4Z5Z6. Bob obtains the secret message by adding and C (c1, c2, … , cN) bitwise,

Obviously, the protocol is correct in the ideal scenario.

3.1.2. Correctness in decoherence noise scenario

With the use of DF states, the collective decoherence noise will not lead to errors in the protocol. So only the noise other than collective decoherence needs to be considered. These noises might appear in all of the quantum preparation setups, quantum channels, and measurement equipment. Therefore, to protect our protocol from these non-collective decoherence noises, we can add an error-correcting code (ECC) in our protocol.

Alice and Bob select an [s, N] error-correcting code, [21] which uses an s bits codeword to encode an N bits word using generator matrix G(xN) and can correct t codeword error bits with the error-correcting function D(ys).

In step 1, after Alice obtains C, she calculates the corresponding bits codeword W= (w1, w2, … , ws), where

In step 2, Alice performs permuting operations on | 0′ ⟩ states according to W and forms a new qubit sequence SW,

where PW denotes the permuting operations denominated by W, and S denotes the qubit sequence consisting of s | 0′ ⟩ states. After Alice inserts decoy sequence ST to SW, she obtains

where Z denotes inserting ST to SW according to KB.

After Bob receives , he recovers SW by extracting ST from according to KB,

where Z− 1 denotes extracting ST from according to KB. By measuring SW with correct bases, Bob obtains

where Ms denotes measuring SW with bases Z1Z2X3X4Z5Z6 or X1Z2Z3X4Z5Z6.

Suppose that the non-collective decoherence noises appear in the courses of W (w1, w2, … , ws) as O = (o1, o2, … , os), where oi = 0 or 1 represents whether an error is existent or not in wi. Then Bob obtains bit string W’ as

The C can be obtained by using the error-correcting function D(ys) on W’ ,

When the error rate does not exceed a rational threshold, the number of “ 1” in bit string O does not exceed t, therefore,

Bob obtains the secret message by adding and C (c1, c2, … , cN) bitwise,

That is, the protocol is correct in the decoherence noise scenariotoo.

3.2. Security analysis

With the use of DF states, the protocol is immune to collective decoherence noise, therefore, the eavesdropping will be found more easily. The cryptanalysis of the QSDCA protocol boils down to two aspects: (i) how to analyze the eavesdropping detection rate if Eve eavesdrops; (ii) whether the protocol resists some common attack strategies, such as the intercept-resend attack, man-in-the-middle attack, Trojan horse attack, and coherent attack, or not. Because the identity authentication is implemented based on identity string KB, the protocol will not be threatened by the man-in-the-middle attack. Next we analyze the eavesdropping detection rate of the protocol and how the protocol resists some common attack strategies, such as the intercept-resend attack, Trojan horse attack, and coherent attack.

3.2.1. Analysis of the eavesdropping detection rate

In the protocol, state | 0′ ⟩ is used as the decoy state to detect eavesdropping. Because the positions of decoy particles are secret, Eve cannot discriminate between decoy particles and information particles (particles in SC). Under this circumstance, Eve usually performs the same attack operation on all particles. We term the attack that Eve performs on each particle as E. Eve’ s attack will make the state | 0⟩ change to ; and the state | 1⟩ change to . Here ∣ a2 + ∣ b2 = 1 and ∣ m2 + ∣ n2 = 1.

Because of Eve’ s attack, the combined system changes to

Obviously, after Bob receives (mixture of SC and ST), Bob extracts ST and performs six single-qubit measurements Z1Z2Z3Z4Z5Z6 on ST. The probability without an eavesdropper is

Suppose | a| 2 = s, | b| 2 = t, a = m, and b = n, then

Because ∣ a2 + ∣ b2 = 1 and ∣ m2 + ∣ n2 = 1, p(∣ ψ E⟩ ) = − 12s6 + 36s5 − 36s4 + 12s3 can be obtained. Therefore, the error rate of each qubit due to eavesdropping is

which can also be seen as the lower bound of the detection rate of each qubit eavesdropped,

According to the theory of von Neumann entropy, the maximum amount of information contained in qubit | 0⟩ is termed as

and the maximum amount of information contained in qubit | 1⟩ is termed as

For a qubit transmitting in a quantum channel, it will be in the | 0⟩ or | 1⟩ state with equal probability (p = 0.5), therefore, the total information that Eve can eavesdrop in a qubit will be

By calculating, when I = 1, d = 0.813 is obtained. Also σ = 0.813 can be obtained. That is, eavesdropping to obtain the whole message on one qubit will lead to an 81.3% qubit-error rate, whatever the noise level is. In Ref.  [18], Li analyzed the security of the ping– pong protocol in the presence of collective-rotation noise (a major collective decoherence noise). According to Li’ s analysis, when the noise level is 0, the qubit-error rate caused by eavesdropping to obtain the whole message on one qubit is 0.5; when the noise level is 6%, the qubit-error rate is 0.18; and when the noise level is 11%, the qubit-error rate is 0.11. By comparing, we find that, when I = 1, the qubit-error rate in our protocol is always 81.3% whatever the noise level is; however, the qubit-error rate in the ping– pong protocol decreases dramatically with the increase of the noise level. Even when the noise level is 0, the qubit-error rate of the ping– pong protocol is only 0.5, which is much lower than that in our protocol. Therefore, the eavesdroppers will be found more easily in our protocol both in the ideal condition and the noisy condition. Even in the noisy condition, our protocol can display a better eavesdropping detection rate than the ping– pong protocol.

3.2.2. Intercept-resend attack

In an intercept-resend attack, when Alice sends particles to Bob, Eve intercepts some particles; Eve measures these individual particles and resends them to Bob. Eve intents to obtain some information by performing the intercept-resend attack. In this protocol, if Eve intercepts some particles, Eve has an 18.7% chance to guess the purpose of the particle right (for eavesdropping detection or transmitting secret information) and an 81.3% chance to guess wrong. If Eve guesses wrong, she cannot obtain any secret information contained in the qubit and is sure to be found. If Eve guesses right, Eve will have a 50% chance to choose the correct basis to measure the particle. Therefore, in this case, Eve has a 9.4% chance to know one qubit. Because six qubits contribute to one bit of C, Eve can know one bit of C with probability (9.4%)6 ≈ 6.89 × 10− 5%. However, because C is the result of M1 bitwise adding with KA, Eve cannot obtain the corresponding bit of M1 (the secret message) without KA (KA is secret to anyone else except Alice and Bob).

On the other hand, if Eve guesses right, but she chooses the wrong basis, Bob will have a 50% chance to obtain wrong information and Eve has a 50% chance to obtain the information. Under this circumstance, Eve has a 4.7% (18.7% × 50% × 50%) chance to know one qubit. Therefore, the total rate that Eve knows one qubit is 14.1% (9.4%+ 4.7%). Then Eve can know one bit of C with probability (14.1%)6 ≈ 7.86 × 10− 4%, which will not lead to leakage of M1, unless KA is leaked because of improper storage by Alice and Bob. Even if KA is leaked completely, Eve will have a 7.86 × 10− 4% chance to know the secret message on one qubit, which is much smaller than that in the ping– pong protocol (37.5%).

3.2.3. Security of KA and KB

The KA and KB are shared by Alice and Bob by executing the QKD protocol, therefore KA and KB are safe in the process of quantum key distribution. In the process of secret transmission, KA and KB will never be delivered in classical form but in qubit form which will be unconditionally safe because of quantum mechanics. The only unsafe factor is improper storage of KA and KB by Alice and Bob. However, the loss of KA will lead to leakage of the secret message on one qubit with probability 7.86 × 10− 4%. The loss of KB will not lead to leakage of the secret message in this transmission but give Eve a chance to obtain KA by exhaustive attack, which will make leakage of the secret in the following transmission. Therefore, the loss of KB or both KB and KA will cause leakage of the secret.

3.2.4. Trojan horse attack

The Trojan horse attack is performed by using spy photons. The spy photons are usually some invisible photons with a different wavelength or delay photons, which cannot be found by the legitimate users. Usually, Eve inserts spy photons to the legitimate photons. Because Bob cannot find the spy photons, Bob will encode the secret message on the spy photon, then Eve has the chance to obtain the secret message. In our protocol, Eve cannot obtain any secret message by performing a Trojan horse attack, because our protocol is a one-way protocol, Bob will not encode the secret message on photons.

3.2.5. Coherent attack

In our protocol, | 0′ ⟩ and | 1′ ⟩ (| + ′ ⟩ and | − ′ ⟩ ) are distinguished by six single-qubit measurements Z1Z2X3X4Z5Z6 (X1Z2Z3X4Z5Z6). Bob measures 6-DF states in SC with basis Z1Z2X3X4Z5Z6 or X1Z2Z3X4Z5Z6. The decoy qubits mixed in SC are measured with basis Z1Z2Z3Z4Z5Z6. For measurements Z1Z2X3X4Z5Z6, X1Z2Z3X4Z5Z6, and Z1Z2Z3Z4Z5Z6, we can find that three single-qubit measurements, which are marked in bold, remain unaltered. If Eve wants to get some valuable information and escape from being detected, she can intercept all the states sent from Alice and only measure the qubits with Z2Z5Z6 except for the first, the third, and the fourth ones in each state.

Table 1. All possible measurement results obtained by Eve with Z2Z5Z6 in her attack.

All the possible measurement results obtained by Eve in this attack are shown in Table  1. From Table  1, we can see that when Alice sends | 0′ ⟩ and | + ′ ⟩ , Eve may obtain some results which will never appear in the cases | 1′ ⟩ and | − ′ ⟩ , i.e., ∣ 0⟩ 2∣ 0⟩ 5∣ 0⟩ 6 and ∣ 1⟩ 2∣ 1⟩ 5∣ 1⟩ 6. Here and where and denote the reduced density matrices of quantum systems shown in Eq.  (1). If Alice sends | 0′ ⟩ and | + ′ ⟩ , we can find that both ∣ 0⟩ 2∣ 0⟩ 5∣ 0⟩ 6 and ∣ 1⟩ 2∣ 1⟩ 5∣ 1⟩ 6 appear with a probability of 1/6 in either | 0′ ⟩ or | + ′ ⟩ state. Alice sends | 0′ ⟩ or | + ′ ⟩ with probability 1/2, and Eve has good judgment of the purpose of the photon (decoy photon or secret carriers) with probability 1/2, therefore, Eve can gain one bit of the information of C with probability 1/6 × 2 × 1/2 × 1/2 = 1/12. To obtain one bit of the secret information, Eve has to know the corresponding bit of KA with probability 1/2. Thus, Eve can gain one bit of the secret information with probability 1/12 × 1/2 = 1/24 ≈ 0.042. When the number of bits transmitted in one transmission is N = 50 (the length of KA), the probability that Eve obtains the secret information approaches zero.

3.3. Discussion

In many cases, six-qubit entangled states are very difficult to prepare and manipulate in an experiment. However, in our protocol, the 6-DF state | 0′ ⟩ can be prepared with a setup[43, 44] that can be designed by combining the two apparatuses of Ref.  [41], and the other three states | 1′ ⟩ , | + ′ ⟩ , and | − ′ ⟩ can be prepared by permuting the outputs of the setup for | 0′ ⟩ .[42] The measurements of | 0′ ⟩ , | 1′ ⟩ , | + ′ ⟩ , or | − ′ ⟩ may be very difficult, however, six single-qubit measurements Z1Z2X3X4Z5Z6 (X1Z2Z3X4Z5Z6) cannot only distinguish | 0′ ⟩ and | 1′ ⟩ (| + ′ ⟩ and | − ′ ⟩ ), but also decrease the difficulty of measurement in an experiment. Therefore, our protocol is practical in an experiment.

4. Conclusion

We present a QSDCA protocol based on four six-qubit DF states. Because of the features of the four six-qubit DF states, only the state | 0′ ⟩ needs a setup and the other three states can be prepared by permuting the outputs of the setup for | 0′ ⟩ .[42] The protocol is verified as secure in the ideal scenario and the noise scenario. The four six-qubit DF states are immune to collective decoherence noise, however, they may be affected by some non-collective decoherence noises. To protect our protocol from these non-collective decoherence noises, we add an error-correcting code (ECC) in our protocol. The six-qubit DF state is not only used as the carrier to transmit a secret securely but also used as the decoy state to detect an eavesdropper. The detection rate (qubit error rate) reaches 81.3% per-qubit. Compared with the ping– pong protocol, the qubit error rate is much higher and is not effected by the noise level. The qubit-error rate in the ping– pong protocol decreases dramatically with the increase of the noise level. Most attacks including the man-in-the-middle attack, intercept-resend attack, Trojan horse attack, and coherent attack can be resisted in our protocol. If the eavesdropper performs an intercept-resend attack, he only has a 7.86× 10− 4% chance to know one bit of C, which will not lead to the leakage of M1, unless KA is leaked because of improper storage by Alice and Bob. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042.

Reference
1 Bennett C H and Brassard G 1984 Proc. IEEE Int. Conf. Comput. Syst. Signal Processing New York IEEEp.  175 [Cited within:2]
2 Ekert A K DOI:10.1103/PhysRevLett.67.6611991 Phys. Rev. Lett. 67 661 [Cited within:1] [JCR: 7.943]
3 Bennett C H DOI:10.1103/PhysRevLett.68.31211992 Phys. Rev. Lett. 68 3121 [Cited within:1] [JCR: 7.943]
4 Bennett C H, Brassard G and Mermin N D DOI:10.1103/PhysRevLett.68.5571992 Phys. Rev. Lett. 68 557 [Cited within:1] [JCR: 7.943]
5 Long G L and Liu X S DOI:10.1103/PhysRevA.65.0323022002 Phys. Rev. A 65 032302 [Cited within:2] [JCR: 3.042]
6 Boström K and Felbinger T DOI:10.1103/PhysRevLett.89.1879022002 Phys. Rev. Lett. 89 187902 [Cited within:1] [JCR: 7.943]
7 Deng F G Long G L and Liu X S DOI:10.1103/PhysRevA.68.0423172003 Phys. Rev. A 68 042317 [Cited within:1] [JCR: 3.042]
8 Wang C Deng F G, Li Y S Liu X S and Long G L DOI:10.1103/PhysRevA.71.0443052005 Phys. Rev. A 71 044305 [Cited within:1] [JCR: 3.042]
9 Li X H, Deng F G and Zhou H Y DOI:10.1103/PhysRevA.74.0543022006 Phys. Rev. A 74 054302 [Cited within:1]
10 Long G L, Deng F G, Wang C and Li X H DOI:10.1007/s11467-007-0050-32007 Front Phys. China 2 251 [Cited within:1]
11 Gao F, Qin S J and Guo F Z DOI:10.1088/0256-307X/28/2/0203032011 Chin. Phys. Lett. 28 020303 [Cited within:1] [JCR: 0.811] [CJCR: 0.4541]
12 Chang Y, Xu C X, Zhang S B and Yan L L DOI:10.1088/1674-1056/23/1/0103052014 Chin. Phys. B 23 010305 [Cited within:1]
13 Gao F, Liu B and Wen Q Y DOI:10.1364/OE.20.0174112012 Opt. Express 20 17411 [Cited within:1] [JCR: 3.546]
14 Zou X F and Qiu D W DOI:10.1007/s11433-014-5542-x2014 Sci. China-Phys. Mech. Astron. 57 1696 [Cited within:1]
15 Zheng C and Long G F DOI:10.1007/s11433-014-5461-x2014 Sci. China-Phys. Mech. Astron. 57 1238 [Cited within:1]
16 Chang Y Xu C X Zhang S B and Yan L L DOI:10.1007/s11434-014-0339-x2014 Chin. Sci. Bull. 59 2541 [Cited within:3] [CJCR: 0.95]
17 Pei C X, Han B B and Zhao N 2009 Acta Photon. Sin. 38 422 [Cited within:1]
18 Li J, Li L Y, Jin H F and Li R F DOI:10.1016/j.physleta.2013.08.0192013 Phys. Lett. A 377 2729 [Cited within:1] [JCR: 1.11]
19 Li Y B and Qin S J DOI:10.1007/s11128-012-0517-12013 Quantum Inf. Process 12 2191 [Cited within:4] [JCR: 1.748]
20 Chen T Y, Zhang J, Boileau J C, Jin X M, Yang B, Zhang Q, Yang T, Laflamme R and Pan J W DOI:10.1103/PhysRevLett.96.1505042006 Phys. Rev. Lett. 96 150504 [Cited within:1] [JCR: 7.943]
21 MacWilliams F J and Sloane N J A 1977 The Theory of Error-Correcting Codes New York Noth-Holland [Cited within:2]
22 Shor P W DOI:10.1103/PhysRevA.52.R24931995 Phys. Rev. A 52 2493 [Cited within:1] [JCR: 3.042]
23 Laflamme R, Miquel C, Paz J P and Zurek W H DOI:10.1103/PhysRevLett.77.1981996 Phys. Rev. Lett. 77 198 [Cited within:1] [JCR: 7.943]
24 Steane A M DOI:10.1103/PhysRevLett.77.7931996 Phys. Rev. Lett. 77 793 [Cited within:1] [JCR: 7.943]
25 Wen K and Long G L DOI:10.1142/S02197499100062892010 Int. J. Quant. Inf. 8 697 [Cited within:1]
26 Zhang C M and Song X T DOI:10.1007/s11434-014-0446-82014 Chin Sci. Bull. 59 2825 [Cited within:1] [CJCR: 0.95]
27 Li X H DOI:10.1103/PhysRevA.82.0443042010 Phys. Rev. A 82 044304 [Cited within:1]
28 Sheng Y B and Deng F G DOI:10.1103/PhysRevA.81.0423322010 Phys. Rev. A 81 042332 [Cited within:1] [JCR: 3.042]
29 Xia Y Fan L L and Hao S Y DOI:10.1007/s11128-013-0610-02013 Quantum Inf. Process 12 3553 [Cited within:1] [JCR: 1.748]
30 Sheng Y B, Zhou L and Long G L DOI:10.1103/PhysRevA.88.0223022013 Phys. Rev. A 88 022302 [Cited within:1] [JCR: 3.042]
31 Hou S Y, Sheng Y B and Feng G R Long G L DOI:10.1038srep068572014 Quantum Information Processor [Cited within:1]
32 Wang C, Zhang Y and Jin G S DOI:10.1103/PhysRevA.84.0323072011 Phys. Rev. A 84 032307 [Cited within:1] [JCR: 3.042]
33 Sheng Y B Zhou L, Zhao S M and Zheng B Y DOI:10.1103/PhysRevA.85.0123072012 Phys. Rev. A 85 012307 [Cited within:1] [JCR: 3.042]
34 Du F F Li T, Ren B C, Wei H R and Deng F G DOI:10.1364/JOSAB.29.0013992012 J. Opt. Soc. Am. B 29 1399 [Cited within:1] [JCR: 2.21]
35 Ren B C, Du F F and Deng F G DOI:10.1103/PhysRevA.88.0123022013 Phys. Rev. A 88 012302 [Cited within:1]
36 Wang T J and Long G L DOI:10.1364/JOSAB.30.0010692013 J. Opt. Soc. Am. B 30 1069 [Cited within:1] [JCR: 2.21]
37 Zhang R and Zhou S H Cao C DOI:10.1007/s11433-013-5308-x2014 Sci. China-Phys. Mech. Astron. 57 1511 [Cited within:1]
38 Ren B C and Long G L DOI:10.1364/OE.22.0065472014 Opt. Express 22 6547 [Cited within:1] [JCR: 3.546]
39 Xu G F and Long G L DOI:10.1038/srep068142014 Scientific Reports 4 6814 [Cited within:1]
40 Wang X B DOI:10.1103/PhysRevA.69.0223202004 Phys. Rev. A 69 022320 [Cited within:1] [JCR: 3.042]
41 Bourennane M, Eibl M and Gaertner S DOI:10.1103/PhysRevLett.92.1079012004 Phys. Rev. Lett. 92 107901 [Cited within:3] [JCR: 7.943]
42 Ji C H and Yee Y DOI:10.1109/JSTQE.2004.8291992004 IEEE J. Sel. Top Quantum Electron. 10 545 [Cited within:1] [JCR: 4.078]
43 Cabello A DOI:10.1103/PhysRevA.75.0203012007 Phys. Rev. A 75 020301 [Cited within:1]
44 Sun Y, Wen Q Y Gao F and Zhu F C DOI:10.1103/PhysRevA.80.0323212009 Phys. Rev. A 80 032321 [Cited within:3]