† Corresponding author. E-mail:
Quantum secure direct communication (QSDC) is an important branch of quantum cryptography. It can transmit secret information directly without establishing a key first, unlike quantum key distribution which requires this precursory event. Here we propose a QSDC scheme by applying the frequency coding technique to the two-step QSDC protocol, which enables the two-step QSDC protocol to work in a noisy environment. We have numerically simulated the performance of the protocol in a noisy channel, and the results show that the scheme is indeed robust against channel noise and loss. We also give an estimate of the channel noise upper bound.
The security of information is more important nowadays than at any other time in history. It is significant to the success and development of our society, and it has become one of the primary concerns in everyday life. Historical conflicts within the last century, such as World War II and the subsequent Cold War have propelled many technological advancements in the security of information. Today, information security is not only crucial to national defense and military affairs, but also has gained profound importance within civilian affairs since the rise of the Internet in the 1990s. The absolute security of classical cryptography has not been proven as it is based on the existence of some difficult mathematical problems. It is always possible that some flaws might exist and the code may be broken without being announced. In contrast, quantum cryptography, which emerged in the 1980s,[1] is provably safe.[2] Since then it has attracted much attention and gained tremendous development.
Secure quantum communication includes several different modes, such as quantum key distribution (QKD),[1,3–15] quantum secret sharing (QSS),[16] and quantum secure direct communication (QSDC).[17–21] The security of these protocols is ensured by the principles of quantum mechanics, such as uncertainty principle, quantum no-cloning theorem, the principle of quantum measurement, and non-locality of entangled particles. In the earliest QKD protocol, the BB84 protocol,[1] two orthogonal bases are used to prepare the photons and encode the states. In 1991, Ekert proposed a QKD scheme based on EPR pair (E91).[3] In QKD schemes, a key is established first, and the secret information is then encoded with the key into ciphertext and sent through a classical communication.
Since the first QSDC scheme was proposed in 2000,[17] many QSDC protocols have been designed and studied.[18–67] Different from QKD, QSDC transmits a secret message directly without establishing a key first. Besides this, QSDC also satisfies two features:[18] direct communication and secure communication. Direct communication of QSDC means that an authorized receiver can obtain the secret information directly from the received quantum states without another classical transmission. Secure communication refers to the capability of QSDC that even if an eavesdropper is able to control the communication channel, she cannot get any useful information about the secret message except blind random results.
Earlier QSDC protocols are designed for ideal conditions. However, in practice, noise is inevitable, and consequently it causes losses and errors of information. There are some technologies to combat against the channel noise, such as entanglement swapping,[68,69] quantum entanglement purification,[70–73] quantum error correction,[74,75] and quantum privacy amplification. 76] Instead of the complicated schemes mentioned above, we propose a simple frequency coding scheme to a two-step QSDC protocol. This coding scheme has been applied in quantum one-time pad QSDC protocol which is also known as DL04 protocol[19] and realized in experiment recently.[77] Rather than encoding quantum qubits on every EPR pair, this frequency coding scheme encodes a block of EPR pairs into a periodic sequence in which we can analyze its frequency by using discrete time Fourier transform. The new coding scheme has a large advantage in resisting the channel losses and errors.
Before the coding procedure, the new protocol is completely identical to the original one.[18] The difference between the original one and this scheme is the introduction of frequency coding. The scheme contains the following five steps.
(i) Alice prepares a sequence of EPR pairs in one of the four Bell states
(ii) Then Alice separates the ordered N EPR pairs into two sequences, namely, she picks up one photon from each EPR pair to form an ordered photon sequence A, called A-sequence. The remaining photons form another sequence B, called B-sequence, and there is a one-to-one correspondence between the two sequences.
(iii) Alice sends the A-sequence to Bob, while holding the B-sequence. After the A-sequence is received by Bob, he checks eavesdropping with Alice by the following steps. 1) Bob chooses moderate amounts of photons randomly from the A-sequence. Then he randomly chooses one of two measuring bases Z or X to measure the chosen photons. 2) After the measurement, Bob tells Alice which photons he has chosen, which measuring basis he used, as well as the measuring results. 3) According to the information from Bob, Alice uses the same measuring basis to measure the corresponding photons in the B-sequence. 4) Then Alice compares her results with Bob’s, and estimates the error rate. If there is no eavesdropping, the error rate should be lower than the threshold, which means the transmission is safe. If not, the photon sequence should be discarded and the communication process should be ceased.
(iv) If the transmission of the A-sequence is proved secure, Alice can transmit the secret message. In the original protocol,[18] Alice uses a dense coding scheme to encode the message. Instead, the frequency coding scheme is applied with frequency coding, and specific details will be described later. Meanwhile, Alice randomly selects some photons as check bits from the B-sequence and changes their states by randomly performing one of four unitary operations
(v) Alice sends the encoded sequence to Bob, and Bob performs Bell-basis measurement on two sequences simultaneously. After transmission, Alice tells Bob which photon is the check bit and what operation she has chosen. Then Bob can estimate the error rate. If the error rate is lower than the threshold, the transmission is safe. Otherwise, it will be concluded that there is an eavesdropper who is disturbing the transmission. Nevertheless, Eve will not be able to get any useful information because if the first sequence is secure, the eavesdropper cannot obtain the two photons of EPR pair for Bell-basis measurement and cannot speculate on the secret message. After excluding the check bits, Bob can do the decoding procedure to get the secret message sent by Alice.
Next, we will describe the frequency coding scheme in detail. This scheme was first introduced to the QSDC with single photons in Ref. [77]. As is well-known, in the original two-step QSDC protocol, information is encoded on EPR pairs directly with the four unitary operations
To better understand this coding scheme, let us go with the single frequency situation first. In this situation, we only keep two unitary operations
To obtain the encoded message, namely, the encoding frequency, the periodic discrete function in the time domain is transformed into the frequency domain using discrete time Fourier transform, namely,
The above example explains the working principle of a single frequency coding, where only two dense coding operations
An integer number between 0 and 3 can be obtained at each instant of time. For example, 0 corresponds to three
As in Ref. [18], if the security of the A-sequence is guaranteed, two parties of communication can ascertain that the transmission is safe. Without both photons of each EPR pair at hand, the only thing Eve could do is to disturb the communication between Alice and Bob, as she cannot perform the Bell-basis measurement to eavesdrop the secret message.
However, in a noisy channel, the situation is different. Eve can hide herself behind the noise from being detected. If she controls the communication channel completely, she can intercept the A-sequence and capture a moderate amount of photons, then replace each captured photon by the photon of an EPR pair that she prepared before. Then she sends the sequence to Bob via a channel with less noise; here we can assume Eve’s channel is ideal. When Bob does the security checking, he will mistakenly think the error is generated by noise and the communication is safe. During the transmission of the B-sequence, Eve captures the corresponding photons to perform Bell-basis measurement. As a result, Eve could get some of the secret information without being found. However, if the frequency coding scheme is used, it is useless for Eve to capture a few EPR pairs, since she should have enough EPR pairs for spectrum calculation. Nevertheless, if she continuously captures photons in a period of time, she may have a complete cycle with a few EPR pairs. It is much easier for Eve to speculate the frequency which Alice wants to transmit. In order to avoid this situation, more checking photons are needed (about 50%) for security check. It is also crucial to analyze the error density in different positions of the checking B-sequence. Suppose the channel and the instruments are reliable, the errors are generated randomly. If the error density in the sequence is much higher than any other place, it means that the sequence has been eavesdropped by Eve, then the communication should be aborted. Using this method, Eve can only intercept the photon randomly, not continuously. Suppose the error rate of the channel is e, Eve can get a fraction 2e of all the useful photons. Because the half photons are A-photon, and there is a probability of 50% that Alice and Bob cannot find the error photon caused by Eve, as Eve intercepts more photons, she gains a higher chance to speculate the frequency, so there is a channel noise upper bound for communication security. In this paper, we will give a rough estimate but not a rigorous proof.
There is a sampling theory in classical communication. Only when the sampling rate is higher than twice the maximum frequency component, the signal can be restored almost without distortion. Enlightened by the sampling theory, we borrow the idea to analyze the channel noise upper bound. According to the idea of the sampling theory, the signal cannot be restored when the sampling rate is lower than twice the maximum frequency component. But here, we allow the sampling rate to be lower than twice the minimum frequency component to ensure that the eavesdroppers cannot speculate the frequency at all. Suppose the transmission of 600 photons in each sequence block. Half of the photons in each checking sequence are checking photons, besides Alice chooses 100 photons for the second security check. In other words, there are 200 useful photons in a B-sequence. For example, if the minimum frequency of the channel is set as 500 Hz, Eve is unable to speculate the frequency with the sampling rate lower than 1000 Hz. Meanwhile, if the time interval of sending each photon is set as 0.1 ms, it takes 0.02 s to transmit 200 photons. Eve can capture 20 photons with the sampling rate 1000 Hz in 0.02 s. That is to say, Eve cannot get the secret information if the captured EPR pairs are less than 20. In this situation, the channel error rate is 5%, which is a rough estimate of the channel noise upper bound. Actually, according to this theory, the upper bound of the error rate is e = 1/n, where n is the number of photons coded in a cycle of minimum frequency. In addition, if Alice wants to transmit three identical frequencies, only 100 photons are needed in one sequence block. The 100 photons not only are enough to transmit the information, but also can reduce the photon captured by Eve. It is because one frequency is less complicated than three frequencies for Eve to guess with limited information. The following is a numerical simulation.
As shown in Fig.
An anti-noise frequency coding scheme to improve the two-step QSDC protocol is proposed in this paper. The new scheme has a strong ability of resisting channel losses and errors. When the security of communication is guaranteed, the receiver can still get the secret information precisely, even though the error rate is high. Also, the new scheme can improve the security of communication, because the eavesdroppers cannot get any secret information when they only capture a few EPR pairs. Though the transmission efficiency is weakened by this scheme, it can significantly improve the feasibility ofthe two-step QSDC protocol. It is not a complex technology, and is easy to realize. With the development of quantum entanglement technology, the two-step QSDC protocol can be realized in experiment one day. Recently, an experimental demonstration of the two-step QSDC protocol has been demonstrated.[78]
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] | |
[35] | |
[36] | |
[37] | |
[38] | |
[39] | |
[40] | |
[41] | |
[42] | |
[43] | |
[44] | |
[45] | |
[46] | |
[47] | |
[48] | |
[49] | |
[50] | |
[51] | |
[52] | |
[53] | |
[54] | |
[55] | |
[56] | |
[57] | |
[58] | |
[59] | |
[60] | |
[61] | |
[62] | |
[63] | |
[64] | |
[65] | |
[66] | |
[67] | |
[68] | |
[69] | |
[70] | |
[71] | |
[72] | |
[73] | |
[74] | |
[75] | |
[76] | |
[77] | |
[78] |