† Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant No. 61502048), the Natural Science Foundation of Shanxi Province of China (Grant No. 201801D221159), the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi Province of China (Grant No. 2019L0470), and Youth Research Foundation of Shanxi University of Finance and Economics in Shanxi Province of China (Grant No. QN-2016009).
Quantum system is inevitably affected by the external environment in the real world. Two controlled quantum dialogue protocols are put forward based on logical χ-type states under collective noise environment. One is against collective-dephasing noise, while the other is against collective-rotation noise. Compared with existing protocols, there exist several outstanding advantages in our proposed protocols: Firstly, the χ-type state is utilized as quantum channels, it possesses better entanglement properties than GHZ state, W state as well as cluster state, which make it difficult to be destroyed by local operations. Secondly, two kinds of logical χ-type states are constructed by us in theory, which can be perfectly immune to the effects of collective noise. Thirdly, the controller can be offline after quantum distribution and permission announcement, without waiting for all the participants to complete the information coding. Fourthly, the security analysis illuminates that our protocols can not only be free from the information leakage, but also resist against the intercept-and-resend attack, the entanglement-and-measure attack, the modification attack, the conspiring attack, and especially the dishonest controller’s attacks.
With the advent of the era of big data and cloud computing, the problem of personal information leakage will be increasingly prominent although the data can bring much convenience to human life. This problem will make every one become a transparent person in this era. Hence, how to effectively ensure the security of information is of great importance.
Classical cryptography is always a common choice, but it will face the threat of being broken through in polynomial time with the advent of quantum algorithms.[1,2] Quantum cryptography has been proven to be unconditionally secure over an insecure channel, whose security is guaranteed by quantum mechanics such as Heisenberg uncertainty principle and non-cloning theorem. Therefore, quantum cryptography is attracting more and more attention from both industry and academia. Up to date, various quantum communication protocols have been presented by scholars and engineers, such as quantum key distribution (QKD),[3–5] quantum secure direct communication (QSDC),[6–8] quantum secret sharing (QSS),[9–11] quantum teleportation (QT),[12,13] remote state preparation (RSP),[14,15] and quantum signature (QS).[16,17]
As a significant branch of quantum cryptography, quantum dialogue (QD) allows two participants to exchange their secret message simultaneously, which is also known as bidirectional quantum secure direct communication (BQSDC). In 2004, Nguyen et al. invented the first QD protocol by extending the quantum secure direct communication (QSDC).[18] To date, the fruitful research results have been achieved.[19–25] In 2006, Man et al.[26] introduced the novel notion of controlled quantum dialogue (CQD) and proposed a CQD protocol based on GHZ entangled states. In fact CQD adds a new role to the whole dialogue process, called controller, who is responsible for supervising the secret communication between two legitimate participants. In 2013, Yang et al.[27] devised a novel scheme of CQD based on Brown states, unfortunately, there exists a risk of information leakage in it. In the same year, Ye et al.[28] found out that the information leakage problem exists in the protocol proposed by Man et al.[26] and then put forward two approaches to be free from it. However, it was proven that these two improved approaches still suffer from the information leakage problem[29,30] as well as the intercept-and-resend attack.[31] In 2016, Kao et al.[32] indicated that the conspiring attack exists in all the previous CQD protocols, and designed an improvement scheme. In 2017, Kao et al.[33] put forward a new CQD protocol based on cluster states again and suggested that some security requirements must be satisfied in the CQD protocols:
The users’ secrets will not be leaked to the outsiders or even to the controller. A user can obtain the other user’s secret message content only if the controller provides a permission. The users in a CQD protocol cannot conspire to communicate without the controller’s permission. Recently, Liu et al. pointed out that the protocol presented in Ref. [33] will inevitably suffer from the dishonest controller’s attacks, namely, so-called different-initial-state (DIS) attack and denial-of-service (DoS) attack, and designed an improved scheme for mending these security loopholes.[34] Owing to these loopholes, this paper introduced a new requirement for CQD protocols. The users in a CQD protocol must be capable of preventing the dishonest controller’s attacks. In brief, how to design an efficient and secure CQD protocol meeting the above four requirements is a hot issue for the researchers.
So far, a majority of existing CQD protocols are designed in an ideal environment. In fact, the qubits will inevitably be affected by channel noise during the transmission over the quantum channel. As a result, a malicious attacker can launch the baleful attack under the cover of all the noises. Hence, it is necessary to consider the noise factor when some new CQD protocols are put forward. The simple and practical method for realizing the reliable transmission of qubits over collective noise channel is to construct decoherence-free states (DFS). Because they can eliminate the effects of collective noise better, the decoherence-free states have been widely applied to design QD protocols against collective noise.[35–42] However, to our knowledge, the specific CQD protocols against collective noise have been rarely studied so far. In consequence, we take into account how to design the CQD protocols against collective noise.
Quantum entanglement, one of the most striking features of quantum mechanics, is exploited as an important resource for quantum communication and quantum information processing (QIP). In 2006, a new type of four-qubit genuine entangled states was proposed by Yeo et al. in Ref. [43], called the χ-type state. It can be expressed as
For satisfying the demands of practical applications, we put forward two controlled quantum dialogue (CQD) protocols based on logical χ-type states under collective noise environment. One is against collective-dephasing noise, while the other is against collective-rotation noise. These two protocols own four outstanding features:
The χ-type states are used as information carriers, which are in possession of excellent entanglement properties. By drawing on the advantages of DFS, we construct two kinds of logical χ-type states, which can be immune to the effects of collective-dephasing noise and collective-rotation noise, respectively. The controller can be offline after quantum distribution and permission announcement, without waiting for all the participants to complete the information coding, that is to say, the waiting time of the controller will be effectively reduced. They can not only perfectly avoid the information leakage problem, but also withstand several well-known attacks, such as the intercept-and-resend attack, the entanglement-and-measure attack, the modification attack, the conspiring attack, and especially the dishonest controller’s attacks.
The rest of this paper is organized as follows: Section
In this section, we firstly together give a review of both collective-dephasing noise and collective-rotation noise; secondly study the characters of logical qubit and its corresponding logical unitary operations; and finally construct two kinds of logical χ-type states in theory to be against collective noise.
A collective-dephasing noise can be expressed as
A collective-rotation noise can be expressed as
Generating some logical states with good properties is a good choice for being against collective noise. Hence we are considering how to prepare two kinds of logical χ-type states against both collective-dephasing noise and collective-rotation noise. Fortunately, the dilemma is entirely solved by us. Subsequently, we offer a detailed explanation on how these two kinds of logical χ-type states are prepared.
As shown in Fig.
The whole process of preparing the logical χ-type state against collective-dephasing noise can be shown as
As demonstrated in Fig.
The whole process of preparing the logical χ-type state against collective-rotation noise can be shown as follows:
In this section, a fault tolerant CQD protocol against collective-dephasing noise is put forward, which includes one controller, Charlie, and two communicants, Alice and Bob. As shown in Fig. Alice sends a communication request to Charlie. Charlie generates a sequence of 2N logical χ-type states, each of which is in the state
Afterwards, Charlie firstly divides these logical χ-type states into two qubit sequences SA and SB, where SA is composed of all the logical qubits A1 and A2, and all the logical qubits B1 and B2 constitute SB; secondly performs the operations
Then, Alice (Bob) carries out Z-basis measurements on her (his) qubits
To be obvious, three legitimate participants have succeeded in sharing 2N χ-type states. For convenience, we replace the original subscript
In this section, a fault tolerant CQD protocol against collective-rotation noise is elaborated by us, including one controller, Charlie, and two communicants, Alice and Bob. The schematic demonstration of this protocol is the same as Fig. Alice sends a communication request to Charlie. Charlie generates a sequence of 2N logical χ-type states, each of which is in the state
Therewith, Charlie firstly divides these χ-type states into two qubit sequences SA and SB, where SA is composed of all the logical qubits A1 and A2, and all the logical qubits B1 and B2 constitute SB; secondly performs the operations
Different from the scheme in Section
Lastly, Alice (Bob) performs X-basis measurements on her (his) qubits
Apparently, three legitimate participants have succeeded in sharing 2N χ-type states. For convenience, we replace the original subscript
This section mainly analyzes why these two protocols designed by us can not only successfully eliminate the information leakage, but also resist against the intercept-and-resend attack, the entanglement-and-measure attack, the modification attack, the conspiring attack, and especially the dishonest controller’s attacks.
The information leakage is that an eavesdropper Eve is able to obtain a part of classical information only from the public announcement without taking any active attacks. In these two protocols presented by us, the public information includes Charlie’s permission as well as the transmitted classical bits mA and mB. For Charlie’s permission, look back at the whole process, Charlie randomly performs the unitary operation
The intercept-and-resend attack is that an eavesdropper Eve attempts to intercept all the transmitted qubits, replace them with new qubits, and send these new qubits to the receivers. Suppose that Eve intercepts all the qubits in QA and sends a sequence of fake qubits to Alice in step 1. However, it is apparent that Eve is unaware of the positions and bases of checking qubits, which are generated by Charlie, thus she cannot always prepare the same checking qubits as the ones prepared by Charlie. Eve’s fake qubits will introduce errors in the security check of step 2 with the probability
The entanglement-and-measure attack is that an eavesdropper Eve seeks to employ her auxiliary qubits to entangle with the transmitted qubits, and implement corresponding measurements on the auxiliary qubits to obtain secret information. In the whole protocol, most likely Eve launches the entanglement-and-measure attack in the process of sending QA to Alice (QB to Bob) by Charlie in step 1. After performing an entanglement operation, the transmitted qubit and ancilla |e⟩ will be entangled together. In the whole process, the checking qubits will be changed into
Eve intends to carry out a great deal of random unitary operations on the transmitted qubits sent to both Alice and Bob in step 1. If Eve can successfully change
Based on the deterministic entanglement correlation of χ-type states, Alice and Bob may conspire to communicate without Charlie’s permission. However, in step 1, after Charlie performs a random unitary operation on A2 in SA, the logical χ-type states will be unexpectedly changed. To be specific, if Charlie performs
As described in Ref. [34], the controller has more initiative than the sender together with the receiver when checking security. If the controller is dishonest, he/she will be more dangerous than external attackers. Hence, the CQD protocols are more vulnerable to attack initiated by the controller, such as the different-initial-state (DIS) attack and the denial-of-service (DoS) attack. The DIS attack means that the controller can steal participants’ secret message by preparing the different initial states, while the DoS attack means that the controller can deliberately announce the wrong classical information so that one legitimate user will get the wrong message from the other. We intend to take the CQD protocol against collective-dephasing noise as an example to explain why our protocols can be against these two attacks effectively.
We explain why our protocols can resist against the DIS attack first. It is easy to verify that the set
Secondly, for the DoS attack, we can find that it can be viewed as a special case of the DIS attack in our protocols. In step 1, Charlie prepares the logical χ-type states |χdp⟩, randomly performs the unitary operations
In order to evaluate the performance of our protocols synthetically, this section objectively compares them with previous CQD protocols in terms of some important indicators, such as quantum resource, the conspiring attack, the dishonest controller’s attacks, the information leakage, controller’s online waiting, collective noise environment, and qubit efficiency. The concrete parameters are summarized in Table
As shown in Table For quantum resources, the χ-type state is used as quantum channels in our protocols. It possesses better entanglement properties than others employed in previous protocols, which is illustrated in Ref. [43]. For resisting collective noise, to be obvious, our protocols can be perfectly immune to both collective-dephasing noise and collective-rotation noise, while the others can not. For two new attacks which are given special attention, the conspiring attack and the dishonest controller’s attacks, our protocols and the protocol in Ref. [34] are capable of resisting both attacks, while the ones in Refs. [27,28,32,33] cannot resist these two attacks at the same time. For the information leakage, compared with the protocols of Refs. [27,28], our protocols can be free from the information leakage, which is the same as the ones in Refs. [32,33,34]. For controller’s online waiting problem, similar to the protocols in Refs. [33,34], in our protocols the controller can be offline after quantum distribution and permission announcement, without waiting for all the participants to complete the information coding. As a result the waiting time of the controller will be effectively reduced. For qubit efficiency, intuitively the qubit efficiency of our protocols is lower than that of others. In fact, the richer functionality than others leads to the lower efficiency. It is noteworthy that the qubit efficiency of the protocol in Ref. [34], which is the most similar to our protocols, will be the same as our protocols when it is improved to be against collective noise. The qubit efficiency is defined as η = m/q, where m denotes the number of secret bits and q denotes the total number of required qubits.
In summary, in order to eliminate the disturbance from the external environment, we put forward two controlled quantum dialogue protocols against collective noise, which are against collective-dephasing noise and collective-rotation noise, respectively. Based on the comprehensive and objective evaluation on the performance, it is easy to find out that our protocols are superior to most existing protocols. Especially, it needs to emphasize that not only two kinds of logical χ-type states are constructed by us in theory to be against collective noise, but also our protocols can effectively resist against both the conspiring attack and the dishonest controller’s attacks, which are attracting special attention of researchers recently.
Finally, we should keep trying to seek an answer for how to design the controlled quantum dialogue protocols satisfying the demands of society better.