Chinese Journal of Quantum Electronics, Volume. 23, Issue 4, 441(2006)
Direct deterministic communication on quantum channel
[1] [1] Wiesner S. Conjugate coding(Original Manuscript 1969)[J].Sigact News,1983,15: 78-88.
[2] [2] Gisin N,Ribordy G,Tittel W,et al. Quantum cryptography [J].Rev. Mod. Phys.,2002,74: 145-195.
[3] [3] Bost m K,Felbinger T. Deterministic secure direct communication using entanglement [J].Phys. Rev. Lett.,2002,89(18): 187902.
[4] [4] Brassard G,Lüttkenhaus N,Mor T,Sanders B C. Limitations on practical quantum cryptography [J].Phys. Rev. Lett.,2000,85(6): 1330-1333.
[5] [5] Bennett C H,Brassard G. in Proceeding of the IEEE International Conference on Computers,Systems,and Signal Processing [M].Bangalore,1984.175-179.
[6] [6] Cai Qingyu,Li Baiwen. Improving the capacity of the Bostr m-Felbinger protocol [J].Phys. Rev. A,2004,69: 054301.
[7] [7] Cai Qingyu. Deterministic secure direct communication using Ping-pong protocol without public channel [OL].e-print quant-ph/0301048.
[8] [8] Cai Qingyu. The “Ping-pong” protocol can be attacked without eavesdropping [J].Phys. Rev. Lett.,2003,91(10): 109801.
[9] [9] Cai Qingyu. An one-time-pad key communication protocol with entanglement [OL].e-print quant-ph/0309108.
[10] [10] Hua LV,Cai Qingyu. N-Partner secure direct communication based on quantum nonlocality [OL].e-print quantph/0401078.
[11] [11] Gao Ting,Yan Fengli,Wang Zhixi. Controlled quantum teleportation and secure direct communication [J].Chinese Phys.,2005,14: 893-897.
[12] [12] Cai Qingyu,Li Baiwen. Deterministic secure communication without using entanglement [J].Chin. Phys. Lett.,2004,21(4): 601-603.
[13] [13] Lo H K,Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J].Science,1999,283: 2050-2056.
[14] [14] Shor P W,Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J].Phys. Rev. Lett.,2000,85(2): 441-444.
[15] [15] Mayers D. Shor and Preskill's and Mayers's security proof for the BB84 quantum key distribution protocol [J].Eur. Phys. J. D,2002,18: 161-170.
[16] [16] Lutkenhaus N. Security against individual attacks for realistic quantum key distribution [J].Phys,Rev. A,2000,61(5): 052304.
[17] [17] Deng F G,Long G L. Secure direct communication with a quantum one-time pad [J].Phys. Rev. A,2004,69: 052319.
[18] [18] Bennett C H. Quantum cryptography using any two nonorthogonal states [J].Phys. Rev. Lett.,1992,68(21): 3121-3124.
[19] [19] Zhang Z J,Man Z X. Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations [OL].e-print quant-ph/0403218.
[20] [20] Zhang Z J,Man Z X. Secure bidirectional communication protocol without quantum channel [OL].e-print quantph/0403217.
[21] [21] Xue Peng,Guo Guangcan. Secure direct communication using the ‘olarization’ entangled atomic ensembles[J].J. Phys. B: At. Mol. Opt. Phys.,2004,37: 711-722.
[22] [22] Xue Peng,et al. Entanglement preparation and quantum communication with atoms in optical cavities [J].Phys. Rev. A,2004,69: 052318.
[24] [24] Wójcik A. Eavesdropping on the “Ping-pong” quantum communication protocol [J].Phys. Rev. Lett.,2003,90(15): 157901.
Get Citation
Copy Citation Text
LIU Yu, LIU Ren-fei, LI Ning, WANG Chang-qiang. Direct deterministic communication on quantum channel[J]. Chinese Journal of Quantum Electronics, 2006, 23(4): 441
Category:
Received: May. 12, 2005
Accepted: --
Published Online: Jun. 13, 2010
The Author Email: Yu LIU (liuyu@mail.hust.edu.cn)
CSTR:32186.14.