Controlled quantum dialogue with authentication protocol on a basis of GHZ-like state
- PDF / 663,509 Bytes
- 13 Pages / 439.37 x 666.142 pts Page_size
- 36 Downloads / 174 Views
Controlled quantum dialogue with authentication protocol on a basis of GHZ-like state Xiao-yi Zheng1
· Chang Kuang1 · Wen-zhen Liang1
Received: 9 September 2019 / Accepted: 4 July 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract A controlled quantum dialogue with authentication protocol on a basis of GHZ-like state was proposed in this paper. To start with, three participants of the communication protocol generated a corresponding identity ID through quantum key distribution and it was kept secret. Controller Trent prepared the three-particle Greenberger–Home– Zeilinger-like (GHZ-like) state and shared with other two communication users Alice and Bob. Communication participants use the entangled particles in their respective hands which satisfy the nature of the classical XOR relationship for encryption, controlling and decryption of quantum messages and to verify the identities of communication users. Meanwhile, security of communication was assured by introducing decoy photons. According to analysis results, the proposed protocol can effectively not only prevent any form of eavesdropping behavior from external and internal eavesdroppers including the controller Trent, but also detect such activities. Finally, this protocol is proved to have high communication efficiency. Keywords GHZ-like state · Controlled quantum dialogue with authentication · XOR operation · Unitary operation
1 Introduction Recently, quantum secure direct communication (QSDC) has become a very important branch of quantum communication for two significant advantages, namely on-site detection eve (ODE) [1] and obliteration of information leakage before eve detection (OILBED) [2]. Many QSDC protocols which have practical application significance have been proposed by using entanglement resources, such as Bell state, GHZ state and cluster state [3–10]. In 2005, Lee et al. proposed two QSDC protocols [3] with
B 1
Xiao-yi Zheng [email protected] Automation Engineering, Guangdong Polytechnic College of Water Resource and Electric Engineering, Guangzhou 510635, China 0123456789().: V,-vol
123
251
Page 2 of 13
X. Zheng et al.
authentication for the first time on a basis of GHZ state. In 2007, Yan and Wen proposed a QSDCA protocol [4] based on EPR pairs and quantum dense coding. In 2012, Sun et al. proposed a QSDC protocol on a basis of four-particle cluster state [5]. In the same year, Li et al. proposed a QSDC protocol based on five-particle cluster state and classical XOR operation [6]. In this protocol, the five-particle cluster state was used to detect eavesdroppers, and the classical XOR operation is used as quantum one-time pad (OTP) to ensure security of the protocol. In 2013, Chang et al. proposed a bidirectional quantum secure direct communication and authentication protocol [7] based on the five-particle cluster state. In 2014, Chang et al. proposed a CQSDCA protocol [8] based on the five-particle cluster state and the quantum OTP. In 2015, Tao proposed a CQSDC protocol based on the expanded three-
Data Loading...