A quantum secure direct communication protocol based on six-qubit cluster state
To enhance the efficiency of eavesdropping detection in quantum secure direct communication, a quantum secure direct communication protocol based on six-qubit cluster state is proposed. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compa...
Saved in:
Published in | 2018 20th International Conference on Advanced Communication Technology (ICACT) pp. 1 - 2 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
Global IT Research Institute (GiRI)
01.02.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | To enhance the efficiency of eavesdropping detection in quantum secure direct communication, a quantum secure direct communication protocol based on six-qubit cluster state is proposed. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdropper obtains the same amount of information, she must face a larger detection probability in the presented scheme than the other two, and if obtains the whole information, the detection rate of the PingPong protocol is 50%; the second protocol which used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 94%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. |
---|---|
AbstractList | To enhance the efficiency of eavesdropping detection in quantum secure direct communication, a quantum secure direct communication protocol based on six-qubit cluster state is proposed. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdropper obtains the same amount of information, she must face a larger detection probability in the presented scheme than the other two, and if obtains the whole information, the detection rate of the PingPong protocol is 50%; the second protocol which used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 94%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. |
Author | Wan, Wei Wang, Shaojie Song, Danjie Zhao, Jing Long, Chun |
Author_xml | – sequence: 1 givenname: Danjie surname: Song fullname: Song, Danjie organization: Computer Network Information Center, Chinese Academy of Sciences, China – sequence: 2 givenname: Chun surname: Long fullname: Long, Chun organization: Computer Network Information Center, Chinese Academy of Sciences, China – sequence: 3 givenname: Wei surname: Wan fullname: Wan, Wei organization: Computer Network Information Center, Chinese Academy of Sciences, China – sequence: 4 givenname: Jing surname: Zhao fullname: Zhao, Jing organization: Computer Network Information Center, Chinese Academy of Sciences, China – sequence: 5 givenname: Shaojie surname: Wang fullname: Wang, Shaojie organization: Computer Network Information Center, Chinese Academy of Sciences, China |
BookMark | eNp9jrsOgjAYRmuigxeegKUvANIWQxkJ0ejk4k5K-U2a0BZ6SfTtZWB2-pJzzvAd0NZYAwilpMgpq0l9frRN-8ppQXjOGWUVvWxQUlc1IZyXlBek3KNng-coTIgae5DRAR6UAxmwtFpHo6QIyho8ORustCPuhYcBL8SrTzbHXi3lGH0Ah30QAU5o9xajh2TdI0pv11d7zxQAdJNTWrhvt95h_-0PdMI-cQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.23919/ICACT.2018.8323725 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9791188428014 9791188428007 |
EndPage | 2 |
ExternalDocumentID | 8323725 |
Genre | teaser-abstract |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-ieee_primary_83237253 |
IEDL.DBID | RIE |
IngestDate | Wed May 01 11:50:53 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-ieee_primary_83237253 |
ParticipantIDs | ieee_primary_8323725 |
PublicationCentury | 2000 |
PublicationDate | 2018-Feb. |
PublicationDateYYYYMMDD | 2018-02-01 |
PublicationDate_xml | – month: 02 year: 2018 text: 2018-Feb. |
PublicationDecade | 2010 |
PublicationTitle | 2018 20th International Conference on Advanced Communication Technology (ICACT) |
PublicationTitleAbbrev | ICACT |
PublicationYear | 2018 |
Publisher | Global IT Research Institute (GiRI) |
Publisher_xml | – name: Global IT Research Institute (GiRI) |
Score | 3.374625 |
Snippet | To enhance the efficiency of eavesdropping detection in quantum secure direct communication, a quantum secure direct communication protocol based on six-qubit... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Computer networks Computer security eavesdropping detection Network security Protocols Quantum computing quantum secure direct communication Research and development Security six-qubit cluster state |
Title | A quantum secure direct communication protocol based on six-qubit cluster state |
URI | https://ieeexplore.ieee.org/document/8323725 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEB3anjyptKJWJQeP7rabZL-OZbFUoeqhQm-lm51CUXet3YD4680ktX7Qg7ckDMmQCTwymfcCcCnCtK_iSHqy6M89yXnuJREq6kolwyRA-4vC-C4aPcrbaThtwNWWC4OItvgMfWrat_yiUppSZT1z-kTMwyY04zR1XC0nJMRFGqS9m2yQTahaK_E3lr--TLGIMdyH8ddarlDkydd17quPPzKM_3XmADrf3Dz2sEWdQ2hg2Yb7AVtps0f6ha0pgY7MQRVTP_kfjEQZKhN5RthVMDOyXr57K50vjeWzJs0EZhlGHegOryfZyCOHZq9OkWK28UUcQausSjwGpkSEMil4lPOFJE2vBVfK3CXmJmg8CcQJtHfNcLp7uAt7tK2uWvkMWvWbxnMDxnV-YaPwCRSykNU |
link.rule.ids | 310,311,783,787,792,793,799,27939,55088 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPOhJDRgVP3rw6Aa03diOZJEMZehhJtwW1pWEKJvImhj_evs6xI9w8NY2TfvyXpNfP97vV4Br5vgd0XO5xbPO1OKUppbnSoFVLrjjdaX5RSEau-ETv5s4kxrcbLgwUkqTfCZtLJq3_KwQCq_K2nr1sR51dmDXwX1FxdaqpIQo87t-exj0gxjztTx73ffXpykGMwYHEH3NVqWKPNuqTG3x8UeI8b_mHELzm51HHje4cwQ1mTfgoU-WSntJLcgKr9AlqcCKiJ8MEIKyDIWOPUH0yohuWc3fraVK57rni0LVBGI4Rk1oDW7jILTQoOS10qRI1rawY6jnRS5PgAjmSu5l1E3pjKOq14wKoU8TUx026nXZKTS2jXC2vfkK9sI4GiWj4fi-Bfvo4ip3-Rzq5ZuSFxqay_TSROQT1l6UIg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+20th+International+Conference+on+Advanced+Communication+Technology+%28ICACT%29&rft.atitle=A+quantum+secure+direct+communication+protocol+based+on+six-qubit+cluster+state&rft.au=Song%2C+Danjie&rft.au=Long%2C+Chun&rft.au=Wan%2C+Wei&rft.au=Zhao%2C+Jing&rft.date=2018-02-01&rft.pub=Global+IT+Research+Institute+%28GiRI%29&rft.spage=1&rft.epage=2&rft_id=info:doi/10.23919%2FICACT.2018.8323725&rft.externalDocID=8323725 |