A quantum secure direct communication protocol based on six-qubit cluster state

To enhance the efficiency of eavesdropping detection in quantum secure direct communication, a quantum secure direct communication protocol based on six-qubit cluster state is proposed. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compa...

Full description

Saved in:
Bibliographic Details
Published in2018 20th International Conference on Advanced Communication Technology (ICACT) pp. 1 - 2
Main Authors Song, Danjie, Long, Chun, Wan, Wei, Zhao, Jing, Wang, Shaojie
Format Conference Proceeding
LanguageEnglish
Published Global IT Research Institute (GiRI) 01.02.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract To enhance the efficiency of eavesdropping detection in quantum secure direct communication, a quantum secure direct communication protocol based on six-qubit cluster state is proposed. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdropper obtains the same amount of information, she must face a larger detection probability in the presented scheme than the other two, and if obtains the whole information, the detection rate of the PingPong protocol is 50%; the second protocol which used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 94%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
AbstractList To enhance the efficiency of eavesdropping detection in quantum secure direct communication, a quantum secure direct communication protocol based on six-qubit cluster state is proposed. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdropper obtains the same amount of information, she must face a larger detection probability in the presented scheme than the other two, and if obtains the whole information, the detection rate of the PingPong protocol is 50%; the second protocol which used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 94%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
Author Wan, Wei
Wang, Shaojie
Song, Danjie
Zhao, Jing
Long, Chun
Author_xml – sequence: 1
  givenname: Danjie
  surname: Song
  fullname: Song, Danjie
  organization: Computer Network Information Center, Chinese Academy of Sciences, China
– sequence: 2
  givenname: Chun
  surname: Long
  fullname: Long, Chun
  organization: Computer Network Information Center, Chinese Academy of Sciences, China
– sequence: 3
  givenname: Wei
  surname: Wan
  fullname: Wan, Wei
  organization: Computer Network Information Center, Chinese Academy of Sciences, China
– sequence: 4
  givenname: Jing
  surname: Zhao
  fullname: Zhao, Jing
  organization: Computer Network Information Center, Chinese Academy of Sciences, China
– sequence: 5
  givenname: Shaojie
  surname: Wang
  fullname: Wang, Shaojie
  organization: Computer Network Information Center, Chinese Academy of Sciences, China
BookMark eNp9jrsOgjAYRmuigxeegKUvANIWQxkJ0ejk4k5K-U2a0BZ6SfTtZWB2-pJzzvAd0NZYAwilpMgpq0l9frRN-8ppQXjOGWUVvWxQUlc1IZyXlBek3KNng-coTIgae5DRAR6UAxmwtFpHo6QIyho8ORustCPuhYcBL8SrTzbHXi3lGH0Ah30QAU5o9xajh2TdI0pv11d7zxQAdJNTWrhvt95h_-0PdMI-cQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.23919/ICACT.2018.8323725
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9791188428014
9791188428007
EndPage 2
ExternalDocumentID 8323725
Genre teaser-abstract
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-ieee_primary_83237253
IEDL.DBID RIE
IngestDate Wed May 01 11:50:53 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-ieee_primary_83237253
ParticipantIDs ieee_primary_8323725
PublicationCentury 2000
PublicationDate 2018-Feb.
PublicationDateYYYYMMDD 2018-02-01
PublicationDate_xml – month: 02
  year: 2018
  text: 2018-Feb.
PublicationDecade 2010
PublicationTitle 2018 20th International Conference on Advanced Communication Technology (ICACT)
PublicationTitleAbbrev ICACT
PublicationYear 2018
Publisher Global IT Research Institute (GiRI)
Publisher_xml – name: Global IT Research Institute (GiRI)
Score 3.374625
Snippet To enhance the efficiency of eavesdropping detection in quantum secure direct communication, a quantum secure direct communication protocol based on six-qubit...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Computer networks
Computer security
eavesdropping detection
Network security
Protocols
Quantum computing
quantum secure direct communication
Research and development
Security
six-qubit cluster state
Title A quantum secure direct communication protocol based on six-qubit cluster state
URI https://ieeexplore.ieee.org/document/8323725
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEB3anjyptKJWJQeP7rabZL-OZbFUoeqhQm-lm51CUXet3YD4680ktX7Qg7ckDMmQCTwymfcCcCnCtK_iSHqy6M89yXnuJREq6kolwyRA-4vC-C4aPcrbaThtwNWWC4OItvgMfWrat_yiUppSZT1z-kTMwyY04zR1XC0nJMRFGqS9m2yQTahaK_E3lr--TLGIMdyH8ddarlDkydd17quPPzKM_3XmADrf3Dz2sEWdQ2hg2Yb7AVtps0f6ha0pgY7MQRVTP_kfjEQZKhN5RthVMDOyXr57K50vjeWzJs0EZhlGHegOryfZyCOHZq9OkWK28UUcQausSjwGpkSEMil4lPOFJE2vBVfK3CXmJmg8CcQJtHfNcLp7uAt7tK2uWvkMWvWbxnMDxnV-YaPwCRSykNU
link.rule.ids 310,311,783,787,792,793,799,27939,55088
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPOhJDRgVP3rw6Aa03diOZJEMZehhJtwW1pWEKJvImhj_evs6xI9w8NY2TfvyXpNfP97vV4Br5vgd0XO5xbPO1OKUppbnSoFVLrjjdaX5RSEau-ETv5s4kxrcbLgwUkqTfCZtLJq3_KwQCq_K2nr1sR51dmDXwX1FxdaqpIQo87t-exj0gxjztTx73ffXpykGMwYHEH3NVqWKPNuqTG3x8UeI8b_mHELzm51HHje4cwQ1mTfgoU-WSntJLcgKr9AlqcCKiJ8MEIKyDIWOPUH0yohuWc3fraVK57rni0LVBGI4Rk1oDW7jILTQoOS10qRI1rawY6jnRS5PgAjmSu5l1E3pjKOq14wKoU8TUx026nXZKTS2jXC2vfkK9sI4GiWj4fi-Bfvo4ip3-Rzq5ZuSFxqay_TSROQT1l6UIg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+20th+International+Conference+on+Advanced+Communication+Technology+%28ICACT%29&rft.atitle=A+quantum+secure+direct+communication+protocol+based+on+six-qubit+cluster+state&rft.au=Song%2C+Danjie&rft.au=Long%2C+Chun&rft.au=Wan%2C+Wei&rft.au=Zhao%2C+Jing&rft.date=2018-02-01&rft.pub=Global+IT+Research+Institute+%28GiRI%29&rft.spage=1&rft.epage=2&rft_id=info:doi/10.23919%2FICACT.2018.8323725&rft.externalDocID=8323725