|Table of Contents|

[1] Liu Wenjie, Chen Hanwu, Xu Juan, et al. Revised quantum direct communication schemewith mutual authentication [J]. Journal of Southeast University (English Edition), 2010, 26 (4): 532-536. [doi:10.3969/j.issn.1003-7985.2010.04.006]
Copy

Revised quantum direct communication schemewith mutual authentication()
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
26
Issue:
2010 4
Page:
532-536
Research Field:
Information and Communication Engineering
Publishing date:
2010-12-30

Info

Title:
Revised quantum direct communication schemewith mutual authentication
Author(s):
Liu Wenjie1 2 Chen Hanwu1 Xu Juan1 Liu Zhihao1
1School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
2 School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
Keywords:
quantum direct communication mutual authentica-tion decoy-photon checking impersonation attack special Trent’s attack
PACS:
TN918.1
DOI:
10.3969/j.issn.1003-7985.2010.04.006
Abstract:
Based on mutual authentication and dense coding, a novel revised efficient quantum direct communication scheme is proposed. It is composed of two phases: the quantum state distribution process and the direct communication process. The purpose of the former is to authenticate Trent and users to each other, and let the two legitimate users(Alice and Bob)safely share the Bell states. While the latter aims to make direct communication to transmit a secret message between Alice and Bob. In order to prevent from Eve’s eavesdropping as well as to authenticate each other simultaneously, a decoy photon checking technique is applied. Compared with other analogous protocols, the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient; i.e., the total efficiency is almost 100%. Security analysis shows that the proposed scheme is secure against the eavesdropping attacks, the impersonation attacks, and some special Trent’s attacks, including the attacks by using different initial states.

References:

[1] Beige A, Englert B G, Kurtsiefer C, et al. Secure communication with single-photon two-qubit states [J]. J Phys A: Math Gen, 2002, 35(28): 407-413.
[2] Boström K, Felbinger T. Deterministic secure direct communication using entanglement [J]. Phys Rev Lett, 2002, 89(18): 187902.
[3] Deng F G, Long G L, Liu X S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block [J]. Phys Rev A, 2003, 68(4): 042317.
[4] Deng F G, Long G L. Secure direct communication with a quantum one-time pad [J]. Phys Rev A, 2004, 69(5): 052319.
[5] Wang C, Deng F G, Long G L. Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state [J]. Opt Commun, 2005, 253(1): 15-20.
[6] Lu X, Ma Z, Feng D G. Quantum secure direct communication using quantum Calderbank-Shor-Steane error correcting codes [J]. Journal of Software, 2006, 17(3): 509-515.(in Chinese)
[7] Lee H, Lim J, Yang H. Quantum direct communication with authentication [J]. Phys Rev A, 2006, 73(4): 042305.
[8] Zhang Z J, Liu J, Wang D, et al. Comment on “quantum direct communication with authentication” [J]. Phys Rev A, 2007, 75(4): 026301.
[9] Liu W J, Chen H W, Li Z Q, et al. Efficient quantum secure direct communication with authentication [J]. Chin Phys Lett, 2008, 25(7): 2354-2357.
[10] Qin S J, Wen Q Y, Meng L M, et al. High efficiency of two efficient QSDC with authentication is at the cost of their security [J]. Chin Phys Lett, 2009, 26(2): 020312.
[11] Yen C A, Horng S J, Goan H S, et al. Quantum direct communication with mutual authentication [J]. Quantum Information and Computation, 2009, 9(5): 0376-0394.
[12] Bennett C H, Brassard G. Quantum cryptography: public-key distribution and tossing [C]//Proc of IEEE International Conference on Computers, Systems and Signal Processing. Bangalore, India, 1984: 175-179.
[13] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999, 283(5410): 2050-2056.
[14] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Phys Rev Lett, 2000, 85(2):441-444.
[15] Li X H, Deng F G, Li C Y, et al. Deterministic secure quantum communication without maximally entangled states [J]. J Kerean Phys Soc, 2006, 49(4): 1354-1360.

Memo

Memo:
Biographies: Liu Wenjie(1979—), male, doctor, lecturer, wenjiel@163.com; Chen Hanwu(corresponding author), male, doctor, professor, hw_chen@seu.edu.cn.
Foundation items: The National Natural Science Foundation of China(No.60873101), the Natural Science Foundation of Jiangsu Province(No.BK2008209), the Research Foundation of Nanjing University of Information Science and Technology(No.20080298).
Citation: Liu Wenjie, Chen Hanwu, Xu Juan, et al. Revised quantum direct communication scheme with mutual authentication[J].Journal of Southeast University(English Edition), 2010, 26(4):532-536.
Last Update: 2010-12-20