Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2015 Nov 18;5:16080. doi: 10.1038/srep16080

A generalized architecture of quantum secure direct communication for N disjointed users with authentication

Ahmed Farouk 1,2,a, Magdy Zakaria 2, Adel Megahed 3, Fatma A Omara 4
PMCID: PMC4649760  PMID: 26577473

Abstract

In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.


The pioneering work of Bennett and Brassard1 has been developed for the purpose of understanding quantum cryptography which is one of the most significant aspects of the laws of the quantum mechanics. This cryptography guarantees unconditional security2,3,4,5 that is proven through the no-cloning theorem6 as the transmitted quantum bit cannot be replicated or copied but its state can be teleported. Quantum teleportation and dense coding are the most often used quantum principles. In the former, the quantum information can be transmitted based on both classical communication and the maximally shared quantum entanglement among the distant parties7,8,9,10. In the latter, the classical information can be encoded and transmitted based on one quantum bit and on the maximally shared quantum entanglement among the distant parties as each quantum bit can transmit two classical bits11,12. A number of approaches and prototypes can be used to exploit quantum principles in order to secure communication between two parties and multiple parties13,14,15,16,17. While these approaches use different techniques to ensure private communication among authorized users, most of them still depend on the generation of secret random keys18,19.

A quantum secret communication concept has recently been introduced; it is a kind of quantum communication in which secret messages can be transmitted through a quantum channel with or without additional classical communications20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58. A quantum secure direct communication (QSDC) transmits the secret messages directly between the communicating parties, from sender to receiver, without additional classical communication protocols, except for those used for the necessary eavesdropping check. In other words, the quantum key distribution (QKD) process and the classical communication of ciphertext are reduced into one single quantum communication procedure in QSDC. In QSDC, the concept of direct transmission of secret messages involves two kinds of meaning: On one hand, secret messages rather than raw keys are transmitted; on the other hand, the receiver does not require any separate classical communication from the sender to decode out secret messages26,31,32,39,40,41,42,43,44,45,46,47,48,49,50,51,52,57,59. In 2002, Long and Liu52 put forward the first QSDC protocol, in which the secret message is transmitted directly. In the same year, by taking advantage of Einstein-Podolsky-Rosen (EPR) pairs as quantum information carriers, Boström and Felbinger20 put forward the famous QSDC protocol referred to as the ping - pong protocol later. In60, the authors enhanced the capability of the ping - pong protocol by adding two more unitary operations. In22, a two-step quantum secure direct communication protocol was proposed for transferring quantum information by utilizing Einstein-Podolsky-Rosen (EPR) pair blocks to secure the transmission. In21, the authentication and communication process was performed using Greenberg–Horne–Zeilinger (GHZ) states. First, the GHZ states were used for authentication purposes; the remaining GHZ states were used to transmit the secret message directly. In17, the architecture for a centralized multicast scheme was proposed basing on a hybrid model of quantum key distribution and classical symmetric encryption. The proposed scheme solved the key generation and the management problem using a single entity called centralized Quantum Multicast Key Distribution Centre. In61, a novel multiparty concurrent quantum secure direct communication protocol based on GHZ states and dense coding is introduced. In59, a managed quantum secure direct communication protocol based on quantum encoding and incompletely entangled states is presented. In57, a scheme for quantum secure direct dialogue protocols, which is adapted to both collective-dephasing noise and collective-rotation noise, is proposed by using the logical Bell states as the traveling states to resist collective noise. Different from QSDC, there is another kind of quantum secret communication named deterministic secure quantum communication (DSQC), where the receiver needs a separate classical communication from the sender to help decode out secret messages. In the framework of DSQC, the receiver can read out the secret message only after the transmission of at least one bit of additional classical information for each quantum bit, different from QSDC in which the secret message can be read out directly without exchanging any classical information20,23,24,26,29,36,38,53,55,56,58. In53, a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel is proposed as a four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In 2002, Beige et al.54 first proposed a DSQC scheme based on single-photon two-quantum bit states. Then in 2004, Yan and Zhang24 proposed a DSQC scheme based on EPR pairs and quantum teleportation. In 2005, Gao et al.55 and Man et al.26 proposed two DSQC protocols also based on entanglement swapping. In 2006, with EPR pairs based on the secret transmitting order of particles, Zhu et al.20 proposed two DSQC schemes, one is a round trip scheme, and the other is a one way trip scheme. Lee et al.29 proposed a protocol for controlled DSQC with Greenberger-Horne-Zeilinger (GHZ) states. In 2009, Xiu et al.56 proposed a controlled DSQC scheme using five qubit entangled states and two-step security test. In58, a hyper entangled Bell state is used to design faithful deterministic secure quantum communication and authentication protocol over collective-rotation and collective-dephasing noisy channel, which doubles the channel capacity compared with using an ordinary Bell state as a carrier; a logical hyper entangled Bell state immune to collective-rotation and collective-dephasing noise is constructed. Different quantum authentication approaches have been developed for preventing various types of attacks and especially man-in-the-middle attack62,63,64,65,66.

However, these quantum secure direct communication approaches are still prone to provide a low degree of effectiveness and an inadequate level of security. Here, we propose a convenient and efficient scheme for transmitting a series of classical messages among two, three, or more users (generalized to N users). Therefore, Inline graphic disjointed users Inline graphic can transmit a secret message consisting of classical bits to a remote user Inline graphic. The transmission process is accomplished by utilizing the property of dense coding and Pauli unitary transformations. First, the quantum server authenticates and verifies the identities of the communicated disjointed users through the generated entangled shared key and the Controlled – NOT gate. After the authentication is completed successfully, the remaining generated entangled shared key is used to generate shared GHZ states, which are intended for directly transmitting the secret message. If there is a quantum channel among the users, they can communicate using our partial cooperation process. In that case, Inline graphic disjointed users generate a random sequence of bit strings of the transmitted plain message. Next, each user applies an appropriate unitary transformation according to his plain message bit string value and transmits the transformed message to Inline graphic. Then, Inline graphic retrieves the original sent secret message by applying the NGHZ measurement to his/her particle and Inline graphic particles. Afterwards, the quantum server calculates the status of his or her particle according to x basis and announces his or her measurement results. Then, Inline graphic uses those measurements and the quantum server publication to retrieve the original sent secret bits by Inline graphic. If there is no quantum channel among the users, they can use our full cooperation process, but in this case the transformed message will be sent to the quantum server instead of Inline graphic.

The efficiency and effectiveness of our protocol can be summarized into five points. First, the GHZ state is the maximally entangled state, so that the correlation can be more easily destroyed once any single N particle is attacking. Second, using the NGHZ particle makes eavesdropping detection more effective and secure in comparison to some of the other QSDC protocols. For example22, proposed a two-step quantum secure direct communication where an EPR pair block is used to transfer the secret message. Furthermore34, proposed a multi-step quantum secure direct communication protocol where blocks of a multi-particle maximally entangled states are used to transmit secret messages. These protocols fail because the eavesdropper can capture some of the particles in the sequence and transmit what is left to the receiver through the quantum channel. If the eavesdropper intercepts the message sequence and conducts a GHZ measurement, he/she can retrieve some of the secret message. Therefore, the probability of information leakage exists. Third, our protocol increases the transmitted information capacity by using N - GHZ states as these provide a large Hilbert space. Fourth, Inline graphic users can transmit a particular message to the receiver, Inline graphic, so the protocol is more effective as no quantum bits have to be discarded. Furthermore, the protocol is instantaneous as the receiver, Inline graphic is able to decode the message while receiving it and there is no additional classical exchange between Inline graphic (sender) users and Inline graphic (receiver). Finally, the security analysis of the authentication and communication processes of our protocol against many types of attacks proves that our protocol is unconditionally secured and the attacker will not reveal any information about the key or the transmitted message in the case of directly calculating the transferred particles over the communicated channel from the quantum server to the disjoint user, and vice versa, as the attacker introduces an error probability irrespective of the sequence of measurement.

Methods

Bell States and ControlledNOT

The Bell states are one of the main theories of quantum information processing that denote entanglement67,68. Bell states are specific, highly entangled quantum states of two particles denoted by EPR. There are many research groups that proposed different approaches for realizing and experimentally generating EPR states. In69 a high-intensity source of polarization-entangled photon pairs can be realized with high momentum definition. The proposed scheme allowed ready preparation of all four of EPR-Bell states with two-photon fringe visibilities in excess of 97%. In70 EPR can be experimentally setup by utilizing light pulse from a mode-locked Ti-sapphire laser through a frequency doubler. The ultraviolet pulse from the doubler is split into two beams by a balanced beam-splitter and is focused on four pairs of BBO crystals to provide four EPR photon pairs. In our scheme, EPR pair can be realized by utilizing the same concept introduced in70.

These entangled particles have interrelated physical characteristics despite being spatially separated. When the quantum state is a multi-qubit, transformation can be achieved by applying the controlled quantum gates CNOT (Controlled – NOT), FREDKIN (Controlled – SWAP), and TOFFOLI (Controlled – Controlled – NOT). CNOT has an input of two qubits. It transforms the computational basis states by flipping the state of the second qubit only when the first qubit has a measurement of 1; otherwise, the quantum state remains unchanged2,3,5,7,11. The four Bell states (EPR pairs) used in both the authentication and communication processes in our scheme are defined by (Eq. (1). Authentication between the quantum server and users is achieved by the generated entangled shared key Inline graphic and the Inline graphic gate. At the time of registration, the quantum server and disjoint user share a binary authentication key, AK. Each sends one entangled particle to form an EPR pair, Inline graphic, in which the q and u particles correspond with the quantum server and disjoint user, respectively. The quantum server preserves q at its location and transmits the u particle to the intended disjoint user, as shown in (Eq. (2). Once the disjoint user obtains its u particle, it prepares a new state particle, n (See (Eq. 3), by encoding the shared authentication information according to the specified operation. When the quantum CNOT gate Inline graphicOP is performed on the transmitted particle and n, the resulted particle r is a state of three entanglement particles (See Eq. 4). After applying the requested operation, the disjoint user keeps particle u at its side and sends the resulted particle Inline graphic to the quantum server. Once the quantum server receives the resulted particle, Inline graphic, it decodes it by applying a quantum CNOT gate Inline graphicOP on both the local particle q and n (See Eq. 6, 7). The quantum server verifies the identity of the disjoint user by measuring Inline graphic on the basis of Z. The resulted state must measure at either 0 or 1. If the measurement is equal to Inline graphic, the disjoint user is authenticated. However, if the resulted measurement is erroneous—meaning it is greater than the agreed threshold—then the authentication process will be terminated. Afterwards, the key is increased to authenticate the next disjoint user, sending the quantum server recursively back to step one until all disjoint users are authenticated.

graphic file with name srep16080-m23.jpg
graphic file with name srep16080-m24.jpg
graphic file with name srep16080-m25.jpg

where Inline graphic and ⊗ denotes the specified user operation.

graphic file with name srep16080-m27.jpg

where Inline graphicOP = Inline graphic0 at Inline graphic and Inline graphicOP = Inline graphic1 at Inline graphic. Inline graphic0 and Inline graphic1 are described by (Eq. (5))

graphic file with name srep16080-m30.jpg

where Inline graphic

graphic file with name srep16080-m32.jpg
graphic file with name srep16080-m33.jpg

Quantum Bit Transformation

Quantum computers can manipulate quantum information to transform a pure or mixed quantum state into another corresponding pure or mixed state2,3,5,7,11. In our scheme, the unitary transformation operations are defined by (Eq. (8)). For simplicity, we use X, Y, Z instead of Inline graphic, respectively. These are used to transform the GHZ state at the side of the sender(s) into an unreadable form that corresponds to the generated original classical message before transmitting it to the receiver.

graphic file with name srep16080-m35.jpg

Tables 1, 2, 3, 4 describe the correlation between the received classical value and its corresponding unitary and GHZ transformations. Tables 1 and 2 illustrate the correlation that occurs during the communication process between two disjoint users (Inline graphic, Inline graphic) with partial and full cooperation of the quantum server, respectively. The Inline graphic generates a sequence of random bit strings of transmitted, plain message. According to each two transmitted bits, (00, 01, 10, 11), the disjoint user, Inline graphic, applies one of the unitary transformation operations, Ŭ = {Ŭ1, Ŭ2, Ŭ3, Ŭ4}, which correspond to the four Pauli operations, {I, X, Y, Z}, respectively. Afterwards, the GHZ states convert according to the transmitted bits and the Inline graphic transformation (See Supplementary Information 1) for the communication process between two disjointed users with partial and full cooperation of the quantum server).

Table 1. Correlation between Received Classical Value and its Corresponding Unitary, GHZ Transformations and Quantum Bit Transformation Correlation during the Communication Process between Two Disjoint Users with Partial Cooperation of Quantum Server.

Value First Bit Second Bit ui Transformation GHZ Transformation
0 0 0 Inline graphic Inline graphic
1 0 1 Inline graphic Inline graphic
2 1 0 Inline graphic Inline graphic
3 1 1 Inline graphic Inline graphic

Table 2. Correlation between Received Classical Value and its Corresponding Unitary, GHZ Transformations and Quantum Bit Transformation Correlation during the Communication Process between Two Disjoint Users with Full Cooperation of Quantum Server.

Value First Bit Second Bit ui Transformation GHZ Transformation
0 0 0 Inline graphic Inline graphic
1 0 1 Inline graphic Inline graphic
2 1 0 Inline graphic Inline graphic
3 1 1 Inline graphic Inline graphic

Table 3. Correlation between Received Classical Value and its Corresponding Unitary, GHZ Transformations and Quantum Bit Transformation Correlation during the Communication Process among Three Disjoint Users with Partial Cooperation of Quantum Server.

Value ui Bits uj Bit ui and uj Transformations GHZ Transformation
0 0 0 0 Inline graphic Inline graphic
1 0 0 1 Inline graphic Inline graphic
2 0 1 0 Inline graphic Inline graphic
3 0 1 1 Inline graphic Inline graphic
4 1 0 0 Inline graphic Inline graphic
5 1 0 1 Inline graphic Inline graphic
6 1 1 0 Inline graphic Inline graphic
7 1 1 1 Inline graphic Inline graphic

Table 4. Correlation between Received Classical Value and its Corresponding Unitary, GHZ Transformations and Quantum Bit Transformation Correlation during the Communication Process among Three Disjoint Users with Full Cooperation of Quantum Server.

Value ui Bits uj Bit ui and uj Transformations GHZ Transformation
0 0 0 0 Inline graphic Inline graphic
1 0 0 1 Inline graphic Inline graphic
2 0 1 0 Inline graphic Inline graphic
3 0 1 1 Inline graphic Inline graphic
4 1 0 0 Inline graphic Inline graphic
5 1 0 1 Inline graphic Inline graphic
6 1 1 0 Inline graphic Inline graphic
7 1 1 1 Inline graphic Inline graphic

Tables 3 and 4 describe the same correlation but among three disjointed users (Inline graphic, Inline graphic and Inline graphic) with partial and full cooperation of quantum server respectively. The difference that a new user Inline graphic generates a random sequences bits string of transmitted plain message. Inline graphic applies Inline graphic or Inline graphic according to the value of particle 0 or 1 respectively. Afterwards, the GHZ states will be converted according to transmitted bits, Inline graphic and Inline graphic transformations (see Supplementary Information 2 for Communication Process between Three Disjoint Users with Partial and Full Cooperation of Quantum Server).

GHZ States, Measurement and Source

A GHZ state is a certain type of maximally entangled quantum state that includes at least three qubits (particles). This kind of state was first examined by Greenberger, Horne, and Zeilinger in 198971. The standard GHZ state is defined as qubits = 3; when qubits > 3, the GHZ state is defined by Eq. (9) seen below:

graphic file with name srep16080-m50.jpg

In our scheme, when the quantum server receives a user(s) request for communication with another user, the quantum server distributes GHZ entanglement states among the involved participants’ users in the communication process. Distribution is established after successful completion of the authentication process prior to the commencement of the communication process. The quantum server distributes all generated particles but holds one for itself. As a consequence, the quantum server and the participated users become entangled due to the presence of only one particle per distributed GHZ state. In addition, GHZ measurement is used by the receiver or quantum server, depending on the type of cooperation used during inter-user communication. Consistent with the GHZ measurement result, the receiver determines which unitary operations are used by the senders to transform the GHZ state according to the original generated classical message before it is transmitted to the receiver. By obtaining the applied unitary operations, the receiver can retrieve the original sent message. The Eight GHZ States are defined by (Eq. (10)).

graphic file with name srep16080-m51.jpg

There’re many research groups proposed different approaches for realizing and experimentally generating multi-photon GHZ states. In72, an experimental entanglement of six-photon GHZ states, cluster states, and graph states is proposed. The generating of six-photon GHZ states and cluster states is achieved by EPR-entangled photon pairs. In73 an effective protocol for preparation of N – photon GHZ states with conventional photon detectors and can be realized through a simpler optical setup with a high success probabilities. In74 a proposed a linear optical protocol to generate GHZ states of N distant photons with certain success probabilities. The proposed set up involved simple linear optical elements N pairs of the two-photon polarization entangled states, and the conventional photon detectors. In75 an Experimental demonstration of five-photon entanglement and open-destination teleportation is proposed by utilizing two entangled photon pairs to generate a four-photon entangled state, which is then combined with a single-photon state. In76 N – particle GHZ states can be generated easily using the N encoders preparation with cross-Kerr nonlinearities and can be realized simply through linear optical elements and homodyne detectors. In70 Experimental generation of an eight-photon GHZ state is proposed. An eight-photon GHZ state with a measured fidelity of 0.59 ± 0.02 proved the presence of genuine eight-partite entanglement. This is achieved by improving the photon detection efficiency to 25% with a 300-mW laser pump. In our scheme, we use the same concept introduced in70,72 to generate shared GHZ states. In order to develop the realization of N – particle GHZ states, the photon detection efficiency has to be improved basing on laser pump. Furthermore, a large capacity of memory for all parties to store and retrieve the required information has to take into consideration.

After a successful completion of the authentication process between the quantum server and a specified user, the remaining EPR is used to generate shared GHZ states to transmit the secret message among communicated users directly. Figure 1 demonstrates how the GHZ states among Inline graphic, the quantum server, and Inline graphic are generated according to the remaining EPR. Suppose, for example, the generated EPR for the authentication process between the quantum server and Inline graphic is given by (Eq. (11)). The quantum server particle is a part of another generated EPR for the purpose of authenticating Inline graphic (See Eq. 12). The result will then be a shared GHZ state among Inline graphic, the quantum server, and Inline graphic (See Eq. 13). Similarly, Inline graphic, Inline graphic and so on can be generated.

graphic file with name srep16080-m60.jpg
graphic file with name srep16080-m61.jpg
graphic file with name srep16080-m62.jpg

Figure 1. Generation of GHZ States based on Einstein Podolsky-Rosen (EPR) “drawn by A.F”.

Figure 1

Tables 5, 6, 7, 8 show the correlation between the quantum server publication, receiver measurement, sender operation(s), and sent bits. (Table 5) describes the correlation between the quantum server publication, Inline graphic measurement, Inline graphic operation, and sent bits during a partial cooperation process between two disjoint users. The Inline graphic performs a Bell measurement on its particle and the Inline graphic particle; the quantum server then calculates the status of its particle according to the x basis {+, −} and announces the measurement results. The Inline graphic uses its measurements and the quantum server publications to retrieve the original secret bits sent by Inline graphic. For example, when the Inline graphic measurement is equivalent to Inline graphic and the quantum server publication is Inline graphic, the Inline graphic concludes that the Inline graphic applied an X operation and the sent bits were 01 (See Supplementary Table S1) for the correlation during a full cooperation process between two disjoint users). Table 6 describes the same correlation of a partial process, but among three disjoint users. Here, Inline graphic performs a GHZ measurement on its particle, Inline graphic particles, and Inline graphic particles. The quantum server calculates the status of its particle according to the x basis {+, −} and announces the measurement results. Then, Inline graphic uses its measurement and the quantum server publications to retrieve the original secret bits sent by both Inline graphic and Inline graphic. For example, when the Inline graphic measurement is equivalent to Inline graphic and the quantum server publication is Inline graphic, Inline graphic can conclude that Inline graphic and Inline graphic applied Y and X operations, respectively, and the sent bits were 101 (See Supplementary Table S4) for correlation during a full cooperation process between three disjoint users). Tables 7 and 8 illustrate the transmission of messages 100111 from Inline graphic to Inline graphic with partial and full support of the quantum server, respectively.

Table 5. Correlation between Quantum Server Publication, Receiver Measurement, Sender (s) Operation(s) and Sent Bits during partial cooperation process between Two Disjoint Users.

Quantum ServerPublication ujMeasurement uiOperation Sent Bits
Inline graphic Inline graphic I 00
Inline graphic Inline graphic X 01
Inline graphic Inline graphic Y 10
Inline graphic Inline graphic Z 11
Inline graphic Inline graphic I 00
Inline graphic Inline graphic X 01
Inline graphic Inline graphic Y 10
Inline graphic Inline graphic Z 11

(C, D) shows an illustrative example for transmitting a message 100111 from ui to uj with partial and full support of quantum server respectively.

Table 6. Correlation between Quantum Server Publication, Receiver Measurement, Sender (s) Operation(s) and Sent Bits during partial cooperation process among Three Disjoint Users.

Quantum ServerPublication ui Measurement ui Operation SentBits ui Operation SentBits Message Sent
Inline graphic Inline graphic I 00 I 0 000
Inline graphic Inline graphic I 00 X 1 001
Inline graphic Inline graphic X 01 I 0 010
Inline graphic Inline graphic X 01 X 1 011
Inline graphic Inline graphic Y 10 I 0 100
Inline graphic Inline graphic Y 10 X 1 101
Inline graphic Inline graphic Z 11 I 0 110
Inline graphic Inline graphic Z 11 X 1 111
Inline graphic Inline graphic I 00 I 0 000
Inline graphic Inline graphic I 00 X 1 001
Inline graphic Inline graphic X 01 I 0 010
Inline graphic Inline graphic X 01 X 1 011
Inline graphic Inline graphic Y 10 I 0 100
Inline graphic Inline graphic Y 10 X 1 101
Inline graphic Inline graphic Z 11 I 0 110
Inline graphic Inline graphic Z 11 X 1 111

Table 7. An illustrative example for transmitting a message 100111 from u i to u j with partial support of quantum server.

ui Plain Message 10 01 11
ui Operation Y X Z
GHZ Transformation Inline graphic Inline graphic Inline graphic
uj Bell Measurement Inline graphic Inline graphic Inline graphic
Quantum Server Publication + +
uj Retrieved Message 10 01 11

Table 8. An illustrative example for transmitting a message 100111 from u i to u j with full support of quantum server.

ui Plain Message 10 01 11
ui Operation Y X Z
GHZ Transformation Inline graphic Inline graphic Inline graphic
Quantum Server Bell Measurement Inline graphic Inline graphic Inline graphic
uj Publication + +
uj Retrieved Message 10 01 11

Results and Discussion

Masquerade as Dishonest Disjoint User Security Analysis

If an attacker would like to masquerade as dishonest disjoint user, then the attacker will work on the transmitting particle u (disjoint user particle) from the quantum server to the disjoint user. With the assumption that the attacker applying a universal operation Inline graphic on u see (Eq. (14, 15)).

graphic file with name srep16080-m89.jpg
graphic file with name srep16080-m90.jpg

where Inline graphic represents an additional state which is created by the attacker, a represents the attacker particle and,

graphic file with name srep16080-m92.jpg

When the attacker applying its operation, a new shared key state will be created see (Eq. (17, 18)).

graphic file with name srep16080-m93.jpg
graphic file with name srep16080-m94.jpg

The attacker transmits the new formulated state Inline graphic to the quantum server. Afterwards, the quantum server performs Inline graphicOP on the received state as a result one of four states Inline graphic, Inline graphic, Inline graphic, Inline graphic which equivalent to the dual bits 00, 01, 10 and 11. With the assumption that the dual bits are equivalent to 00 then the quantum server operation is equivalent see (Eq. (19))

graphic file with name srep16080-m100.jpg

Through performing Inline graphic0 the result is obtained by (Eq. (20))

graphic file with name srep16080-m102.jpg

So the chance for discovering the attacker for Inline graphic is Inline graphic00 can be computed using (Eq. (20)) as by (Eq. (21))

graphic file with name srep16080-m105.jpg

As well when the dual bits are equivalent to 01, so the chance for discovering the attacker for Inline graphic is Inline graphic01 can be computed using Eq. (18) as shown in (Eq. (22))

graphic file with name srep16080-m108.jpg

When the dual bits are equivalent to 10, so the chance for discovering the attacker of Inline graphic is Inline graphic10 and equivalent to Inline graphic01. Furthermore the chance for discovering the attacker of Inline graphic is Inline graphic11 and equivalent to Inline graphic00. Accordingly, the total discovering probability of the attacker Inline graphicTotal of each disjoint user is equivalent ½ see (Eq. (23, 24))

graphic file with name srep16080-m116.jpg
graphic file with name srep16080-m117.jpg

As stated by Simmons theory77,78, the result of the previous equation proved that the proposed scheme is unconditionally secured under this type of attack.

One-way Channel Substitution Fraudulent Attack Security Analysis

As the transmitted particle from the quantum server to the disjoint user doesn’t contain any fact about the authentication key, so in this type of attack only the restored n (new state particle) from the disjoint user to the quantum server have to be measured. The maximum reachable information which an attacker may obtain over the communicated channel between a quantum server and a disjoint user can be computed by Holevo theory79 see (Eq. (25))

graphic file with name srep16080-m348.jpg

As Inline graphic (Inline graphic) is equivalent to Von Neumann entropy Inline graphic is a component in the hybrid status and Inline graphic is the possibility of Inline graphici in the universe Inline graphic. So the eavesdropper just has information about the authentication key by directly calculating the n (new state particle), so the resulted Inline graphic (Inline graphic) relies on the reduced density matrix of n, by substitution of (Eq. (25)) as shown in (Eq. (26))

graphic file with name srep16080-m349.jpg

As both Inline graphicn and Inline graphicni required reduced density matrix for Inline graphic and Inline graphici respectively. For any authentication key, the reduced density matrix of n can be represented in (Eq. (27))

graphic file with name srep16080-m129.jpg

In addition to, Inline graphicni is equivalent to the subsequent equations from ((28) to (32))

graphic file with name srep16080-m131.jpg
graphic file with name srep16080-m132.jpg
graphic file with name srep16080-m133.jpg
graphic file with name srep16080-m134.jpg

Therefore;

graphic file with name srep16080-m135.jpg

By replacing values for both Inline graphicn and Inline graphicni in Eq. (26), Inline graphic (Inline graphicn) = 0. So, the eavesdropper will not reveal any information about the key in case of directly calculating the transferred particles over the communicated channel from the quantum server to the disjoint user.

Two- Way Channel Substitution Fraudulent Attack Security Analysis

The attacker applies an operation Inline graphic at his/her side on the transmitted particle u and supportive particle Inline graphic. Afterwards, the attacker transmits the resulted particle to the disjoint user. When the disjoint user receives the transmitted particle, he/she does not realize that there is attacker and he did an operation. The disjoint user applyies his normal operation and transmits the resulted particle to the quantum server. The attacker intercepts the information particle sent by the disjoint user. The attacker applies an operation Inline graphic at his side to the information particle and supportive particle η. Afterwards, the attacker transmits the resulted particle to the quantum server. The attacker attempts to retrieve certain amount of information about the key by employing two supportive particles ε and η (See Supplementary Information 3 for Full Calculations of Two - Way Channel Substitution Fraudulent Attack along with equations).

When the two-bit key Inline graphic = 00, so the resulting decoding state by the quantum server is given in (Eq. (33, 34))

graphic file with name srep16080-m144.jpg
graphic file with name srep16080-m145.jpg

We can calculate the total possibility for discovering the attacker (Inline graphicTotal) in the authentication process is given by (Eq. (35))

graphic file with name srep16080-m146.jpg

If the attacker would like to minimize his/her detection probability, he/she has to adjust Inline graphicTotal as a minimum discovering probability (See Eq. 36) which is calculated under the condition of Inline graphic

graphic file with name srep16080-m148.jpg

So, the attacker’s total information amount on the transmitted key bits between the quantum server and the disjoint user can be estimated in (Eq. (37)).where Inline graphic represents the total operation performed by the attacker Inline graphic and Inline graphic, x represents the key

graphic file with name srep16080-m350.jpg

values (00, 01, 10, 11) with probability Inline graphic indicates the selected random values from variable x, Inline graphic with i, j, Inline graphic. Consequently, the joint gained information by attacker’s total operation Inline graphic is given in (Eq. (38))

graphic file with name srep16080-m155.jpg

Since Inline graphic (see Supplementary Information (4) for Proving Relation between Inline graphic and Total), by substitution in Eq. (38)

graphic file with name srep16080-m158.jpg

Therefore the total estimation probability Inline graphice of AK is given in (Eq. (40))By simplification of Eq. (40) Inline graphice of AK is given in (Eq. (41)) (see Supplementary Information (5) for Proving Relation between Inline graphice, Inline graphic and Inline graphic)

graphic file with name srep16080-m351.jpg

If Inline graphic = 1 indicates that the total estimation probability Inline graphice is maximized see (Eq. (42)) (see Supplementary Information (6) for Proving Relation between Inline graphice, Inline graphicem and Total)

graphic file with name srep16080-m352.jpg

Therefore, the probability of the attacker for successfully retrieving the transmitted keys Inline graphicerInline graphic see (Eq. (43))

graphic file with name srep16080-m353.jpg

By substituting (Eq. (42)) in equation (Eq. (43)), so

Figure 2A is shown that the possibility for discovering the attacker while attempting to retrieve any information about the key bits is equal to non-zero. For example if Total = 25% means the attacker can

graphic file with name srep16080-m354.jpg

Figure 2. Two- Way Channel Substitution Fraudulent Attack Security Analysis.

Figure 2

(A) The correlation between the joint information Inline graphic and the minimum discovering probability Total. (B) Correlation between Maximized Total Estimation Probability Inline graphicem and the minimum discovering probability Total. (C) Relation between Inline graphicer, N = [2, 4, 8, 16] and Total = [0, 12.5, 25, 50]%. (D) Relation between Inline graphicer and N while Inline graphicem = [12.5, 25, 37.5, 50]% and Inline graphic. (E) As Fig. 2D while Inline graphic. (F) Combined Fig. 2C,D while Inline graphicem = [62.5, 75, 87.5]%. “drawn by A.F”.

gain maximal joint information Inline graphic on the transmitted keys between the quantum server and

graphic file with name srep16080-m355.jpg

disjoint user. From Fig. 2B, we can conclude that when the total estimation probability is maximized which means reaching to one, the attacker can positively maximum retrieve 0.5 bit of the transmitted key AK while the maximum total estimation probability Inline graphicem is equal to 25%.

Figure 2C illustrates that if the minimum discovery probability is equal to [0, 12.5, 25, 50]% and Inline graphic = 2, so the maximum values for successfully retrieving the information of the transmitted keys Ak by the attacker are [0.25, Inline graphic, Inline graphic, Inline graphic] respectively. Also, for N = 16 the maximum successfully for retrieving information of the transmitted keys Ak by the attacker is [Inline graphic, Inline graphic] respectively. So while the number of the transmitted bits is increasing, the possibility for successful retrieval the transmitted information is decreased (See Supplementary Figure S6 (A–D) and Table S5 (A–D) for Full Calculations for Relation between N, Total, Inline graphicer).

Figure 2D shows that the maximum and minimum values for successfully retrieving the information of the transmitted keys Ak by the attacker while N = [2, 4, 8, 16] Inline graphic and Inline graphic respectively. We can conclude that all maximum values are corresponding when Inline graphicem and Total is equal to [50, 0]%. So, the attacker can gain maximum information about the transmitted keys Ak at this situation. Furthermore, the minimum value for the attacker to gain information about the transmitted keys Ak is Inline graphic corresponding when the value of Inline graphicem and Total is equal to [12.5, 50]%. (See Supplementary Figure S7 (A–D) and Table S6 (A–D) for Full Calculations for Relation between Inline graphicer and N while Inline graphicem = [12.5, 25, 37.5, 50]% and Inline graphic).

Figure 2E demonstrates the maximum and minimum values for successfully retrieving the information of the transmitted keys Ak by the attacker while Inline graphic is Inline graphic and Inline graphic respectively. From Fig. 2E, we can conclude that all maximum and minimum values are corresponding when Inline graphicem and Total is equal to Inline graphic and Inline graphic respectively. So, the attacker can gain maximum information about the transmitted keys Ak when Inline graphicem and Total equal to Inline graphic and minimum when Inline graphicem and Total is equal to Inline graphic. (See Supplementary Figure S8 (A–D) and Table S7 (A–D) for Full Calculations for Relation between Inline graphicer and N while Inline graphicem = [12.5, 25, 37.5, 50]% and Inline graphic).

Figures 2F and 3 illustrate while the number of transmitted key bits N becomes larger, the possibility of successfully retrieving Ak becomes smaller and reach zero. So, the attacker will not reveal an enormous amount of information which can be ignored and avoided by updating key between the disjoint user and the quantum server periodically. In this case, the information of the attacker on the old key will be useless.

Figure 3. Combined Fig. 2C–F “drawn by A.F”.

Figure 3

Generalization of Communication Process between N Disjoint Users with Partial Cooperation of Quantum Server

Here, we generalize our approach for Communication Process between N Disjoint Users with Partial Cooperation of Quantum Server as shown in Fig. 4A. So, Inline graphic disjointed disjoint users Inline graphic can transmit a secret message of classical bits to a remote user Inline graphic with partial cooperation of the quantum server. Firstly the quantum server distributes N particles of Inline graphic particles GHZ state Inline graphic to Inline graphic. Inline graphic chooses a randomly subset of Inline graphic and keeps it confident. In addition, generate a random sequence bit strings of transmitted plain message. Next, each user applies appropriate unitary transformation according to his plain message. The bit string value (Ŭ1 ⊗ Ŭ2 ... ⊗ ŬN−1) Ŭ corresponds to four Pauli operations {I, X, Y, Z}. Afterwards, the selected Inline graphic will be transformed according to Inline graphic plain messages and their applied unitary transformations to Inline graphic where Inline graphic and Inline graphic are one of defined GHZ states. Next, Inline graphic transmitted to Inline graphic, Inline graphic performs NGHZ measurement on his particle and Inline graphic particles. Afterwards, the quantum server calculates the status of his particle according to x basis {+, −} and announces his measurement results. Inline graphic uses his measurements’ and the quantum server publication for retrieving the original secret sent bits by Inline graphic. (See Supplementary Figures S1 and S3 for Communication Process between Two and Three Disjoint Users with Partial Support of Quantum Server respectively).

Figure 4.

Figure 4

(A) Generalization of Communication Process between N Disjoint Users with Partial Cooperation of Quantum Server (B) with Full Cooperation of Quantum Server “drawn by A.F”.

Generalization of Communication Process between N Disjoint Users with Full Cooperation of Quantum Server

Here, we generalize our approach for Communication Process between N Disjoint Users with full Cooperation of Quantum Server as shown in Fig. 4B. The sequence of the steps is similar to a partial one except that the selected Inline graphic will be transformed to Inline graphic where Inline graphic and Inline graphic are one of the defined GHZ states. Next, Inline graphic transmitted to the quantum server, quantum server performs NGHZ measurement on his particle and Inline graphic particles. Afterwards, Inline graphic calculates the status of his particle according to x basis {+, −} and announces his measurement results. Inline graphic uses his publication and the quantum server measurement for retrieving the original sent secret bits by Inline graphic. (See Supplementary Figures S2 and S4 of Communication Process between Two and Three Disjoint Users with Full Support of Quantum Server respectively).

Communication Process Security Analysis

After Inline graphic retrieves the original secret sent bits which sent by Inline graphic, Inline graphic informs Inline graphic about the positions of the transmitted particles and the selected unitary transformation applied to them. Afterwards, Inline graphic verifies the selected particles by Inline graphic and obtains an approximation of error percentage in the communication process. If the error percentage is under the specified threshold both Inline graphic and Inline graphic can continue the transmission of the secret messages, otherwise the communication process will be terminated. If an attacker tries to spy on the transmitted GHZ particles, the attacker at most can obtain one particle. So, the attacker couldn’t decide which operation is applied by Inline graphic, consequently couldn’t retrieve any transmitted secret bits. Suppose that the attacker apply an operation Inline graphic on Inline graphic and his qubit Inline graphic see (Eq. (45)).

graphic file with name srep16080-m220.jpg

Correspondingly, applying the unitary operation requires the following conditions Inline graphic + Inline graphic = 1 and Inline graphic + Inline graphic = 1.

So, the state of the protocol is transformed as follows, Firstly, the states after Inline graphic made a unitary operation see (Eq. (46)).

graphic file with name srep16080-m226.jpg

Secondly, the states after the attacker applies a unitary transformation on Inline graphic and his qubit Inline graphic see (Eq. (47, 48))

graphic file with name srep16080-m229.jpg
graphic file with name srep16080-m230.jpg

As shown in (Eq. (47, 48)), the attacker can’t gain any information during intercepting the communication process. As well the attacker introduces an error probability of ½ irrespective of the sequence of measurement. For example, suppose that the attacker measurement is the same as Inline graphic means the applied unitary transformation may be I or Z. If the measurements are different then the possible applied unitary transformation may be X or Y.

Additional Information

How to cite this article: Farouk, A. "et al. A generalized architecture of quantum secure direct communication for N disjointed users with authentication. Sci. Rep. 5, 16080; doi: 10.1038/srep16080 (2015).

Supplementary Material

Supplementary Information
srep16080-s1.pdf (1.5MB, pdf)

Acknowledgments

A.F. would like to thanks Josep Batle, Yan-Bing Li, Mosayeb Naseri, Nanrun Zhou and Ming-Ming Wang for their fruitful discussion and helpful comments.

Footnotes

Author Contributions A.F. and F.O. prepare authentication process, analysis of communication and authentication processes. A.F. prepares all figures and mathematics calculations. A.F., M.Z. and A.M. prepare the various types of communication process. All authors reviewed the manuscript and contributed for discussions of the project.

References

  1. Bennett C. H. & Brassard G. Quantum Cryptography: Public Key Distribution And Coin Tossing’. Theoretical Computer Science 560, 7–11 (2014). [Google Scholar]
  2. Nielsen M. & Chuang I. Quantum computation and quantum information . (Cambridge University Press, 2000). [Google Scholar]
  3. Zeng G. H. Quantum cryptology . (Science Press, 2006). [Google Scholar]
  4. Assche G. Quantum Cryptography and Secret-Key Distillation . (Cambridge University Press, 2006). [Google Scholar]
  5. Sharbaf M. S. Quantum Cryptography: A New Generation of Information Technology Security System. Sixth International Conference on Information Technology. Nevada, USA, IEEE, 1644–1648 (April, 2009).
  6. Wooters W. K. & Zurek W. H. A Single Quantum Cannot Be Cloned. Nature 299, 802–803 (1982). [Google Scholar]
  7. Stinson D. Cryptography Theory and Practice 3rd ed. (CRC press, 2006). [Google Scholar]
  8. Bennett C. H. "et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895–1899, doi: 10.1103/PhysRevLett.70.1895 (1993). [DOI] [PubMed] [Google Scholar]
  9. Chakrabarty I. Teleportation via a mixture of a two qubit subsystem of a N-qubit W and GHZ state. Eur. Phys. J. D 57 (2), 265–269, doi: 10.1140/epjd/e2010-00017-8 (2010). [DOI] [Google Scholar]
  10. Liang H., Liu J., Feng S. & Chen J. Quantum teleportation with partially entangled states via noisy channels. Quantum Inf Process 12(8), 2671–2687 (2013). [Google Scholar]
  11. Kaye P. & Laflamme R. An Introduction to Quantum Computing . (Oxford University Press, 2007). [Google Scholar]
  12. Bennett C. & Wiesner S. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 69, 2881–2884 (1992). [DOI] [PubMed] [Google Scholar]
  13. Poppe A., Peev M. & Maurhart O. Outline of the SECOQC quantum-key distribution network in Vienna. Int. J. Quantum Inform . 6, 209–218 (2008). [Google Scholar]
  14. Peev M. "et al. “The SECOQC quantum key distribution network in Vienna” New J. Phys. 11, 075001, 1367–2630 (2009). [Google Scholar]
  15. Elliott C. Building the quantum network. New J. Phys. 4, 46, doi: 10.1088/1367-2630/4/1/346 (2002). [DOI] [Google Scholar]
  16. Elliott C. "et al. Current status of the DARPA quantum network. Quantum Information and Computation III. 5815, 138–149 (2005).
  17. Metwaly A. F., Rashad M. Z., Omara F. A. & Megahed A. A. Architecture of multicast centralized key management scheme using quantum key distribution and classical symmetric encryption. Eur. Phys. J. Spec. Top . 223, 1711–1728 (2014). [Google Scholar]
  18. Gisin N., Ribordy G., Tittel W. & Zbinden H. “Quantum cryptography,” Rev. Mod. Phys. 74, 145–195 (2002). [Google Scholar]
  19. Beige A., Englert B., Kurtsiefer C. & Weinfurter H. Secure communication with single-photon two-qubit states. J. Phys. A: Math. Gen . 35, 407–413 (2002). [Google Scholar]
  20. Boström K. & Felbinger T. Deterministic Secure Direct Communication Using Entanglement. Phys. Rev. Lett. 89, 187902, http://dx.doi.org/10.1103/PhysRevLett.89.187902 (2002). [DOI] [PubMed] [Google Scholar]
  21. Deng F. & Long G. Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319, http://dx.doi.org/10.1103/PhysRevA.69.052319 (2004). [Google Scholar]
  22. Deng F., Long G. & Liu X. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317, http://dx.doi.org/10.1103/PhysRevA.68.042317 (2003). [Google Scholar]
  23. Lucamarini M. & Mancini S. Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501, http://dx.doi.org/10.1103/PhysRevLett.94.140501 (2005). [DOI] [PubMed] [Google Scholar]
  24. Yan F. & Zhang X. “A scheme for secure direct communication using EPR pairs and teleportation. Euro. Phys. J. B 41, 75–78 (2004). [Google Scholar]
  25. Cai Q. The Ping-Pong protocol can be attacked without eavesdropping. Phys Rev Lett . 91, 109801, http://dx.doi.org/10.1103/PhysRevLett.91.109801 (2003). [DOI] [PubMed] [Google Scholar]
  26. Man Z., Xia Y. & An N. Quantum secure direct communication by using GHZ states and entanglement swapping. J Phys B: At Mol Opt Phys . 39, 3855–3863 (2006). [Google Scholar]
  27. Zhu A., Xia Y., Fan Q. & Zhang S. Secure direct communication based on secret transmitting order of particles. Phys. Rev. A 73, 022338, http://dx.doi.org/10.1103/PhysRevA.73.022338 (2006). [Google Scholar]
  28. Xue P., Han C., Yu B., Lin X. & Guo G. Entanglement preparation and quantum communication with atoms in optical cavities. Phys. Rev. A 69, 052318, http://dx.doi.org/10.1103/PhysRevA.69.052318 (2004). [Google Scholar]
  29. Lee H., Lim J. & Yang H. Quantum direct communication with authentication. Phys. Rev. A 73, 042305, http://dx.doi.org/10.1103/PhysRevA.73.042305 (2006). [Google Scholar]
  30. Zhang Z., Liu J., Wang D. & Shi S. Comment on “Quantum direct communication with authentication”. Phys. Rev. A 75, 026301, http://dx.doi.org/10.1103/PhysRevA.75.026301 (2007). [Google Scholar]
  31. Wang C., Deng F., Li Y., Liu X. & Long G. Quantum secure direct communication with high dimension quantum superdense coding. Phys. Rev. A 71, 044305, http://dx.doi.org/10.1103/PhysRevA.71.044305 (2005). [Google Scholar]
  32. Gao T., Yan F. L. & Wang Z. X. Quantum secure direct communication by EPR pairs and entanglement swapping. Nuov Cimen S i Fis B , 119, 313–318 (2004). [Google Scholar]
  33. Gao T., Yan F. L. & Wang Z. X. A simultaneous quantum secure direct communication scheme between the central party and other M parties. Chin. Phys. Lett. 22, 2473–2476 (2005). [Google Scholar]
  34. Wang C., Deng F. & Long G. Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state. Opt Commun , 253, 15–20 (2005). [Google Scholar]
  35. Wang J., Zhang Q. & Tang C. Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358, 256–258 (2006). [Google Scholar]
  36. Qing-Yu C. & Bai-Wen L. Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004). [Google Scholar]
  37. Cai Q. Y. Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006). [Google Scholar]
  38. Long G.-L. "et al. Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2, 251–272 (2007). [Google Scholar]
  39. Chang Y., Xu C., Zhang S. & Yan L. Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Chinese Sci Bull , 59(21), 2541–2546 (2014), doi: 10.1007/s11434-014-0339-x. [DOI] [Google Scholar]
  40. Yan C., Shi-Bin Z. & Li-Li Y. A Bidirectional Quantum Secure Direct Communication Protocol Based on Five-Particle Cluster State. Chinese Phys Lett , 30(9), 090301 (2013), doi: 10.1088/0256-307x/30/9/090301. [DOI] [Google Scholar]
  41. Li J., Nie J. R., Li R. F. & Jing B. Improved security detection strategy in quantum secure direct communication protocol based on four-particle green-horne-zeilinger state. Z Naturforsch A , 67(6), 369 (2012), doi: 10.5560/zna.2012-0029. [DOI] [Google Scholar]
  42. Jian L., Dan-Jie S., Xiao-Jing G. & Bo J. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation. Chinese Phys C . 36(1), 31 (2012), doi: 10.1088/1674-1137/36/1/005. [DOI] [Google Scholar]
  43. Li W., Chen J., Wang X. & Li C. Quantum Secure Direct Communication Achieved by Using Multi-Entanglement. Int J Theor Phys . 54(1), 100–105 (2014), doi: 10.1007/s10773-014-2205-7. [DOI] [Google Scholar]
  44. Li Y. H., Li X. L., Sang M. H., Nie Y. Y. & Wang Z. S. Bidirectional controlled quantum teleportation and secure direct communication using five-qubit entangled state. Quantum Inf Process , 12(12), 3835–3844 (2013), doi: 10.1007/s11128-013-0638-1. [DOI] [Google Scholar]
  45. Qin S. J. Reexamining the security of controlled quantum secure direct communication by using four particle cluster states. Fopt . 51(9), 2714–2718 (2012), doi: 10.1007/s10773-012-1181-z. [DOI] [Google Scholar]
  46. Shukla C., Pathak A. & Srikanth R. beyond the Goldenberg–Vaidman protocol: secure and efficient quantum communication using arbitrary, orthogonal, multi-particle quantum states. Int. J. Quant. Inform , 10(08), 1241009 (2012), doi: 10.1142/s0219749912410092. [DOI] [Google Scholar]
  47. Wang J., Zhang Q. & Tang C. J. Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt Comm , 266(2), 732–737 (2006), doi: 10.1016/j.optcom.2006.05.035. [DOI] [Google Scholar]
  48. Xiao-Ming X., Li D., Ya-Jun G. & Feng C. Quantum secure direct communication with four-particle genuine entangled state and dense coding. Commun Theor Phys , 52(1), 60 (2009), doi: 10.1088/0253-6102/52/1/13. [DOI] [Google Scholar]
  49. Xiu X. M., Dong L., Gao Y. J. & Chi F. Quantum secure direct communication using six-particle maximally entangled states and teleportation. Commun Theor Phys . 51(3), 429–432 (2009), doi: 10.1088/0253-6102/51/3/09. [DOI] [Google Scholar]
  50. Yadav P., Srikanth R. & Pathak A. Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique. Quantum Inf Process . 13(12), 2731–2743 (2014), doi: 10.1007/s11128-014-0825-8. [DOI] [Google Scholar]
  51. Long G. L. Quantum secure direct communication. In Conference on Coherence and Quantum Optics. New York, United States, Optical Society of America (pp. M6-42). (June, 2013).
  52. Long G. L. & Liu X. S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A . 65 (3), 032302 (2002). [Google Scholar]
  53. Yuan H., Zhang Q., Hong L., Yin W. J. & Xu D. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs. Int J Theor Phys . 53(8), 2565–2570 (2014). [Google Scholar]
  54. Beige A., Englert B. G., Kurtsiefer C. & Weinfurter H. Secure Communication with a Publicly Known Key. Acta. Phys. Pol. A . 101(3), 357–368 (2002). [Google Scholar]
  55. Gao T., Yan F. L. & Wang Z. X. Deterministic secure direct communication using GHZ states and swapping quantum entanglement. J. Phys. A: Math. Gen . 38(25), 5761 (2005). [Google Scholar]
  56. Xiu X. M., Dong L., Gao Y. J. & Chi F. Controlled deterministic secure quantum communication using five-qubit entangled states and two-step security test. Opt Comm , 282(2), 333–337 (2009). [Google Scholar]
  57. Ye T. Y. Quantum secure direct dialogue over collective noise channels based on logical Bell states. Quantum Inf Process . 14(4), 1487–1499 (2015). [Google Scholar]
  58. Yan C., Shi-Bin Z., Li-Li Y. & Gui-Hua H. Faithful deterministic secure quantum communication and authentication protocol based on hyper entanglement against collective noise. Chinese Phys B , 24(8), 80306–80313 (2015). [Google Scholar]
  59. Wang T., Wen Q. & Zhu F. Controlled quantum secure direct communication with quantum encryption. Int. J. Quant. Inform . 6, 543–551 (2008). [Google Scholar]
  60. Cai Q. & Li B. Improving the capacity of the Boström-Felbinger protocol. Phys. Rev. Lett. 69, 054301, http://dx.doi.org/10.1103/PhysRevA.69.054301 (2004). [Google Scholar]
  61. Ying S., Qiao-Yan W. & Fu-Chen Z. Multiparty Quantum Chatting Scheme. Chin. Phys. Lett. 25, 828–831 (2008). [Google Scholar]
  62. Curty M. & Santos D. Quantum authentication of classical messages. Phys. Rev. A 64, 062309, http://dx.doi.org/10.1103/PhysRevA.64.062309 (2001). [Google Scholar]
  63. Dušek M., Haderka O., Hendrych M. & Myška R. Quantum identification system. Phys. Rev. A 60, 149–156 (1999). [Google Scholar]
  64. Zeng G. & Zhang W. Identity verification in quantum key distribution. Phys. Rev. A 61, 022303, http://dx.doi.org/10.1103/PhysRevA.61.022303 (2001). [Google Scholar]
  65. Ljunggren D., Bourennane M. & Karlsson A. Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305, http://dx.doi.org/10.1103/PhysRevA.62.022305 (2000). [Google Scholar]
  66. Biham E., Huttner B. & Mor T. Quantum cryptographic network based on quantum memories. Phys. Rev. A 54, 2651–2658 (1996). [DOI] [PubMed] [Google Scholar]
  67. Einstein A., Podolsky B. & Rosen N. Can quantum mechanical description of physical reality be considered complete? Phys. Rev . 47, 777–780 (1935). [Google Scholar]
  68. He G. Q., Zhu J. & Zeng G. H. Quantum secure communication using continuous variable EPR correlations. Phys. Rev. A . 73, 1–7 (2006). [Google Scholar]
  69. Kwiat P. G. "et al. New high-intensity source of polarization-entangled photon pairs. Phys Rev Lett . 75(24), 4337, http://dx.doi.org/10.1103/PhysRevLett.75.4337 (1995). [DOI] [PubMed] [Google Scholar]
  70. Huang Y. F. "et al. Experimental generation of an eight-photon Greenberger–Horne–Zeilinger state. Nature communications . 2, 546, doi: 10.1038/ncomms1556 (2011). [DOI] [PubMed] [Google Scholar]
  71. Greenberger D. M., Horne M. A. & Zeilinger A. Bell’s Theory, Quantum Theory and Conceptions of the Universe . 69–72 (Kluwer Academic Publishers, 1989). [Google Scholar]
  72. Pan J. "et al. Experimental entanglement of six photons in graph states. Nature Physics 3, 91–95 (2007). [Google Scholar]
  73. Xia Y., Lu P. & Zeng Y. Effective protocol for preparation of N-photon Greenberger–Horne–Zeilinger states with conventional photon detectors. Quantum Inf Process , 11(2), 605–613 (2011), doi: 10.1007/s11128-011-0271-9. [DOI] [Google Scholar]
  74. Xia Y., Song J. & Song H. S. Linear optical protocol for preparation of N-photon Greenberger-Horne-Zeilinger state with conventional photon detectors. Appl phys lett , 92(2), 1127, doi: 10.1063/1.2836268 (2008). [DOI] [Google Scholar]
  75. Zhao Z. "et al. Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature , 430(6995), 54–58 (2004). [DOI] [PubMed] [Google Scholar]
  76. Xu T., Xiong W. & Ye L. A scheme for generation of multi-photon GHZ states with cross-Kerr nonlinearities. J At Mol Sci . 4(1), 72–78 (2013), doi: 10.4208/jams.030111.032211a. [DOI] [Google Scholar]
  77. Simmons G. J. Message Authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques. 12th IEEE Annual Electronics and Aerospace Conference, Washington, USA, IEEE, 661–662 (December, 1979).
  78. Simmons G. J. Authentication theory/coding theory. Advances in Cryptology-Proceedings of Crypto 84, Paris, France,Springer Berlin Heidelberg, 196, 411–431 (August, 1985).
  79. Holevo A. S. Statistical problems in quantum physics. Proceedings of the second Japan-USSR Symposium on probability theory, 330, 104–119 (1973).

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

Supplementary Information
srep16080-s1.pdf (1.5MB, pdf)

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES