TY - GEN
T1 - Using Symmetry dicke state as security detection particle in quantum 'Ping-Pong' protocol
AU - Liu, Qinghai
AU - Shen, Hong
AU - Tian, Hui
AU - Sang, Yingpeng
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/10/3
Y1 - 2014/10/3
N2 - Quantum Mechanics is one of the basic theories in modern physics, which has been widely used in many modern applications. In order to transmit a secure message, the deterministic secure quantum direct communication protocol was proposed. It has attracted great interest of researchers afterwards. But the protocol was proved to have many vulnerabilities, and can be attacked by eavesdropper. Many researchers have tried to improve it, with the concentration on the security detection strategy. In this paper, the symmetry Dicke state is used to detect eavesdropper. The quantum direct communication protocol that uses symmetry Dicke state as security detection particle and the method of entropy theory are introduced, and three detection strategies are compared. During the security analysis, we found that the efficiency of the propsoed mothed is higher than the original "Ping-Pong" Protocol and the mothed that use two particles of EPR pair.
AB - Quantum Mechanics is one of the basic theories in modern physics, which has been widely used in many modern applications. In order to transmit a secure message, the deterministic secure quantum direct communication protocol was proposed. It has attracted great interest of researchers afterwards. But the protocol was proved to have many vulnerabilities, and can be attacked by eavesdropper. Many researchers have tried to improve it, with the concentration on the security detection strategy. In this paper, the symmetry Dicke state is used to detect eavesdropper. The quantum direct communication protocol that uses symmetry Dicke state as security detection particle and the method of entropy theory are introduced, and three detection strategies are compared. During the security analysis, we found that the efficiency of the propsoed mothed is higher than the original "Ping-Pong" Protocol and the mothed that use two particles of EPR pair.
KW - 'Ping-Pong' Protocol
KW - Protocol security
KW - Security Detection Strategy
KW - Symmetry Dicke state
UR - http://www.scopus.com/inward/record.url?scp=84907924982&partnerID=8YFLogxK
U2 - 10.1109/PAAP.2014.58
DO - 10.1109/PAAP.2014.58
M3 - Conference contribution
AN - SCOPUS:84907924982
T3 - Proceedings - International Symposium on Parallel Architectures, Algorithms and Programming, PAAP
SP - 244
EP - 249
BT - Proceedings - 6th International Symposium on Parallel Architectures, Algorithms, and Programming, PAAP 2014
A2 - Shen, Hong
A2 - Shen, Hong
A2 - Sang, Yingpeng
A2 - Tian, Hui
PB - IEEE Computer Society
T2 - 6th International Symposium on Parallel Architectures, Algorithms, and Programming, PAAP 2014
Y2 - 13 July 2014 through 15 July 2014
ER -