Quantum secure direct communication scheme with identity authentication

Author:

Zhou Xian-Tao,Jiang Ying-Hua,

Abstract

Aiming at the problem that traditional quantum secure direct communication schemes need to assume the legitimacy of both parties in advance, a GHZ state (a quantum state involving at least three subsystems or particles entanglement) based quantum secure direct communication scheme with identity authentication is proposed. The scheme first encodes GHZ state particles into eight types, divides the particles into three parts, and sends them three times. Each time, eavesdropping is added to detect whether the particle detection channel is secure, and identity authentication is added when sending particles for the second time to verify the identity of the receiver. Specifically, according to the value of the ID key IDA, the specified particles (such as <inline-formula><tex-math id="Z-20230114055019-1">\begin{document}$ |0\rangle $\end{document}</tex-math><alternatives><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="2-20221684_Z-20230114055019-1.jpg"/><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="2-20221684_Z-20230114055019-1.png"/></alternatives></inline-formula> particles or <inline-formula><tex-math id="Z-20230114055019-2">\begin{document}$ |+ \rangle $\end{document}</tex-math><alternatives><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="2-20221684_Z-20230114055019-2.jpg"/><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="2-20221684_Z-20230114055019-2.png"/></alternatives></inline-formula> particles) are found in the two particles. Then their positions are marked as <i>L</i> and they traverse down until all the identity keys are traversed, obtaining a position sequence <i>L</i>. After sending the two particles to Bob for eavesdropping detection, Bob measures the <i>L</i> position of the two particles on the corresponding basis according to the value of the identity key, the measurement results are coded, and compared with the identity key IDA to complete the identity authentication. After sending the particles for the third time. the receiver extracts all the detected particles, and then the GHZ state particles are jointly measured, and the original information is recovered through the previously given coding rules, so as to realize quantum safe direct communication. The design of this scheme is simple and efficient, and the communication can be realized without complex unitary transformation. The correctness analysis proves that the scheme is correct in theory. The security analyses of interception/measurement retransmission attack, Trojan horse attack, denial of service attack, auxiliary particle attack, identity impersonation attack, and other attacks prove that the scheme can resist common internal attacks and external attacks, and solve the problem of information leakage. The transmission efficiency of the scheme is 1, the quantum bit utilization is 1, and the coding capacity is a quantum state carrying 3 bits of information. Compared with some previous schemes, this scheme has obvious advantages in these three aspects. The biggest advantage is that the sender does not need to assume the legitimacy of the receiver when sending information, so it has high practical application value.

Publisher

Acta Physica Sinica, Chinese Physical Society and Institute of Physics, Chinese Academy of Sciences

Subject

General Physics and Astronomy

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3