<p id="nxp5x"><big id="nxp5x"><noframes id="nxp5x">

    <var id="nxp5x"><video id="nxp5x"></video></var>

          <em id="nxp5x"></em>

              首 頁 本刊概況 出 版 人 發行統計 在線訂閱 歡迎投稿 市場分析 1 組織交流 1 關于我們
             
            1
               通信短波
            1
               新品之窗
            1
               優秀論文
            1
               通信趨勢
            1
               特別企劃
            1
               運營商動態
            1
               技術前沿
            1
               市場聚焦
            1
               通信視點
            1
               信息化論壇
            1
            當前位置:首頁 > 優秀論文
            Quantum Dialogue by Using Four-Photon W State
            作者:WANG Dong Chai Xu-Chao
            來源:本站原創
            更新時間:2010/11/16 15:19:00
            正文:
            (School of Communication and Information Engineering,Xi′an university of Posts and Telecommunications ,Xi’an , 710061 Shaanxi,China;wangdong ,
            Abstract:We present a quantum dialogue protocol by using four-Photon W State.In this paper,we point out four-photon W state quantum dialogue,which enables both legitimate parties (Alice and Bob) to exchange their secret messages in a direct way.At last, Our calculations show that Eve can gain half information of Alice and Bob’s secret message only by listening the classical channel.
            Key words: quantum dialogue;W State; unitary transformations ;measuring basis;relative entropy
            1.Introduction
            Quantum communication becomes one of the most important Applications of quantum mechanics today.Quantum key distribution (QKD) is one of the most interesting topics in quantum communication field. It provides a way for two legitimate parties to share a secret key over a long distance. In 1984, Bennett and Brassard proposed the first QKD protocol,[1] known as BB84. Since then, QKD has attracted much attention of the researchers.[2−5] Recently, the principle of QKD has been applied to other branches of quantum communication, such as quantum secure direct communication (QSDC),[6−9] quantum secret sharing (QSS),[10−15] quan-tum dialogue (QD).[16−24]
            It is well known that the entanglement of three-photon state is classified as Greenberger–Horne–Zeilinger (GHZ) class states and W class states.[25] W class states are anon-maximally entangled quantum state, but they retain entanglement firmer than other entangled states.
            2.Quantum Dialogue Protocol Using four-Photon W State 
            The four-photon W states can be rewritten as:
             
            (iii)             The first security checking phase
            Aware of Bob’s confirmation that he has received 4-sequence, Alice tells him the position and the state of the checking qubits. Bob performs his measurement under the corresponding measurement bases as that chosen by Alice on the corresponding photons in his checking groups and compares the measurement outcome. If his measurement outcome is corresponding with the state that Alice sends to him, they confirm there is no eavesdropping in line. This communication continues. In this case, Alice and Bob continue to transmit the next bits.Otherwise, they have to discard their transmission and abort the communication. they abandon and start from step (i). In a noisy channel, Alice and Bob trust the quantum channel if the error rate is lower than that induced by noise.
            3 The Security of this Protocol
            In this paper we would not try to find subtle strategies to attack protocols, and the main topic focuses on the problem of information leakage, which implies that Eve can elicit some information about the secrets without any active attack(note that Eve just obtain information from the public annunciation and, as a result, it cannot be discovered by any detection). Therefore, we need not discuss the process of eavesdropping detection. We would pay our main attention to the process of message transmission. For example, suppose the measurement result is
            4 Discussion and Conclusion
            In conclusion, we have proposed a new quantum dialogue protocol for two legitimate parties to exchange their secret messages simultaneously by using four-photon W state. The result shows that, for such a four-photon W state quantum channel, a quantum dialogue can be realized between two users successfully. Compared with previous schemes, there are some differences in scheme proposed in this paper. Firstly, Quantum dialogue is the same as QKD and OTP (one time pad) communication, where the key of OTP is used twice. The key in OTP can never be reused, otherwise it would result in insecure.[26,27]  However, the key of OTP is used twice simultaneously in quantum dialogue. That is to say, Alice and Bob decode the secret message in the same time after Alice announces her measurement outcome. So the quantum dialogue is secure. Secondly, In this paper, two different methods of analysis that Eve can obtain half of the information about Alice and Bob’s secret message by the classical channel,the result are the same.
            References
            [1] C.H. Bennett and G. Brassard, in Proceedings of IEEE International Conference on Computer, Systems and Signal Processing, Bangalore, India, IEEE, New York 1984,p.175.
            [2] A.K. Ekert, Phys. Rev. Lett. 67 ,661,1991
            [3] C.H. Bennett, G. Brassard, and N.D. Mermin, Phys. Rev.Lett. 68 ,557,1992
            [4] P. Xue, C.F. Li, and G.C. Guo, Phys. Rev. A 65 ,022317,2002
            [5] A. Ac´ın, N. Gisin, and V. Scarani, Phys. Rev. A 69,012309 ,2004
            [6] K. Bostr¨om and T. Felbinger, Phys. Rev. Lett. 89, 187902,2002
            [7] F.G. Deng, G.L. Long, and X.S. Liu, Phys. Rev. A 68, 042317 ,2003
            [8] F.L. Yan and X.Q. Zhang, Euro. Phys. J. B 41 ,75,2004
            [9] H.J. Cao and H.S. Song, Phys. Scr. 74 ,572,2006
            [10] M. Hillery, V. Buzek, and A. Berthiaume, Phys. Rev. A 59 ,1829,1999
            [11] G.P. Guo and G.C. Guo, Phys. Lett. A 310,247 ,2003
            [12] A.M. Lance, et al., Phys. Rev. A 71, 033814 ,2005
            [13] F.G. Deng, P. Zhou, X.H. Li, C.Y. Li, and H.Y. Zhou,Chin. Phys. Lett. 23,1084 ,2006
            [14] L. Dong, X.M. Xiu, Y.J. Gao, and F. Chi, Int. J. Mod.Phy. C 18 ,1699,2007
            [15] X.M. Xiu, L. Dong, Y.J. Gao, and F. Chi, Commun.Theor. Phys. 49 ,1203,2008
            [16] B. A. Nguyen, Phys. Lett. A, 328, 6–10 ,2004
            [17] Z.X. Man, Z.J. Zhang, and Y. Li, Chin. Phys. Lett. 22,22.2005
            [18] X. Ji and S. Zhang, Chin. Phys. 15 ,1418,2006
            [19] Y. Xia, C.B. Fu, and S. Zhang, J. Korean. Phys. Soc. 23,1680 (2006)
            [20] Y. Xia, J. Song, J. Nie, and H.S. Song, Commun. Theor. Phys. 48 ,841,(2007)
            [21] Y. Xia, J. Song, and H.S. Song, Comm. Theor. Phys. 49,919 ,2008
            [22] Y.G. Tan and Q.Y. Cai, Int. J. Quant. Inf. 6 ,325,2008
            [23] F. Gao, F.Z. Guo, Q.Y. Wen, and F.C. Zhu, Sci. China Ser. G-Phys.Mech.Astron. 48 ,237,2005
            [24] L. Dong, X.M. Xiu, Y.J. Gao, and F. Chi, Opt. Commun. 281 ,6135,2008
            [25] W. Dur, G. Vidal, and J.I. Cirac, Phys. Rev. A 62 ,062314,2000
            [26] N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, Rev.Mod. Phys. 74, 145 ,2002.
             
             
            作者簡介:王東,生于1986年,畢業于西安工程大學,現在讀西安郵電學院通信與信息工程學院研究生,主要從事量子通信方面的研究。
             
            作者簡介:柴旭超,生于1985年,畢業于西北工業大學,現就讀西安郵電學院通信與信息工程學院研究生,主要從事無線傳感器網絡等通信領域的研究。
             
             
             
             
             
             
             
               
            《通信市場》 中國·北京·復興路49號通信市場(100036) 點擊查看具體位置
            電話:86-10-6820 7724, 6820 7726
            京ICP備05037146號-8
            建議使用 Microsoft IE4.0 以上版本 800*600瀏覽 如果您有什么建議和意見請與管理員聯系
            欧美成人观看免费全部欧美老妇0