TY - JOUR
T1 - An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State
AU - Kao, Shih Hung
AU - Lin, Jason
AU - Tsai, Chia Wei
AU - Hwang, Tzonelih
N1 - Publisher Copyright:
© 2018, Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2018/6/1
Y1 - 2018/6/1
N2 - In early 2009, Xiu et al. (Opt. Commun. 282(2) 333–337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656–2658 2009) pointed out two security loopholes in Xiu et al.’s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344–347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.
AB - In early 2009, Xiu et al. (Opt. Commun. 282(2) 333–337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656–2658 2009) pointed out two security loopholes in Xiu et al.’s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344–347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.
UR - http://www.scopus.com/inward/record.url?scp=85043373603&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85043373603&partnerID=8YFLogxK
U2 - 10.1007/s10773-018-3715-5
DO - 10.1007/s10773-018-3715-5
M3 - Article
AN - SCOPUS:85043373603
SN - 0020-7748
VL - 57
SP - 1894
EP - 1902
JO - International Journal of Theoretical Physics
JF - International Journal of Theoretical Physics
IS - 6
ER -