Access the full text.
Sign up today, get DeepDyve free for 14 days.
Chuan Wang, Fuguo Deng, G. Long (2005)
Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger stateOptics Communications, 253
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
Song Lin, Q. Wen, F. Gao, F. Zhu (2008)
Quantum secure direct communication with χ -type entangled statesPhysical Review A, 78
FG Deng, GL Long (2004)
Secure direct communication with a quantum one-time padPhys. Rev. A, 69
Chia-Wei Tsai, T. Hwang (2013)
Deterministic quantum communication using the symmetric W stateScience China Physics, Mechanics and Astronomy, 56
Zhihao Liu, Hanwu Chen, Wenjie Liu, Juan Xu, Zhiqiang Li (2011)
Deterministic secure quantum communication without unitary operation based on high-dimensional entanglement swappingScience China Information Sciences, 55
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
Qin-nan Zhang, Cui-cui Li, Yuan-hua Li, Y. Nie (2012)
Quantum Secure Direct Communication Based on Four-Qubit Cluster StatesInternational Journal of Theoretical Physics, 52
Zhihao Liu, Hanwu Chen, Wenjie Liu, Juan Xu, Dong Wang, Zhiqiang Li (2012)
Quantum secure direct communication with optimal quantum superdense coding by using general four-qubit statesQuantum Information Processing, 12
Tie-Jun 王, Tao 李, Fang-Fang 杜, F. 邓 (2011)
High-Capacity Quantum Secure Direct Communication Based on Quantum Hyperdense Coding with HyperentanglementChinese Physics Letters, 28
Arti Chamoli, C. Bhandari (2007)
Secure direct communication based on ping–pong protocolQuantum Information Processing, 8
Yuguang Yang, Hai-Ping Chai, Yi-Wei Teng, Q. Wen (2011)
Improving the Security of Controlled Quantum Secure Direct Communication by Using Four Particle Cluster States Against an Attack with Fake Entangled ParticlesInternational Journal of Theoretical Physics, 50
C. Tsai, C. Hsieh, T. Hwang (2011)
Dense coding using cluster states and its application on deterministic secure quantum communicationThe European Physical Journal D, 61
X. Xiu, H. Dong, L. Dong, Ya-Jun Gao, Feng Chi (2009)
Deterministic secure quantum communication using four-particle genuine entangled state and entanglement swappingOptics Communications, 282
Z. Zhang, Z. Man (2004)
Deterministic secure direct communication by using swapping quantum entanglement and local unitary operationsarXiv: Quantum Physics
Chitra Shukla, A. Banerjee, A. Pathak (2012)
Improved Protocols of Secure Quantum Communication Using W StatesInternational Journal of Theoretical Physics, 52
G. Long, X. Liu (2000)
Theoretically efficient high-capacity quantum-key-distribution schemePhysical Review A, 65
Xihan Li, Fuguo Deng, Hong-Yu Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhysical Review A, 74
Y. Zhan, Ling-ling Zhang, Qun-Yong Zhang (2009)
Quantum secure direct communication by entangled qutrits and entanglement swappingOptics Communications, 282
Jian Li, Haifei Jin, Bo Jing (2011)
Improved Eavesdropping Detection Strategy in Quantum Direct Communication Protocol Based on Five-Particle Cluster StateInternational Journal of Theoretical Physics, 51
J Li, HF Jin, B Jing (2012)
Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocolChin. Sci. Bull., 57
Hoi-Kwong Lo, Yi Zhao (1995)
Quantum Cryptography
Fengli Yan, Xiaoqiang Zhang (2003)
A scheme for secure direct communication using EPR pairs and teleportationThe European Physical Journal B - Condensed Matter and Complex Systems, 41
Chuan Wang, Fuguo Deng, Yansong Li, Xiao-Shu Liu, G. Long (2005)
Quantum secure direct communication with high-dimension quantum superdense codingPhysical Review A, 71
Li Chun-yan, Li Xi-han, Deng Fu-Guo, Zhou Hong-Yu (2008)
Efficient quantum secure communication with a publicly known keyChinese Physics B, 17
S. Qin, F. Gao, Q. Wen, F. Zhu (2010)
Improving the quantum secure direct communication by entangled qutrits and entanglement swapping against intercept-and-resend attackOptics Communications, 283
S Lin, QY Wen, F Gao (2008)
Quantum secure direct communication with $$\chi $$ χ -type entangled statesPhys. Rev. A, 78
G. Long, Fuguo Deng, Xihan Li, Wang Chuan, Wen Kai (2007)
Quantum secure direct communication and deterministic secure quantum communicationFrontiers of Physics in China, 2
S. Jahanshahi, A. Bahrampour, M. Zandi (2013)
Three-particle deterministic secure and high bit-rate direct quantum communication protocolQuantum Information Processing, 12
Wenjie Liu, Chen Hanwu, Ting-Huai Ma, Zhi-qiang Li, Zhi-hao Liu, Wenbo Hu (2009)
An efficient deterministic secure quantum communication scheme based on cluster states and identity authenticationChinese Physics B, 18
H. Hoffmann, K. Bostroem, T. Felbinger (2004)
Comment on 'Secure direct communication with a quantum one-time pad'Physical Review A, 72
Marco Lucamarini, S. Mancini (2004)
Secure deterministic communication without entanglement.Physical review letters, 94 14
Almut Beige, B. Englert, C. Kurtsiefer, H. Weinfurter (2001)
Secure Communication with a Publicly Known KeyActa Physica Polonica A, 101
Hao Yuan, Jun Song, X. Hu, K. Hou (2009)
AN EFFICIENT DETERMINISTIC SECURE QUANTUM COMMUNICATION SCHEME WITH CLUSTER STATEInternational Journal of Quantum Information, 07
Zhihao Liu, Hanwu Chen, Wenjie Liu, Wenjie Liu, Juan Xu, Zhiqiang Li (2011)
ANALYZING AND REVISING A TWO-WAY PROTOCOL FOR QUANTUM CRYPTOGRAPHY WITH A NONMAXIMALLY ENTANGLED QUBIT PAIRInternational Journal of Quantum Information, 09
Siyu Song, Chuan Wang (2012)
Recent development in quantum communicationChinese Science Bulletin, 57
Xihan Li, Fuguo Deng, Chun-Yan Li, Yu-Jie Liang, P. Zhou, Hong-Yu Zhou (2006)
Deterministic secure quantum communication without maximally entangled statesarXiv: Quantum Physics
The three-particle deterministic secure and high bit-rate direct quantum communication protocol and its improved version are analyzed. It shows that an eavesdropper can steal the sender’s secret message by the intercept-resend attack and the entanglement attack. The original version is even fragile under denial-of-service attack. As a result, some suggestions to revise them are given.
Quantum Information Processing – Springer Journals
Published: Jan 28, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.