Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
A. Cabello (1999)
Quantum key distribution without alternative measurementsPhysical Review A, 61
D. Bouwmeester, Jian-Wei Pan, Klaus Mattle, Manfred Eibl, H. Weinfurter, A. Zeilinger (1997)
Experimental quantum teleportationNature, 390
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
S. Phoenix, S. Barnett, P. Townsend, K. Blow (1995)
Multi-user Quantum Cryptography on Optical NetworksJournal of Modern Optics, 42
Charles Bennett, S. Wiesner (1992)
Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states.Physical review letters, 69 20
A. Cabello (2000)
Quantum key distribution in the Holevo limit.Physical review letters, 85 26 Pt 1
Charles Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, W. Wootters (1993)
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.Physical review letters, 70 13
A. Brú, J. Pastor, I. Fernaud, I. Brú, S. Melle, C. Berenguer (1998)
Super-rough dynamics on tumor growthPhysical Review Letters, 81
M. Nielsen, M. Nielsen, E. Knill, R. Laflamme (1998)
Complete quantum teleportation using nuclear magnetic resonanceNature, 396
A. Wójcik (2002)
Eavesdropping on the "ping-pong" quantum communication protocol.Physical review letters, 90 15
G. Long, X. Liu (2000)
Theoretically efficient high-capacity quantum-key-distribution schemePhysical Review A, 65
M. Koashi, N. Imoto (1997)
Quantum Cryptography Based on Split Transmission of One-Bit Information in Two StepsPhysical Review Letters, 79
Lior Goldenberg, L. Vaidman (1995)
Quantum cryptography based on orthogonal states.Physical review letters, 75 7
W. Hwang, I. Koh, Y. Han (1997)
Quantum cryptography without public announcement of basesPhysics Letters A, 244
B. Huttner, N. Imoto, N. Gisin, T. Mor (1995)
Quantum cryptography with coherent statesTechnical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics
P. Xue, Chuan‐Feng Li, G. Guo (2002)
Conditional efficient multiuser quantum cryptography networkPhysical Review A, 65
Fu-Guo Deng, Xiao-Shu Liu, Ying-Jun Ma, Xiao Li, Gui-Lu Long (2002)
A Theoretical Scheme for Multi-user Quantum Key Distribution with N Einstein-Podolsky-Rosen Pairs on a Passive Optical NetworkChinese Physics Letters, 19
D. Bruß (1998)
Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 81
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
D. Boschi, S. Branca, F. Martini, L. Hardy, S. Popescu (1997)
Experimental Realization of Teleporting an Unknown Pure Quantum State via Dual Classical and Einstein-Podolsky-Rosen ChannelsPhysical Review Letters, 80
Almut Beige, B. Englert, C. Kurtsiefer, H. Weinfurter (2001)
Secure Communication with a Publicly Known KeyActa Physica Polonica A, 101
Charles Bennett, G. Brassard, N. Mermin (1992)
Quantum cryptography without Bell's theorem.Physical review letters, 68 5
B. Shi, Y.-K. Jiang, G. Guo (2000)
Quantum key distribution using different-frequency photonsApplied Physics B, 70
A novel scheme for secure direct communication between Alice and Bob is proposed, where there is no need for establishing a shared secret key. The communication is based on Einstein-Podolsky-Rosen (EPR) pairs and teleportation between Alice and Bob. After insuring the security of the quantum channel (EPR pairs), Bob encodes the secret message directly on a sequence of particle states and transmits them to Alice by teleportation. In this scheme teleportation transmits Bob’s message without revealing any information to a potential eavesdropper. Alice can read out the encoded messages directly by the measurement on her qubits. Because there is not a transmission of the qubit which carries the secret message between Alice and Bob, it is completely secure for direct secret communication if perfect quantum channel is used.
The European Physical Journal B - Condensed Matter and Complex Systems – Springer Journals
Published: Sep 1, 2004
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.