Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
HK Lo, X Ma, K Chen (2005)
Decoy state quantum key distributionPhys. Rev. Lett., 94
I. Affleck, T. Kennedy, E. Lieb, H. Tasaki (1988)
Valence bond ground states in isotropic quantum antiferromagnetsCommunications in Mathematical Physics, 115
Charles Bennett, Gilles Brassard (2014)
Quantum cryptography: Public key distribution and coin tossingTheor. Comput. Sci., 560
T. Hwang, Chia-Wei Tsai, Song-Kong Chong (2011)
Probabilistic quantum key distributionQuantum Inf. Comput., 11
N. An (2010)
Joint remote state preparation via W and W-type statesOptics Communications, 283
D. Mayers (1998)
Unconditional security in quantum cryptographyJ. ACM, 48
Xie Chen, B. Zeng, Z. Gu, B. Yoshida, I. Chuang (2008)
Gapped two-body hamiltonian whose unique ground state is universal for one-way quantum computation.Physical review letters, 102 22
Daniel Gottesman, Hoi-Kwong Lo (2001)
Proof of security of quantum key distribution with two-way classical communicationsIEEE Trans. Inf. Theory, 49
H. Lo, H. Chau (1998)
Unconditional security of quantum key distribution over arbitrarily long distancesScience, 283 5410
G. Gan (2009)
Quantum Key Distribution Scheme with High EfficiencyCommunications in Theoretical Physics, 51
E. Biham, Michel Boyer, P. Boykin, T. Mor, V. Roychowdhury (1999)
A Proof of the Security of Quantum Key DistributionJournal of Cryptology, 19
Chong Li, He-Shan Song, Ling Zhou, Chunfeng Wu (2003)
A random quantum key distribution achieved by using Bell statesJournal of Optics B-quantum and Semiclassical Optics, 5
G. Long, X. Liu (2000)
Theoretically efficient high-capacity quantum-key-distribution schemePhysical Review A, 65
L. Liu, T. Hwang (2014)
Controlled remote state preparation protocols via AKLT statesQuantum Information Processing, 13
Nanrun Zhou, Guihua Zeng, Jin Xiong (2004)
Quantum key agreement protocolElectronics Letters, 40
Andrew Darmawan, S. Bartlett (2010)
Optical spin-1 chain and its use as a quantum-computational wirePhysical Review A, 82
M. Ben-Or, M. Horodecki, D. Leung, D. Mayers, J. Oppenheim (2004)
The Universal Composable Security of Quantum Key Distribution
Xiongfeng Ma, H. Lo, Yi Zhao, B. Qi (2005)
Practical decoy state for quantum key distribution (15 pages)Physical Review A, 72
Fe-Guo Deng, G. Long (2003)
Controlled order rearrangement encryption for quantum key distributionPhysical Review A, 68
J. Kempe, D. Bacon, Daniel Lidar, K. Whaley (2000)
Theory of decoherence-free fault-tolerant universal quantum computationPhysical Review A, 63
Song-Kong Chong, Chia-Wei Tsai, T. Hwang (2011)
Improvement on “Quantum Key Agreement Protocol with Maximally Entangled States”International Journal of Theoretical Physics, 50
J. Lavoie, R. Kaltenbaek, B. Zeng, S. Bartlett, K. Resch (2010)
Optical one-way quantum computing with a simulated valence-bond solidNature Physics, 6
S. Qin, Q. Wen, Luoming Meng, F. Zhu (2009)
Comment on “Controlled DSQC using five-qubit entangled states and two-step security test”Optics Communications, 282
Song-Kong Chong, T. Hwang (2010)
Quantum key agreement protocol based on BB84Optics Communications, 283
Jose Coello, A. Bayat, S. Bose, J. Jefferson, C. Creffield (2010)
Spin filtering and entanglement swapping through coherent evolution of a single quantum dot.Physical review letters, 105 8
D. Bruß (1998)
Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 81
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
Sellami Ali (2010)
DECOY STATE QUANTUM KEY DISTRIBUTIONIIUM Engineering Journal, 10
Daegene Song (2003)
Secure key distribution by swapping quantum entanglementPhysical Review A, 69
H. Fan, V. Korepin, V. Roychowdhury (2004)
Entanglement in a valence-bond solid state.Physical review letters, 93 22
Yazhen Wang (2012)
Quantum Computation and Quantum InformationStatistical Science, 27
高飞, 林崧, 温巧燕, 朱甫臣 (2008)
A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol, 25
F. Gao, S. Qin, Q. Wen, F. Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOptics Communications, 283
In this paper, we propose two controlled probabilistic quantum key distribution protocols with AKLT states. An AKLT state is a gapped ground state with minimum energy, and owing to the properties of this special state, our proposed protocols incorporate not only the measurement uncertainty in quantum phenomena (entanglement swapping with 1/4 probability) but also additional randomness (Bell measurement on two physical particles with 1/3 probability), in comparison with other PQKD schemes. Therefore, our protocols are more suitable for use by two mutually untrusted communicants, with no authenticated intermediate channel, allowing them to obtain an unpredictable, and therefore secure, key.
Quantum Information Processing – Springer Journals
Published: Dec 24, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.