Access the full text.
Sign up today, get DeepDyve free for 14 days.
FG Deng, GL Long (2004)
Secure direct communication with a quantum one-time padPhys. Rev. A, 69
D Bouwmeester, JW Pan, K Mattle (1997)
Experimental quantum teleportationNature, 390
ZJ Zhang, Y Li, ZX Man (2005)
Multiparty quantum secret sharingPhys. Rev. A, 71
XH Li, FG Deng, HY Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhys. Rev. A, 74
FL Yan, XQ Zhang (2004)
A scheme for secure direct communication using EPR pairs and teleportationEuro. Phys. J. B, 41
H Lee, J Lim, HJ Yang (2006)
Quantum direct communication with authenticationPhys. Rev. A, 73
CH Bennett, G Brassard, C Crépeau, R Jozsa, A Peres, WK Wootters (1993)
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channelsPhys. Rev. Lett., 70
T Gao, FL Yan, ZX Wang (2005)
Controlled quantum teleportation and secure direct communicationChin. Phys., 14
YH Li, LP Nie (2013)
Bidirectional controlled teleportation by using a five-qubit composite GHZ-Bell stateInt. J. Theor. Phys., 52
A Beige, BG Englert, C Kurtsiefer, H Weinfurter (2002)
Secure communication with a publicly known keyActa. Phys. Pol. A, 101
BL Ye, YM Liu, XS Liu, ZJ Zhang (2013)
Remotely sharing a single-qubit operation with a five-qubit genuine stateChin. Phys. Lett., 30
XW Wang, ZH Peng, CX Jia, YH Wang, XJ Liu (2009)
Scheme for implementing controlled teleportation and dense coding with genuine pentaqubit entangled state in cavity QEDOpt. Commun., 282
BC Ren, HR Wei, M Hua, T Li, FG Deng (2013)
Photonic spatial Bell-state analysis for robust quantum secure direct communication using quantum dot-cavity systemsEuro. Phys. J. D, 67
S Muralidharan, PK Panigrahi (2008)
Quantum information splitting using multipartite cluster statesPhys. Rev. A, 78
SF Huelga, MB Plenio, JA Vaccaro (2002)
Remote control of restricted sets of operations: teleportation of anglesPhys. Rev. A, 65
ZJ Zhang, J Liu, D Wang, SH Shi (2007)
Comment on “Quantum direct communication with authentication”Phys. Rev. A, 75
QN Zhang, CC Li, YH Li, YY Nie (2013)
Quantum secure direct communication based on four-qubit cluster statesInt. J. Theor. Phys., 52
SB Zheng (2004)
Scheme for approximate conditional teleportation of an unknown atomic state without the Bell-state measurementPhys. Rev. A, 69
XW Zha, ZC Zou, JX Qi, HY Song (2013)
Bidirectional quantum controlled teleportation via five-qubit cluster stateInt. J. Theor. Phys., 52
ZJ Zhang, ZX Man (2005)
Multiparty quantum secret sharing of classical messages based on entanglement swappingPhys. Rev. A, 72
PK Panigrahi, S Karumanchi, S Muralidharan (2009)
Minimal classical communication and measurement complexity for quantum information splitting of a two-qubit statePramana, 73
XM Xiu, L Dong, YJ Gao, F Chi (2009)
Quantum secure direct communication using six-particle maximally entangled states and teleportationCommun. Theor. Phys., 51
K Hou, YB Li, SH Shi (2010)
Quantum state sharing with a genuinely entangled five-qubit state and Bell-state measurementsOpt. Commun., 283
QB Ji, YM Liu, XF Yin, XS Liu, ZJ Zhang (2013)
Quantum operation sharing with symmetric and asymmetric W statesQuantum. Inf. Process.
S Jain, S Muralidharan, PK Panigrahi (2009)
Secure quantum conversation through non-destructive discrimination of highly entangled multipartite statesEurophys. Lett., 87
S Lin, QY Wen, F Gao, FC Zhu (2008)
Quantum secure direct communication with $$\chi $$ χ -type entangled statesPhys. Rev. A, 78
J Watrous (2003)
PSPACE has constant-round quantum interactive proof systemsTheor. Comput. Sci., 292
IDK Brown, S Stepney, A Sudbery, SL Braunstein (2005)
Searching for highly entangled multi-qubit statesJ. Phys. A Math. Gen., 38
S Muralidharan, PK Panigrahi (2008)
Perfect teleportation quantum-state sharing and superdense coding through a genuinely entangled five-qubit statePhys. Rev. A, 77
M Riebe (2004)
Deterministic quantum teleportation with atomsNature, 429
ZJ Zhang (2005)
Multiparty quantum secret sharing of secure direct communicationPhys. Lett. A, 342
M Lucamarini, S Mancini (2005)
Secure deterministic communication without entanglementPhys. Rev. Lett., 94
XR Jin, X Ji, YQ Zhang, S Zhang, SK Hong, KH Yeon, CI Um (2006)
Three-party quantum secure direct communication based on GHZ statesPhys. Lett. A, 354
HJ Cao, HS Song (2006)
Quantum secure direct communication scheme using a W state and teleportationPhys. Scr., 74
ZJ Zhang (2006)
Controlled teleportation of an arbitrary n-qubit quantum information using quantum secret sharing of classical messagePhys. Lett. A, 352
A Cerè, M Lucamarini, GD Giuseppe, P Tombesi (2006)
Experimental test of two-way quantum key distribution in the presence of controlled noisePhys. Rev. Lett., 96
DC Liu, YM Liu, XF Yin, XS Liu, ZJ Zhang (2013)
Generalized three-party qubit operation sharingInt. J. Quanum Inf., 11
ZJ Zhang, ZX Man (2005)
Many-agent controlled teleportation of multi-qubit quantum informationPhys. Lett. A, 341
A scheme is presented to implement bidirectional controlled quantum teleportation (QT) by using a five-qubit entangled state as a quantum channel, where Alice may transmit an arbitrary single qubit state called qubit A to Bob and at the same time, Bob may also transmit an arbitrary single qubit state called qubit B to Alice via the control of the supervisor Charlie. Based on our channel, we explicitly show how the bidirectional controlled QT protocol works. By using this bidirectional controlled teleportation, espcially, a bidirectional controlled quantum secure direct communication (QSDC) protocol, i.e., the so-called controlled quantum dialogue, is further investigated. Under the situation of insuring the security of the quantum channel, Alice (Bob) encodes a secret message directly on a sequence of qubit states and transmits them to Bob (Alice) supervised by Charlie. Especially, the qubits carrying the secret message do not need to be transmitted in quantum channel. At last, we show this QSDC scheme may be determinate and secure.
Quantum Information Processing – Springer Journals
Published: Sep 22, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.