Access the full text.
Sign up today, get DeepDyve free for 14 days.
Gan Gao (2010)
Two quantum dialogue protocols without information leakageOptics Communications, 283
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
FG Deng, GL Long (2004)
Secure direct communication with a quantum one-time padPhys. Rev. A, 69
Z. Man, Y. Xia, Zhan-jun Zhang (2006)
SECURE DETERMINISTIC BIDIRECTIONAL COMMUNICATION WITHOUT ENTANGLEMENTInternational Journal of Quantum Information, 04
N. An (2004)
Quantum dialogue
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
A. Cabello (2000)
Quantum key distribution in the Holevo limit.Physical review letters, 85 26 Pt 1
Q. Cai (2005)
Eavesdropping on the two-way quantum communication protocols with invisible photonsPhysics Letters A, 351
D. Mayers (2002)
Shor and Preskill's and Mayers's security proof for the BB84 quantum key distribution protocolThe European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics, 18
Arti Chamoli, C. Bhandari (2007)
Secure direct communication based on ping–pong protocolQuantum Information Processing, 8
Yu-Guang Yang, Qiao-yan Wen (2007)
Quasi-secure quantum dialogue using single photonsScience China-physics Mechanics & Astronomy, 50
满忠晓, 张战军, 李勇 (2005)
Quantum Dialogue Revisited, 22
H. Lo, H. Chau (1998)
Unconditional security of quantum key distribution over arbitrarily long distancesScience, 283 5410
G. Long, X. Liu (2000)
Theoretically efficient high-capacity quantum-key-distribution schemePhysical Review A, 65
Y.G. Yang, Y.W. Teng (2011)
Revisiting the security of secure direct communication based on ping-pong protocol [Quantum InfQuantum Inf. Process., 10
Guo-fang Shi, X. Xi, Ming‐Liang Hu, R. Yue (2010)
Quantum secure dialogue by using single photonsOptics Communications, 283
Fuguo Deng, P. Zhou, Xihan Li, Chun-Yan Li, Hong-Yu Zhou (2005)
Robustness of two-way quantum communication protocols against Trojan horse attackarXiv: Quantum Physics
Guo-fang Shi, X. Xi, X. Tian, R. Yue (2009)
Bidirectional quantum secure communication based on a shared private Bell stateOptics Communications, 282
Hoi-Kwong Lo, Yi Zhao (1995)
Quantum Cryptography
Fengli Yan, Xiaoqiang Zhang (2003)
A scheme for secure direct communication using EPR pairs and teleportationThe European Physical Journal B - Condensed Matter and Complex Systems, 41
Guo-fang Shi (2010)
Bidirectional quantum secure communication scheme based on Bell states and auxiliary particlesOptics Communications, 283
F. Gao, F. Guo, Q. Wen, F. Zhu (2008)
Revisiting the security of quantum dialogue and bidirectional quantum secure direct communicationScience in China Series G: Physics, Mechanics and Astronomy, 51
Yuguang Yang, Yi-Wei Teng, Hai-Ping Chai, Q. Wen (2011)
Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]Quantum Information Processing, 10
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
H. Hoffmann, K. Bostroem, T. Felbinger (2004)
Comment on 'Secure direct communication with a quantum one-time pad'Physical Review A, 72
Marco Lucamarini, S. Mancini (2004)
Secure deterministic communication without entanglement.Physical review letters, 94 14
Almut Beige, B. Englert, C. Kurtsiefer, H. Weinfurter (2001)
Secure Communication with a Publicly Known KeyActa Physica Polonica A, 101
Fuguo Deng, Xihan Li, Chun-Yan Li, P. Zhou, Hong-Yu Zhou (2005)
Quantum secure direct communication network with Einstein–Podolsky–Rosen pairsPhysics Letters A, 359
Charles Bennett, G. Brassard, N. Mermin (1992)
Quantum cryptography without Bell's theorem.Physical review letters, 68 5
Yazhen Wang (2012)
Quantum Computation and Quantum InformationStatistical Science, 27
Yong-gang Tan, Q. Cai (2008)
Classical correlation in quantum dialogueInternational Journal of Quantum Information, 06
An efficient bidirectional quantum secure communication protocol is proposed with two-photon entanglement. Compared with the previous protocol proposed by Shi et al., our protocol can achieve higher efficiency. Meanwhile, for the same length secret messages, only half of entangled photon pairs need to be prepared in our protocol. And the number of classical bits in public classical communication is also a half of that in the previous protocol. Moreover, the information leakage does not exist in our scheme.
Quantum Information Processing – Springer Journals
Published: May 16, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.