Deterministic secure direct communication using entanglement.

@article{Bostrm2002DeterministicSD,
  title={Deterministic secure direct communication using entanglement.},
  author={Kim Joris Bostr{\"o}m and Timo Felbinger},
  journal={Physical review letters},
  year={2002},
  volume={89 18},
  pages={
          187902
        }
}
A novel secure communication protocol is presented, based on an entangled pair of qubits and allowing asymptotically secure key distribution and quasisecure direct communication. Since the information is transferred in a deterministic manner, no qubits have to be discarded. The transmission of information is instantaneous, i.e., the information can be decoded during the transmission. The security against arbitrary eavesdropping attacks is provided. In case of eavesdropping attacks with full… 

Figures from this paper

Quasi-Deterministic Secure Quantum Communication Using Non-maximally Entangled States
TLDR
A novel quasi-deterministic secure quantum communication scheme using non-maximally entangled states is proposed, and cases where the entanglement required can be significantly reduced to carry out the protocol successfully are discussed.
Quantum Secure Direct Communication Based on Secret Initial States of EPR Pairs
This paper proposes the protocol of Quantum Secure Direct Communization (QSDC) based on the secret initial Bell states which are shared by two legitimate communicators. Then, we analyze the security
QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM IDENTIFICATION
TLDR
A one-way quantum secure direct communication protocol with quantum identification utilizing two-photon three-qubit linear cluster states that achieves a high efficiency and source capacity since more qubits can be encoded on the same photon.
Security of the quantum direct communication based on pairs of completely entangled qudits
TLDR
A general method of calculation of the eavesdropped information as a function of the attack detection probability is presented and applied to the ping-pong protocol based on completely entangled pairs of qudits.
Cryptanalysis of Controlled Bidirectional Quantum Secure Direct Communication Network Using Classical XOR Operation and Quantum Entanglement
TLDR
The security of the proposed controlled bidirectional quantum secure direct communication protocol with cluster states is found to be insecure and a feasible improvement is given.
Authenticated Deterministic Secure Quantum Communication Based on Entanglement Swapping
In this paper, an authenticated deterministic secure quantum communication protocol based on entanglement swapping is presented. The users' identity will be authenticated, and only legitimate users
SECURE DETERMINISTIC BIDIRECTIONAL COMMUNICATION WITHOUT ENTANGLEMENT
TLDR
A new secure deterministic bidirectional communication protocol without using entanglement is proposed, which two legitimate users can simultaneously exchange their different secret messages in a direct way with a set of communication devices.
Design and Simulation of a Deterministic Quantum Secure Direct Communication and Authentication Protocol Based on Three-Particle Asymmetric Entangled State
In order to improve eavesdropping detection efficiency, we propose a quantum secure direct communication and authentication protocol based on three-particle asymmetric entangled state and design an
Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State
TLDR
During the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by comparing the relationship between the maximal information that the eavesdroppers can obtain, and the probability of being detected.
Secure Direct Communication Based on Non-Orthogonal Entangled Pairs and Local Measurement
TLDR
This work proposes a quantum secure direct communication scheme based on non-orthogonal entangled pairs and local measurement that can availably prohibit from all kinds of valid eavesdropping and acquire a secure quantum channel.
...
...