Next Article in Journal
Local Fractional Homotopy Perturbation Method for Solving Non-Homogeneous Heat Conduction Equations in Fractal Domains
Next Article in Special Issue
A Tale of Two Entangled InstabilitiesThe Dual Role of δ-O in HgBa2Can-1CunO2(n+1)+δ
Previous Article in Journal
Thermodynamic Analysis of Closed Steady or Cyclic Systems
Previous Article in Special Issue
Self-Similar Solutions of Rényi’s Entropy and the Concavity of Its Entropy Power
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State

1
School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Hefei National Laboratory for Physical Sciences at the Microscale, University of Science and Technology of China, Hefei 230026, China
3
Science and Technology on Communication Security Laboratory, Sichuan 610041, China
*
Author to whom correspondence should be addressed.
Entropy 2015, 17(10), 6743-6752; https://doi.org/10.3390/e17106743
Submission received: 27 March 2015 / Revised: 13 August 2015 / Accepted: 19 August 2015 / Published: 30 September 2015
(This article belongs to the Special Issue Quantum Computation and Information: Multi-Particle Aspects)

Abstract

:
A novel quantum secure direct communication protocol based on four-particle genuine entangled state and quantum dense coding is proposed. In this protocol, the four-particle genuine entangled state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. Finally, the security of the proposed protocol is discussed. During the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by comparing the relationship between the maximal information that the eavesdroppers (Eve) can obtain, and the probability of being detected. Through the analysis we can state that our scheme is feasible and secure.

1. Introduction

Quantum cryptography has been a main field of research in quantum information over the past twenty years. It employs fundamental theories in quantum mechanics to obtain unconditional security. With the rapid development of information technology and quantum physics, quantum cryptography has achieved many significant results.
Researchers have put forward many protocols to continuously improve the safety and efficiency of communication. One of the most famous is the first quantum key distribution (QKD) protocol (BB84 protocol), which was proposed by Bennett and Brassard in 1984 [1]. QKD is an important research direction in quantum cryptography, which is used to share a secret key in communication between the sender (Alice) and the receiver (Bob), afterwards they transfer information by utilizing the generated keys to encode and decode.
Unlike QKD’s need to distribute the key, a large number of protocols are used to transfer the secret information in the communication between the two sides directly, such as quantum secret sharing (QSS) [2,3,4,5,6], deterministic secure quantum communication (DSQC) [7,8,9,10], and quantum secure direct communication (QSDC) [11]. Since Alice and Bob will directly transfer effective information in the channel, the safety requirements of the protocol are higher than QKD. With the continuous study by researchers, there are many efficient QSDC protocols that have been presented in recent years, including protocols without using entanglement [12,13], and protocols using entanglement [14,15,16,17]. In addition, methods using two-way communication and quantum one-time pad are introduced to improve security [18,19,20,21,22].
In this paper, an improved quantum secure direct communication protocol, based on four-particle genuine entangled state (as shown in Equation (2)), is presented, aiming to improve communication security. In the protocol, the four-particle genuine entangled state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. Finally, the security of the proposed protocol is discussed. We analyze the security of the protocol by comparing the relationship between the information that the eavesdroppers can obtain and the probability of being detected. The results showed that our scheme is feasible and secure.
For simplicity, we use the four-particle genuine entangled state protocol (FGEP) to represent the proposed protocol.

2. Description of Protocol

In many quantum secure direct communication protocols, the transmission is managed in batches of EPR pairs. An advantage of the block transmission scheme is that we can check the security of the transmission by measuring some of the decoy photons [23,24,25,26] in the first step, where Alice and Bob each hold a particle sequence, which means that if an eavesdropper has no access to the first particle sequence, then no information will be leaked to her whatever she has done to the second particle sequence. Following this method using block transmission, the FGEP scheme is proposed.
Suppose that the message to be transmitted from Alice to Bob is the sequence x N = ( x 1 , x 2 , ... , x N ) , where x i { 0 , 1 } , i = 1 , 2 , ... , N .
(1)
Bob prepares N pairs of Bell states | ψ + in order and inserts M pairs of four-particle genuine entangled states | G 4 .
| ψ + = | 00 + | 11 2
| G 4 = 1 2 2 ( | 0000 + | 0011 | 0101 + | 0110 + | 1001 + | 1010 + | 1100 | 1111 )
(i) Bob extracts all the first particles in these Bell states, and forms the sequence S A (the travel qubits) in order. The sequence S A is used to transmit a secure message. Then, the remaining particles in the Bell states form the sequence S B (the home qubits) in order.
(ii) Bob forms a sequence S G in order with the M pairs of four-particle genuine entangled states as decoy photons to detect eavesdropping. Note that the sequence S G includes 4 × M qubits.
(iii) Bob inserts S G to sequence S A randomly, forms a new sequence S A ' . Only Bob knows the position of these decoy photons. Then Bob stores particles S B and sends particles S A ' to Alice.
Figure 1 shows this process with concrete examples.
Figure 1. An example of Bob preparing S A ' and sending to Alice.
Figure 1. An example of Bob preparing S A ' and sending to Alice.
Entropy 17 06743 g001
(2)
The detection of eavesdropping.
After Alice receives sequence S A ' , Bob tells her the position where the decoy photons are. Then, Alice extracts the decoy photons from sequence S A ' and performs four-particle genuine entangled state measurement. If there is no eavesdropper, her outcomes are all four-particle genuine entangled state, and they continue to execute the next step. Otherwise, the communication is interrupted, and the FGEP protocol switches to (1).
(3)
Alice encodes her secure message on remaining photons based on dense coding.
Alice extracts all the decoy photons from sequence S A ' and the remaining particles form the series of particles S E . According to the secure message she wants to transmit, Alice chooses one of the four unitary operations U 0 , U 1 , U 2 and U 3 for each of her particles to perform the unitary transformation on particles S E from the series of S E ' . Here, U 0 , U 1 , U 2 and U 3 are Equations (3)–(6). Then, Alice sends the particles S E ' to Bob.
U 0 = I = | 0 0 | + | 1 1 |
U 1 = σ Z = | 0 0 | | 1 1 |
U 2 = σ x = | 1 0 | + | 0 1 |
U 3 = i σ y = | 1 0 | | 0 1 |
(4)
Bob decodes the cipher text with the Bell measurement.
After receiving Alice’s particles, Bob performs the Bell measurement on both particles, S E ' and S B . Then, he can acquire Alice’s secure message.
(5)
The FGEP protocol ends successfully.

3. The Security Analysis of the Protocol

Now, let us analyze the efficiency of the eavesdropping detection in the FGEP protocol. In order to gain the information that Alice encoded on the travel qubits, Eve, first, performs unitary attack operation E ^ on the composed system. Then, Alice takes a coding operation on the travel qubits. Eve finally performs a measurement on the composed system. Since Eve does not know which particles are used to detect eavesdropping, she can only perform the same attack operation on all the particles. With respect to Eve, the state of the travel qubits is indistinguishable from the complete mixture, thus, all the travel qubits are considered in either of the states | 0 or | 1 with equal probabilities p = 0.5 .
Generally speaking, after performing attack operation E ^ , the states | 0 and | 1 become:
| ψ 0 ' = E ^ | 0 x = α | 0 x 0 + β | 1 x 1
| ψ 1 ' = E ^ | 1 x = m | 0 y 0 + n | 1 y 1
where | x i and | y i are the pure ancillary states determined uniquely by E ^ . Since E ^ must be unitary, we can know | α | 2 + | m | 2 = 1 , | β | 2 + | n | 2 = 1 and α β + n m = 1 , then we can get | α | 2 = | n | 2 , | β | 2 = | m | 2 [11].
First, suppose the obtained particles by Alice are | 0 , and Eva’s system can be described by | ψ 0 ' . The corresponding density matrix of the system can be expressed as ρ = | ψ 0 ' ψ 0 ' | . With the orthogonal basis { | 0 x 0 , | 1 x 1 , | 0 y 0 , | 1 y 1 } , the state ρ can be rewritten as:
ρ = ( | α | 2 0 0 α β 0 0 0 0 0 0 0 0 α β 0 0 | β | 2 )
Alice encodes her message by performing the unitary operations U 0 , U 1 , U 2 and U 3 with the probabilities p 0 , p 1 , p 2 and p 3 , and p 0 + p 1 + p 2 + p 3 = 1 . After Alice’s encoding operation, the state ρ becomes ρ ' :
ρ ' = p 0 U 0 ρ U 0 + p 0 U 0 ρ U 0 + p 0 U 0 ρ U 0 + p 0 U 0 ρ U 0 = ( ( p 0 + p 1 ) | α | 2 ( p 0 p 1 ) α β 0 0 ( p 0 p 1 ) α β ( p 0 + p 1 ) | β | 2 0 0 0 0 ( p 2 + p 3 ) | α | 2 ( p 2 p 3 ) α β 0 0 ( p 2 p 3 ) α β ( p 2 + p 3 ) | β | 2 )
According to the theory of Von-Neumann entropy, the maximal amount of information I 0 extracted from this state can be expressed as I 0 = S ( ρ ' ) = T r ( ρ ' log 2 ρ ' ) .
Because of the existence of a large number of particles, we can suppose p 0 = p 1 = p 2 = p 3 = 1 / 4 . By solving the det ( ρ ' λ ) we can get the eigenvalues of ρ ' that are:
λ 0 = λ 1 = 1 2 | α | 2 , λ 2 = λ 3 = 1 2 | β | 2 .
Thus the maximal information can be rewritten.
I 0 = i = 0 3 λ i log 2 λ i
Suppose | α | 2 = a , | β | 2 = b , | m | 2 = s , | n | 2 = t . From the front analysis, we can get a = | α | 2 = | n | 2 = t , b = | β | 2 = | m | 2 = s and a + b = 1 . Thus, the maximal amount of information contained in qubit | 0 is expressed as
I 0 = ( a 2 log 2 a 2 + b 2 log 2 b 2 + a 2 log 2 a 2 + b 2 log 2 b 2 ) = ( a log 2 a 2 + ( 1 a ) log 2 ( 1 a ) 2 )
As above, the maximum amount of information contained in qubit | 1 is expressed as:
I 0 = ( t log 2 t 2 + ( 1 t ) log 2 ( 1 t ) 2 )
Assuming that the probability of | 0 , | 1 being sent by Alice is one half, respectively, finally, Eve can gain the maximal information I .
I = 1 2 ( I 0 + I 1 ) = I 0 = ( a log 2 a 2 + ( 1 a ) log 2 ( 1 a ) 2 )
The above analysis obtained the maximal information that Eve can obtain. Next, let us analyze the probability of Eve being detected. As Eve does not know which particles are the decoy photons, she performs the same attack operation on all particles. After Eve’s attack, the state of the decoy photons becomes | G 4 E v e .
| G 4 E v e = E ^ E ^ E ^ E ^ [ 1 2 2 ( | 0 x 0 x 0 x 0 x + | 0 x 0 x 1 x 1 x | 0 x 1 x 0 x 1 x + | 0 x 1 x 1 x 0 x + | 1 x 0 x 0 x 1 x + | 1 x 0 x 1 x 0 x + | 1 x 1 x 0 x 0 x | 1 x 1 x 1 x 1 x ) ]
When Alice received sequence S A ' , she extracts the decoy photons and performs the four-particle genuine entangled state measurement. Assuming the number of decoy photons M equals to one, and the probability p | G 4 that Alice gets the four-particle genuine entangled state is the probability that the channel is safe. By solution formula | G 4 E v e we can get:
p | G 4 = 1 8 ( a 4 + b 4 + s 4 + t 4 + 6 a 2 b 2 + 6 a 2 s 2 + 6 a 2 t 2 + 24 a b s t + 6 b 2 s 2 + 6 b 2 t 2 + 6 s 2 t 2 )
Due to a = t , b = s and a + b = 1 , we get the following relations:
p | G 4 = 1 8 ( 8 a 4 + 8 b 4 + 48 a 2 b 2 ) = 8 a 4 16 a 3 + 12 a 2 4 a + 1
Thus, the probability p E v e that Eve can be detected can be expressed as:
p E v e = 1 p | G 4 = 8 a 4 + 16 a 3 12 a 2 + 4 a
From Equations (15) and (19), we can get the relationship between the maximal information that Eve can obtain and the probability that Eve can be detected. In order to observe the effect of the protocol, we compare the results of our protocol to Reference [23], which is one of the most famous QSDCs (Figure 2). As shown in Figure 2, the solid line expresses the effect in FGEP and the dotted line expresses the effect in Reference [23]. Obviously, if Eve wants to get the same amount of information, she must face a larger detection probability in FGEP. This can indicates that FGEP is secure. It is worth noting that this result is only in the case where M equals one.
Then, we consider the case where M is greater than one. In this case, the only chance that Eve gets the information and is not detected is if Alice measures each group of decoy photons and all are in the four-particle genuine entangled state. Thus, the probability p M E v e that Eve can be detected can be expressed as:
p M E v e = 1 ( p | G 4 ) M = 1 ( 8 a 4 16 a 3 + 12 a 2 4 a + 1 ) M
We can see from Figure 3 that if the number of decoy photons increases, the result will be better. When M is 10 and I taken to 1.5, the detection probability is P = 0.977 . This means that it is hard for Eve to get the information without being detected.
Figure 2. The comparison of the two detection results. The solid line expresses the effect in FGEP and the dotted line expresses the effect in Reference [23]. In the figure above, horizontal coordinates indicate the probability P that Eve can be detected, and vertical coordinates indicate the maximal information I that Eve can obtain.
Figure 2. The comparison of the two detection results. The solid line expresses the effect in FGEP and the dotted line expresses the effect in Reference [23]. In the figure above, horizontal coordinates indicate the probability P that Eve can be detected, and vertical coordinates indicate the maximal information I that Eve can obtain.
Entropy 17 06743 g002
Figure 3. The relationship between the maximal information I that Eve can obtain, and the probability P that Eve can be detected and the number of decoy photons M .
Figure 3. The relationship between the maximal information I that Eve can obtain, and the probability P that Eve can be detected and the number of decoy photons M .
Entropy 17 06743 g003

4. Conclusions

Compared to other quantum secure direct communication protocols, FGEP has the following differences:
(i)
The eavesdropping detection method using the four-particle genuine entangled state as decoy photons in the FGEP protocol is similar to the method using the control mode [23].
(ii)
In the FGEP protocol, the Bell states are prepared by Bob rather than by Alice. This guarantees that the home qubits could not leak to Eve, and the Bell states that carries the secure message can be reused.
(iii)
The FGEP protocol is based on the four-particle genuine entangled state, which can reduce the times of detection.
In summary, an eavesdropping detection strategy based on four-particle genuine entangled state in quantum direct communication protocol has been introduced, and the results are analyzed quantitatively by comparing the relationship between the information that the eavesdroppers can obtain and the probability of being detected.
In the analysis, if the eavesdropper obtains the same amount of information, she must face a larger detection probability in FGEP, which shows that the efficiency of eavesdropping detection in FGEP is relatively high. Through analysis we can also know that the security of our protocol will be greatly improved by increasing the number of decoy photons. In order to obtain enough security required for quantum secure direct communication, Bob only needs to increase by a small amount of decoy photons. This fully shows that our protocol is secure and feasible.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant No. 61472048, No. 61402058, No. 61472046, No. 61202082, No. 61370194), the Beijing Natural Science Foundation (4152038), the China Postdoctoral Science Foundation funded project No. 2014M561826.

Author Contributions

Jian Li, Zeshi Pan, Fengqi Sun, Yanhua Chen, Zheng Wang and Zuozhi Shi proposed the main idea and analyzed the data. Zeshi Pan wrote the manuscript. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Computer Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
  2. Deng, F.G.; Li, X.H.; Zhou, H.Y.; Zhang, Z.-J. Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 2005, 72. [Google Scholar] [CrossRef]
  3. Song, T.T.; Wen, Q.Y.; Gao, F.; Chen, H. Participant attack and improvement to multiparty quantum secret sharing based on GHZ states. Int. J. Theor. Phys. 2013, 52, 293–301. [Google Scholar] [CrossRef]
  4. Adhikari, S.; Roy, S.; Chakraborty, S.; Chakraborty, S.; Jagadish, V.; Haris, M.K.; Kumar, A. Controlled secret sharing protocol using a quantum cloning circuit. Quantum Inf. Process. 2014, 13, 2071–2080. [Google Scholar] [CrossRef]
  5. Liao, C.H.; Yang, C.W.; Hwang, T. Dynamic quantum secret sharing protocol based on GHZ state. Quantum Inf. Process. 2014, 13, 1907–1916. [Google Scholar] [CrossRef]
  6. Wu, Y.; Cai, R.; He, G.; Zhang, J. Quantum secret sharing with continuous variable graph state. Quantum Inf. Process. 2014, 13, 1085–1102. [Google Scholar] [CrossRef]
  7. Wang, C.; Liu, J.-W.; Liu, X.; Shang, T. A Novel Deterministic Secure Quantum Communication Scheme with Einstein—Podolsky—Rosen Pairs and Single Photons. Commun. Theor. Phys. 2013, 60. [Google Scholar] [CrossRef]
  8. Kao, S.H.; Tsai, C.W.; Hwang, T. Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication. Int. J. Theor. Phys. 2012, 51, 3868–3875. [Google Scholar] [CrossRef]
  9. Huang, W.; Wen, Q.Y.; Liu, B.; Gao, F.; Chen, H. Deterministic secure quantum communication with collective detection using single photons. Int. J. Theor. Phys. 2012, 51, 2787–2797. [Google Scholar] [CrossRef]
  10. Yuan, H.; Zhang, Q.; Hong, L.; Yin, W.-J.; Xu, D.; Zhou, J. Scheme for Deterministic Secure Quantum Communication with Three-qubit GHZ State. Int. J. Theor. Phys. 2014, 53, 2558–2564. [Google Scholar] [CrossRef]
  11. Deng, F.G.; Long, G.L.; Liu, X.S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 2003, 68. [Google Scholar] [CrossRef]
  12. Stefano, L.M.M. Secure Deterministic Communication without Entanglement. Phys. Rev. Lett 2005. [Google Scholar] [CrossRef]
  13. Lucamarini, M.; Mancini, S. Secure deterministic communication without entanglement. Phys. Rev. Lett. 2005, 94. [Google Scholar] [CrossRef]
  14. Li, W.; Chen, J.; Wang, X.; Li, C. Quantum Secure Direct Communication Achieved by Using Multi-Entanglement. Int. J. Theor. Phys. 2014, 54, 100–105. [Google Scholar] [CrossRef]
  15. Yan, C.; Zhang, S.-B.; Yan, L.-L.; Sheng, Z.-W. A multiparty controlled bidirectional quantum secure direct communication and authentication protocol based on EPR pairs. Chin. Phys. Lett. 2013, 30. [Google Scholar] [CrossRef]
  16. Li, J.; Jin, H.F.; Jing, B. Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol. Chin. Sci. Bull. 2012, 57, 4434–4441. [Google Scholar] [CrossRef]
  17. Deng, F.G.; Li, X.H.; Li, C.Y.; Zhou, P.; Zhou, H.Y. Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs. Phys. Lett. A 2006, 359, 359–365. [Google Scholar] [CrossRef]
  18. Hwang, T.; Li, C.M; Lee, N.Y. Secure direct communication using deterministic BB84 protocol. Int. J. Mod. Phys. C 2008, 19, 625–635. [Google Scholar] [CrossRef]
  19. Bin, G.; Yu-Gai, H.; Xia, F.; Yi, Z.C. A two-step quantum secure direct communication protocol with hyperentanglement. Chin. Phys. B 2011, 20. [Google Scholar] [CrossRef]
  20. Chang, Y.; Xu, C.; Zhang, S.; Yan, L. Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Chin. Sci. Bull. 2014, 59, 2541–2546. [Google Scholar] [CrossRef]
  21. Du, R.; Sun, Z.; Wang, B.; Long, D. Quantum secret sharing of secure direct communication using one-time pad. Int. J. Theor. Phys. 2012, 51, 2727–2736. [Google Scholar] [CrossRef]
  22. Gu, B.; Zhang, C.Y.; Cheng, G.S.; Huang, Y.G. Robust quantum secure direct communication with a quantum one-time pad over a collective-noise channel. Sci. China Phys. Mech. Astron. 2011, 54, 942–947. [Google Scholar] [CrossRef]
  23. Boström, K.; Felbinger, T. Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 2002, 89. [Google Scholar] [CrossRef]
  24. Gu, B.; Xu, F.; Ding, L.; Zhang, Y. High-capacity three-party quantum secret sharing with hyperentanglement. Int. J. Theor. Phys. 2012, 51, 3559–3566. [Google Scholar] [CrossRef]
  25. Chang, Y.; Zhang, S.B.; Li, J.; Yan, L.L. Robust EPR-pairs-based quantum secure communication with authentication resisting collective noise. Sci. China Phys. Mech. Astron. 2014, 57, 1907–1912. [Google Scholar] [CrossRef]
  26. Wang, T.Y.; Cai, X.Q. An Efficient Quantum Secret Sharing Scheme with Decoy States. Int. J. Mod. Phys. B 2012, 26. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

Li, J.; Pan, Z.; Sun, F.; Chen, Y.; Wang, Z.; Shi, Z. Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State. Entropy 2015, 17, 6743-6752. https://doi.org/10.3390/e17106743

AMA Style

Li J, Pan Z, Sun F, Chen Y, Wang Z, Shi Z. Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State. Entropy. 2015; 17(10):6743-6752. https://doi.org/10.3390/e17106743

Chicago/Turabian Style

Li, Jian, Zeshi Pan, Fengqi Sun, Yanhua Chen, Zheng Wang, and Zuozhi Shi. 2015. "Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State" Entropy 17, no. 10: 6743-6752. https://doi.org/10.3390/e17106743

Article Metrics

Back to TopTop