scispace - formally typeset
Book ChapterDOI

Multi-parties Quantum Secure Direct Communication with Authentication

Reads0
Chats0
TLDR
The security analysis of authentication and communication processes against many types of attacks proved that the attacker can’t gain any information during intercepting either authentication or communication processes.
Abstract
In this chapter, a generalized architecture of quantum secure direct communication for N disjoint users with partial and full cooperation of quantum server is proposed. So, \( N - 1 \) disjointed users \( u_{1},\, u_{2},\, \ldots,\, u_{N - 1} \) can transmit a secret message of classical bits to a remote user \( u_{N} \) by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and users validated by \( EPR \) entangled pair and \( CNOT \) gate. Afterward, the remaining \( EPR \) will be intended for generating shared \( GHZ \) states which used for directly transmitting the secret message. The partial cooperation process involved that \( N - 1 \) users can transmit a secret message directly to a remote user \( u_{N} \) through quantum channel. Furthermore, \( N - 1 \) users and a remote user \( u_{N} \) can communicate without an established quantum channel among them by full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker can’t gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among \( N \) users is ensured as the attacker introducing an error probability irrespective of the sequence of measurement.

read more

Citations
More filters
Journal ArticleDOI

Improved Dynamic Multi-Party Quantum Private Comparison for Next-Generation Mobile Network

TL;DR: The security analysis of the suggested improvement proved that the modified protocol is secure against both the internal and external attacks, which could be used to control the various auction models for 5G services as wireless network virtualization in a secure way.
References
More filters
Book

Quantum Computation and Quantum Information

TL;DR: In this article, the quantum Fourier transform and its application in quantum information theory is discussed, and distance measures for quantum information are defined. And quantum error-correction and entropy and information are discussed.

Quantum Computation and Quantum Information

TL;DR: This chapter discusses quantum information theory, public-key cryptography and the RSA cryptosystem, and the proof of Lieb's theorem.
Journal ArticleDOI

Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels

TL;DR: An unknown quantum state \ensuremath{\Vert}\ensure Math{\varphi}〉 can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical Einstein-Podolsky-Rosen (EPR) correlations.
Journal ArticleDOI

Quantum Cryptography

TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.
Related Papers (5)