Book ChapterDOI
Multi-parties Quantum Secure Direct Communication with Authentication
Ahmed Farouk,O. Tarawneh,Mohamed Elhoseny,Josep Batle,Mosayeb Naseri,Aboul Ella Hassanien,M. Abedl-Aty +6 more
- pp 143-184
Reads0
Chats0
TLDR
The security analysis of authentication and communication processes against many types of attacks proved that the attacker can’t gain any information during intercepting either authentication or communication processes.Abstract:
In this chapter, a generalized architecture of quantum secure direct communication for N disjoint users with partial and full cooperation of quantum server is proposed. So, \( N - 1 \) disjointed users \( u_{1},\, u_{2},\, \ldots,\, u_{N - 1} \) can transmit a secret message of classical bits to a remote user \( u_{N} \) by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and users validated by \( EPR \) entangled pair and \( CNOT \) gate. Afterward, the remaining \( EPR \) will be intended for generating shared \( GHZ \) states which used for directly transmitting the secret message. The partial cooperation process involved that \( N - 1 \) users can transmit a secret message directly to a remote user \( u_{N} \) through quantum channel. Furthermore, \( N - 1 \) users and a remote user \( u_{N} \) can communicate without an established quantum channel among them by full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker can’t gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among \( N \) users is ensured as the attacker introducing an error probability irrespective of the sequence of measurement.read more
Citations
More filters
Journal ArticleDOI
Improved Dynamic Multi-Party Quantum Private Comparison for Next-Generation Mobile Network
Hussein Abulkasim,Hanan Alsuqaih,Walaa Hamdan,Safwat Hamad,Ahmed Farouk,Atefeh Mashatan,Shohini Ghose +6 more
TL;DR: The security analysis of the suggested improvement proved that the modified protocol is secure against both the internal and external attacks, which could be used to control the various auction models for 5G services as wireless network virtualization in a secure way.
Journal ArticleDOI
Improving the security of multi-party quantum key agreement with five-qubit Brown states
TL;DR: The security of Cai et al.
References
More filters
Book
Quantum Computation and Quantum Information
TL;DR: In this article, the quantum Fourier transform and its application in quantum information theory is discussed, and distance measures for quantum information are defined. And quantum error-correction and entropy and information are discussed.
Quantum Computation and Quantum Information
TL;DR: This chapter discusses quantum information theory, public-key cryptography and the RSA cryptosystem, and the proof of Lieb's theorem.
Journal ArticleDOI
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
Charles H. Bennett,Gilles Brassard,Claude Crépeau,Richard Jozsa,Asher Peres,William K. Wootters +5 more
TL;DR: An unknown quantum state \ensuremath{\Vert}\ensure Math{\varphi}〉 can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical Einstein-Podolsky-Rosen (EPR) correlations.
Journal ArticleDOI
Quantum Cryptography
TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.