Quantum dialogue protocol with four-mode continuous variable GHZ state

2019 ◽  
Vol 33 (05) ◽  
pp. 1950033 ◽  
Author(s):  
Ming-Hui Zhang ◽  
Jin-Ye Peng ◽  
Zheng-Wen Cao

Quantum dialogue can realize the mutual transmission of secret information between two legal users. In most of the existing quantum dialogue protocols, the information carriers applied in quantum dialogue are discrete variable (DV) quantum states. However, there are certain limitations on the preparation and detection of DV quantum states with current techniques. Continuous variable (CV) quantum states can overcome these problems effectively while improving the quantum channel capacity. In this paper, we propose a quantum dialogue protocol with four-mode continuous variable GHZ state. Compared with the existing CV-based quantum dialogue protocols, the protocol allows two users to transmit two groups of secret information with different lengths to each other simultaneously. The channel capacity of the protocol has been improved as each traveling mode carries two- or four-bits of information. In addition, the protocol has been proved to be secure against information leakage problem and some common attacks, such as beam splitter attack and intercept-and-resend attack.

2020 ◽  
Vol 18 (04) ◽  
pp. 2050009 ◽  
Author(s):  
Ashwin Saxena ◽  
Kishore Thapliyal ◽  
Anirban Pathak

A continuous variable (CV) controlled quantum dialogue (QD) scheme is proposed. The scheme is further modified to obtain two other protocols of (CV) secure multiparty computation. The first one of these protocols provides a solution of two-party socialist millionaire problem, while the second protocol provides a solution for a special type of multi-party socialist millionaire problem which can be viewed as a protocol for multiparty quantum private comparison. It is shown that the proposed scheme of (CV) controlled (QD) can be performed using bipartite entanglement and can be reduced to obtain several other two- and three-party cryptographic schemes in the limiting cases. The security of the proposed scheme and its advantage over corresponding discrete variable (DV) counterpart are also discussed. Specifically, the ignorance of an eavesdropper, i.e., information encoded by Alice/Bob, in the proposed scheme is shown to be more than that in the corresponding (DV) scheme, and thus the present scheme is less prone to information leakage inherent with the (DV) (QD) based schemes. It is further established that the proposed scheme can be viewed as a (CV) counterpart of quantum cryptographic switch which allows a supervisor to control the information transferred between the two legitimate parties to a continuously varying degree.


2006 ◽  
Vol 20 (02n03) ◽  
pp. 97-103
Author(s):  
TONG-QIANG SONG

By using the two-mode Einstein–Podolsky–Rosen (EPR) pair eigenstates or the two-mode squeezed vacuum as quantum channel we study the quantum teleportation of any form of single-mode quantum states (which include discrete and continuous variable quantum states). The elegant properties of the EPR pair eigenstates bring much convenience to our discussion.


Entropy ◽  
2019 ◽  
Vol 21 (2) ◽  
pp. 150 ◽  
Author(s):  
Sergey A. Podoshvedov

We propose and develop the theory of quantum teleportation of an unknown qubit based on the interaction mechanism between discrete-variable (DV) and continuous-variable (CV) states on highly transmissive beam splitter (HTBS). This DV-CV interaction mechanism is based on the simultaneous displacement of the DV state on equal in absolute value, but opposite in sign displacement amplitudes by coherent components of the hybrid in such a way that all the information about the displacement amplitudes is lost with subsequent registration of photons in the auxiliary modes. The relative phase of the displaced unknown qubit in the measurement number state basis can vary on opposite, depending on the parity of the basis states in the case of the negative amplitude of displacement that is akin to action of nonlinear effect on the teleported qubit. All measurement outcomes of the quantum teleportation are distinguishable, but the teleported state at Bob’s disposal may acquire a predetermined amplitude-distorting factor. Two methods of getting rid of the factors are considered. The quantum teleportation is considered in various interpretations. A method for increasing the efficiency of quantum teleportation of an unknown qubit is proposed.


Entropy ◽  
2019 ◽  
Vol 21 (9) ◽  
pp. 885
Author(s):  
Khayyam Salehi ◽  
Jaber Karimpour ◽  
Habib Izadkhah ◽  
Ayaz Isazadeh

Programs are under continuous attack for disclosing secret information, and defending against these attacks is becoming increasingly vital. An attractive approach for protection is to measure the amount of secret information that might leak to attackers. A fundamental issue in computing information leakage is that given a program and attackers with various knowledge of the secret information, what is the maximum amount of leakage of the program? This is called channel capacity. In this paper, two notions of capacity are defined for concurrent probabilistic programs using information theory. These definitions consider intermediate leakage and the scheduler effect. These capacities are computed by a constrained nonlinear optimization problem. Therefore, an evolutionary algorithm is proposed to compute the capacities. Single preference voting and dining cryptographers protocols are analyzed as case studies to show how the proposed approach can automatically compute the capacities. The results demonstrate that there are attackers who can learn the whole secret of both the single preference protocol and dining cryptographers protocol. The proposed evolutionary algorithm is a general approach for computing any type of capacity in any kind of program.


2015 ◽  
Vol 29 (05) ◽  
pp. 1550018 ◽  
Author(s):  
Ai-Han Yin ◽  
Zhi-Hui Tang ◽  
Dong Chen

A two-step quantum dialogue scheme is put forward with a class of three-qubit W state and quantum dense coding. Each W state can carry three bits of secret information and the measurement result is encrypted without information leakage. Furthermore, we utilize the entangle properties of W state and decoy photon checking technique to realize three-time channel detection, which can improve the efficiency and security of the scheme.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Filip Rozpędek ◽  
Kyungjoo Noh ◽  
Qian Xu ◽  
Saikat Guha ◽  
Liang Jiang

AbstractWe propose an architecture of quantum-error-correction-based quantum repeaters that combines techniques used in discrete- and continuous-variable quantum information. Specifically, we propose to encode the transmitted qubits in a concatenated code consisting of two levels. On the first level we use a continuous-variable GKP code encoding the qubit in a single bosonic mode. On the second level we use a small discrete-variable code. Such an architecture has two important features. Firstly, errors on each of the two levels are corrected in repeaters of two different types. This enables for achieving performance needed in practical scenarios with a reduced cost with respect to an architecture for which all repeaters are the same. Secondly, the use of continuous-variable GKP code on the lower level generates additional analog information which enhances the error-correcting capabilities of the second-level code such that long-distance communication becomes possible with encodings consisting of only four or seven optical modes.


Author(s):  
Kiran S. Balagani ◽  
Mauro Conti ◽  
Paolo Gasti ◽  
Martin Georgiev ◽  
Tristan Gurtler ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document