• Chinese Journal of Quantum Electronics
  • Vol. 23, Issue 4, 441 (2006)
Yu LIU*, Ren-fei LIU, Ning LI, and Chang-qiang WANG
Author Affiliations
  • [in Chinese]
  • show less
    DOI: Cite this Article
    LIU Yu, LIU Ren-fei, LI Ning, WANG Chang-qiang. Direct deterministic communication on quantum channel[J]. Chinese Journal of Quantum Electronics, 2006, 23(4): 441 Copy Citation Text show less
    References

    [1] Wiesner S. Conjugate coding(Original Manuscript 1969)[J].Sigact News,1983,15: 78-88.

    [2] Gisin N,Ribordy G,Tittel W,et al. Quantum cryptography [J].Rev. Mod. Phys.,2002,74: 145-195.

    [3] Bost m K,Felbinger T. Deterministic secure direct communication using entanglement [J].Phys. Rev. Lett.,2002,89(18): 187902.

    [4] Brassard G,Lüttkenhaus N,Mor T,Sanders B C. Limitations on practical quantum cryptography [J].Phys. Rev. Lett.,2000,85(6): 1330-1333.

    [5] Bennett C H,Brassard G. in Proceeding of the IEEE International Conference on Computers,Systems,and Signal Processing [M].Bangalore,1984.175-179.

    [6] Cai Qingyu,Li Baiwen. Improving the capacity of the Bostr m-Felbinger protocol [J].Phys. Rev. A,2004,69: 054301.

    [7] Cai Qingyu. Deterministic secure direct communication using Ping-pong protocol without public channel [OL].e-print quant-ph/0301048.

    [8] Cai Qingyu. The “Ping-pong” protocol can be attacked without eavesdropping [J].Phys. Rev. Lett.,2003,91(10): 109801.

    [9] Cai Qingyu. An one-time-pad key communication protocol with entanglement [OL].e-print quant-ph/0309108.

    [10] Hua LV,Cai Qingyu. N-Partner secure direct communication based on quantum nonlocality [OL].e-print quantph/0401078.

    [11] Gao Ting,Yan Fengli,Wang Zhixi. Controlled quantum teleportation and secure direct communication [J].Chinese Phys.,2005,14: 893-897.

    [12] Cai Qingyu,Li Baiwen. Deterministic secure communication without using entanglement [J].Chin. Phys. Lett.,2004,21(4): 601-603.

    [13] Lo H K,Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J].Science,1999,283: 2050-2056.

    [14] Shor P W,Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J].Phys. Rev. Lett.,2000,85(2): 441-444.

    [15] Mayers D. Shor and Preskill's and Mayers's security proof for the BB84 quantum key distribution protocol [J].Eur. Phys. J. D,2002,18: 161-170.

    [16] Lutkenhaus N. Security against individual attacks for realistic quantum key distribution [J].Phys,Rev. A,2000,61(5): 052304.

    [17] Deng F G,Long G L. Secure direct communication with a quantum one-time pad [J].Phys. Rev. A,2004,69: 052319.

    [18] Bennett C H. Quantum cryptography using any two nonorthogonal states [J].Phys. Rev. Lett.,1992,68(21): 3121-3124.

    [19] Zhang Z J,Man Z X. Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations [OL].e-print quant-ph/0403218.

    [20] Zhang Z J,Man Z X. Secure bidirectional communication protocol without quantum channel [OL].e-print quantph/0403217.

    [21] Xue Peng,Guo Guangcan. Secure direct communication using the ‘olarization’ entangled atomic ensembles[J].J. Phys. B: At. Mol. Opt. Phys.,2004,37: 711-722.

    [22] Xue Peng,et al. Entanglement preparation and quantum communication with atoms in optical cavities [J].Phys. Rev. A,2004,69: 052318.

    [24] Wójcik A. Eavesdropping on the “Ping-pong” quantum communication protocol [J].Phys. Rev. Lett.,2003,90(15): 157901.

    LIU Yu, LIU Ren-fei, LI Ning, WANG Chang-qiang. Direct deterministic communication on quantum channel[J]. Chinese Journal of Quantum Electronics, 2006, 23(4): 441
    Download Citation