Secure Information Exchange Without Prior Key Distribution via Single-photon Hyperstates

Author affiliations

Authors

  • Nguyen Ba An \(^1\)Thang Long Institute of Mathematics and Applied Sciences, Thang Long University, Nghiem Xuan Yem, Hoang Mai, Hanoi
    \(^2\)Center for Theoretical Physics, Institute of Physics, Vietnam Academy of Science and Technology, 18 Hoang Quoc Viet, Hanoi
    https://orcid.org/0000-0002-6802-0388

DOI:

https://doi.org/10.15625/0868-3166/17064

Keywords:

Secure information exchange, information leakage, single-photon hyperstates

Abstract

Methods for two distant parties to exchange their secret messages using single photons are considered. There existed several such methods but they are either insecure or face with information leakage problem. Recently, Ye et al. [Quantum Inf. Process. 20 (2021) 209] have reported a method using single photons in both polarization and spatial degrees of freedom that is both efficient and resistant from information leakage. However, this method is not so feasible as it has specific limitations, namely, it requires availability of quantum memory and high classical communication cost. We propose in this paper a new method to overcome the above-said limitations. Our method is also efficient because we also use single photons in two degrees of freedom. However, the encoding operation in our method is modified so that no quantum memory is demanded at all and the execution of our method is simpler compared to the method of Ye et al. Moreover, the cost of classical communication in our method is 50\% cheaper than that in the method of Ye et al. Therefore, our method proves to be feasible, simple and economical that could be realized by means of current technologies.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

E. Schr¨odinger, Mathematical Proceedings of the Cambridge Philosophical Society 31 (1935) 555.

C. Bennett and S. Wiesner, Phys. Rev. Lett. 69 (1992) 2881.

C. H. Bennett, G. Brassard, C. Cr´epeau, R. Jozsa, A. Peres and K. W. Wootters, Phys. Rev. Lett. 70 (1993) 1895.

C. H. Bennett, D. P. DiVincenzo, P. W. Shor, J. A. Smolin, B. M. Terhal and W. K. Wootters, Phys. Rev. Lett. 87 (2001) 077902.

B. A. Nguyen and J. Kim, J. Phys. B: At. Mol. Opt. Phys. 41 (2008) 095501.

P. W. Shor, Proceedings 35th Annual Symposium on Foundations of Computer Science. IEEE Comput. Soc. Press., 1994, pp. 124 - 34.

A. R. Calderbank, E.M. Rains, P. W. Shor and N.J. A. Sloane, IEEE Transactions on Information Theory 44 (1998) 1369.

A. Ekert, Phys. Rev. Lett. 67 (1991) 661.

C. H. Bennett and G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing 175 (1984) 8.

M. Hillery, V. Buˇzek, and A. Berthiaume, Phys. Rev. A 59 (1999) 1829.

G. P. Guo and G. C. Guo, Phys. Lett. A 310 (203) 247.

B. A. Nguyen, Phys. Lett. A 328 (2004) 6.

B. A. Nguyen, J. Kor. Phys. Soc. 47 (2005) 562.

Y. Chen, Z. X. Man and Y.J. Xia, Chinese Phys. Lett. 24 (2007) 19.

D. Liu, J. L. Chen and W.Jiang, Int. J. Theor. Phys. 51 (2012) 2923.

F. Gao, F. Z. Guo, Q. Y. Wen and F. C. Zhu, Sci. China Ser. G: Phys, Mech. and Astr. 51 (2008) 559.

Y. G. Tan and Q. Y. Cai Q. Y. Int. J. Quant. Inf. 6 (2008) 325.

N. R. Zhou, T. X. Hua, G. T. Wu, C. S. He and Y. Zhang, Int. J. Theor. Phys. 53 (2014) 3829.

Downloads

Published

08-05-2022

How to Cite

[1]
N. B. An, “Secure Information Exchange Without Prior Key Distribution via Single-photon Hyperstates”, Comm. Phys., vol. 32, no. 3, p. 223, May 2022.

Issue

Section

Papers
Received 12-04-2022
Accepted 29-04-2022
Published 08-05-2022