Secure Information Exchange Without Prior Key Distribution via Single-photon Hyperstates
Author affiliations
DOI:
https://doi.org/10.15625/0868-3166/17064Keywords:
Secure information exchange, information leakage, single-photon hyperstatesAbstract
Methods for two distant parties to exchange their secret messages using single photons are considered. There existed several such methods but they are either insecure or face with information leakage problem. Recently, Ye et al. [Quantum Inf. Process. 20 (2021) 209] have reported a method using single photons in both polarization and spatial degrees of freedom that is both efficient and resistant from information leakage. However, this method is not so feasible as it has specific limitations, namely, it requires availability of quantum memory and high classical communication cost. We propose in this paper a new method to overcome the above-said limitations. Our method is also efficient because we also use single photons in two degrees of freedom. However, the encoding operation in our method is modified so that no quantum memory is demanded at all and the execution of our method is simpler compared to the method of Ye et al. Moreover, the cost of classical communication in our method is 50\% cheaper than that in the method of Ye et al. Therefore, our method proves to be feasible, simple and economical that could be realized by means of current technologies.
Downloads
Metrics
References
E. Schr¨odinger, Mathematical Proceedings of the Cambridge Philosophical Society 31 (1935) 555.
C. Bennett and S. Wiesner, Phys. Rev. Lett. 69 (1992) 2881.
C. H. Bennett, G. Brassard, C. Cr´epeau, R. Jozsa, A. Peres and K. W. Wootters, Phys. Rev. Lett. 70 (1993) 1895.
C. H. Bennett, D. P. DiVincenzo, P. W. Shor, J. A. Smolin, B. M. Terhal and W. K. Wootters, Phys. Rev. Lett. 87 (2001) 077902.
B. A. Nguyen and J. Kim, J. Phys. B: At. Mol. Opt. Phys. 41 (2008) 095501.
P. W. Shor, Proceedings 35th Annual Symposium on Foundations of Computer Science. IEEE Comput. Soc. Press., 1994, pp. 124 - 34.
A. R. Calderbank, E.M. Rains, P. W. Shor and N.J. A. Sloane, IEEE Transactions on Information Theory 44 (1998) 1369.
A. Ekert, Phys. Rev. Lett. 67 (1991) 661.
C. H. Bennett and G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing 175 (1984) 8.
M. Hillery, V. Buˇzek, and A. Berthiaume, Phys. Rev. A 59 (1999) 1829.
G. P. Guo and G. C. Guo, Phys. Lett. A 310 (203) 247.
B. A. Nguyen, Phys. Lett. A 328 (2004) 6.
B. A. Nguyen, J. Kor. Phys. Soc. 47 (2005) 562.
Y. Chen, Z. X. Man and Y.J. Xia, Chinese Phys. Lett. 24 (2007) 19.
D. Liu, J. L. Chen and W.Jiang, Int. J. Theor. Phys. 51 (2012) 2923.
F. Gao, F. Z. Guo, Q. Y. Wen and F. C. Zhu, Sci. China Ser. G: Phys, Mech. and Astr. 51 (2008) 559.
Y. G. Tan and Q. Y. Cai Q. Y. Int. J. Quant. Inf. 6 (2008) 325.
N. R. Zhou, T. X. Hua, G. T. Wu, C. S. He and Y. Zhang, Int. J. Theor. Phys. 53 (2014) 3829.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with CIP agree with the following terms:- The manuscript is not under consideration for publication elsewhere. When a manuscript is accepted for publication, the author agrees to automatic transfer of the copyright to the editorial office.
- The manuscript should not be published elsewhere in any language without the consent of the copyright holders. Authors have the right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of their work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are encouraged to post their work online (e.g., in institutional repositories or on their websites) prior to or during the submission process, as it can lead to productive exchanges or/and greater number of citation to the to-be-published work (See The Effect of Open Access).
Accepted 29-04-2022
Published 08-05-2022