Vol. 32 No. 3 (2022)

Secure Information Exchange Without Prior Key Distribution via Single-photon Hyperstates

Nguyen Ba An
(^1\)Thang Long Institute of Mathematics and Applied Sciences, Thang Long University, Nghiem Xuan Yem, Hoang Mai, Hanoi
\(^2\)Center for Theoretical Physics, Institute of Physics, Vietnam Academy of Science and Technology, 18 Hoang Quoc Viet, Hanoi

Published 08-05-2022


  • Secure information exchange,
  • information leakage,
  • single-photon hyperstates

How to Cite

An, N. B. (2022). Secure Information Exchange Without Prior Key Distribution via Single-photon Hyperstates. Communications in Physics, 32(3), 223. https://doi.org/10.15625/0868-3166/17064


Methods for two distant parties to exchange their secret messages using single photons are considered. There existed several such methods but they are either insecure or face with information leakage problem. Recently, Ye et al. [Quantum Inf. Process. 20 (2021) 209] have reported a method using single photons in both polarization and spatial degrees of freedom that is both efficient and resistant from information leakage. However, this method is not so feasible as it has specific limitations, namely, it requires availability of quantum memory and high classical communication cost. We propose in this paper a new method to overcome the above-said limitations. Our method is also efficient because we also use single photons in two degrees of freedom. However, the encoding operation in our method is modified so that no quantum memory is demanded at all and the execution of our method is simpler compared to the method of Ye et al. Moreover, the cost of classical communication in our method is 50\% cheaper than that in the method of Ye et al. Therefore, our method proves to be feasible, simple and economical that could be realized by means of current technologies.


Download data is not yet available.


Metrics Loading ...


  1. E. Schr¨odinger, Mathematical Proceedings of the Cambridge Philosophical Society 31 (1935) 555.
  2. C. Bennett and S. Wiesner, Phys. Rev. Lett. 69 (1992) 2881.
  3. C. H. Bennett, G. Brassard, C. Cr´epeau, R. Jozsa, A. Peres and K. W. Wootters, Phys. Rev. Lett. 70 (1993) 1895.
  4. C. H. Bennett, D. P. DiVincenzo, P. W. Shor, J. A. Smolin, B. M. Terhal and W. K. Wootters, Phys. Rev. Lett. 87 (2001) 077902.
  5. B. A. Nguyen and J. Kim, J. Phys. B: At. Mol. Opt. Phys. 41 (2008) 095501.
  6. P. W. Shor, Proceedings 35th Annual Symposium on Foundations of Computer Science. IEEE Comput. Soc. Press., 1994, pp. 124 - 34.
  7. A. R. Calderbank, E.M. Rains, P. W. Shor and N.J. A. Sloane, IEEE Transactions on Information Theory 44 (1998) 1369.
  8. A. Ekert, Phys. Rev. Lett. 67 (1991) 661.
  9. C. H. Bennett and G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing 175 (1984) 8.
  10. M. Hillery, V. Buˇzek, and A. Berthiaume, Phys. Rev. A 59 (1999) 1829.
  11. G. P. Guo and G. C. Guo, Phys. Lett. A 310 (203) 247.
  12. B. A. Nguyen, Phys. Lett. A 328 (2004) 6.
  13. B. A. Nguyen, J. Kor. Phys. Soc. 47 (2005) 562.
  14. Y. Chen, Z. X. Man and Y.J. Xia, Chinese Phys. Lett. 24 (2007) 19.
  15. D. Liu, J. L. Chen and W.Jiang, Int. J. Theor. Phys. 51 (2012) 2923.
  16. F. Gao, F. Z. Guo, Q. Y. Wen and F. C. Zhu, Sci. China Ser. G: Phys, Mech. and Astr. 51 (2008) 559.
  17. Y. G. Tan and Q. Y. Cai Q. Y. Int. J. Quant. Inf. 6 (2008) 325.
  18. N. R. Zhou, T. X. Hua, G. T. Wu, C. S. He and Y. Zhang, Int. J. Theor. Phys. 53 (2014) 3829.