Click here to load reader
Upload
shuyan
View
212
Download
0
Embed Size (px)
Citation preview
Multiparty Controlled Quantum Secure Direct Communication of d-dimensional using GHZ state
Jian Dong1, Jianfu Teng1, Shuyan Wang2
1 School of Electronic Information Engineering, Tianjin University, Tianjin, 300072, China
2 Tianjin Key Lab for Advanced Signal Processing, Civil Aviation University of China, Tianjin, 300072, China
Abstract
Quantum secure direct communication (QSDC) aims to allow two remote parties to communicate directly without creating a private key in advance and then using it to encrypt the secret message. In this paper, a multiparty controlled secure quantum communication of d-dimensional is proposed based on d-dimensional maximally entangled Greenberger–Horne–Zeilinger (GHZ) state and teleportation. After using decoy photons to check eavesdropping efficiently for the purpose of the quantum channel security, the sender encodes the secret message of d-dimensional on a sequence of additional particle states and then fulfills teleportation of the secret through d-dimensional Bell state measurement (DBM) and X-basis or Z-basis measurement. The receiver can recover the secret message by combining his measurement result with the sender’s and controller’s results. If an eavesdropper Eve cannot escape from the communication parties eavesdropping check, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. 1. Introduction
The development of quantum cryptography was motivated by the short comings of classical cryptographic methods, which are basing security on the assumed difficulty of mathematical problems, which means time barrier. Security of classical cryptography is facing the threat of quantum computers. The theoretical ability of quantum computers to parallel process large amounts of information removes the time barrier to factoring large numbers. Since quantum cryptography does not depend on difficulty of mathematical problems for its security, quantum cryptography is under development. The QKD protocol was first published by Charles Bennett and Gilles Brassard in 1984 [1]. From then on, there is a large number of research on this field [2-5]. Recently, a practical quantum cryptosystem prototype has been developed for metro area
applications by NEC Corporation[6]. Besides, there are also some research in wireless field [7,8] and the European project Secoqc QKD network is also proposed [9-10], which aims at developing a global network for unconditionally secure key distribution. Meanwhile, commercial quantum products are also being developed [11], making its deployment a feasible alternative for securing real data networks.
Quantum teleportation plays an important role in the field of quantum cryptography and quantum communication. The quantum teleportation process allows the two remote parties to teleport an unknown quantum state, utilizing the nonlocal correlation of the quantum channel by means of multi-particle joint measurement. The quantum controlled teleportation scheme (QCTS), first published by [12], and is to make an unknown qubit or qudit quantum state be regenerated by a receiver with the help of one or many controllers [13-16]. Recently, a novel concept, quantum secure direct communication (QSDC), has been put forward and studied by some groups [17-19]. Different from QKD, QSDC aims to allow two remote parties to communicate directly without creating a private key in advance and then using it to encrypt the secret message. The works on QSDC attracted a great deal of attention and can be divided into two kinds, one utilizes single photon [20, 21], the other base on entangled state [22]. A multiparty controlled quantum secret direct communication scheme by using GHZ state is presented in [17], based on the idea of dense coding of three-photon entangled state and qubit transmission in blocks. J. Wang et al. [19] present an (n, n) threshold quantum secret sharing scheme of secure direct communication using Greenberger–Horne–Zeilinger state and teleportation. In Ref.[23], a three-party quantum secure direct communication protocol is presented by using GHZ states and entanglement swapping. A scheme for quantum secure direct communication with quantum encryption is presented in [24]. In Ref.[25], a three-party simultaneous quantum secure direct communication (QSDC) scheme is presented using GHZ states. And this
Second International Symposium on Intelligent Information Technology Application
978-0-7695-3497-8/08 $25.00 © 2008 IEEE
DOI 10.1109/IITA.2008.321
551
Second International Symposium on Intelligent Information Technology Application
978-0-7695-3497-8/08 $25.00 © 2008 IEEE
DOI 10.1109/IITA.2008.321
551
Second International Symposium on Intelligent Information Technology Application
978-0-7695-3497-8/08 $25.00 © 2008 IEEE
DOI 10.1109/IITA.2008.321
551
scheme can be directly generalized to N-party QSDC by using n-particle GHZ states.
In this paper, we present a multiparty controlled QSDC (MCQSDC) scheme based on GHZ state and teleportation. In present scheme, the sender’s secret message is transmitted to the receiver by teleportation using GHZ state as quantum channel and can only be reconstructed by the receiver with the help of all the controllers. Different from quantum secret sharing (QSS), the sender transmits his/her secret message to the receiver directly and the information of the receiver is asymmetric to that of the controllers. Based on the ideas of controlled teleportation of qudit state[15, 16, 27], a multiparty controlled QSDC (MCQSDC) scheme of d-dimensional is proposed. The communication parties first perform eavesdropping check to detect whether there is eavesdropping in the transmission line. After using decoy photons to check eavesdropping efficiently for the purpose of the quantum channel security, the sender encodes the secret message of d-dimensional on a sequence of additional particle states and then fulfills teleportation of the secret through d-dimensional Bell state measurement (DBM) and X-basis or Z-basis measurement. The receiver can only recover the secret message by combining his measurement result with the sender’s and controller’s results. If an eavesdropper Eve cannot escape from the communication parties eavesdropping check, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. Our scheme is completely secure if the quantum channel is secure.
The rest of the paper is organized as follows. Section 2 describes single-party Controlled teleportation of a qudit state. Multiparty controlled teleportation of a qudit state is listed in Section 3. In Section 4, the proposed QSDC protocol of d-dimensional based on GHZ state is describes in details. Finally, we give a summary in Section 5. 2. Single-party controlled teleportation of a qudit state
For clarity, let us first give the fundamental of quantum teleportation for a qudit by using a three-qudit maximally entangled GHZ state under 1-controller (for any d-dimensional, d≥2). The multiparty case is given in next section.
First of all the related notation and definition are list as follows [15, 16, 26, 27]. For a d-dimensional Hilbert space, its basis has d eigenvectors along z-direction Zd, can be written as
1,...,2,1,0 −d (1)
The d eigenvectors of another unbiased measuring basis (MB) Xd can be described as
∑−
=
=1
0
/21~ d
l
dilu led
u π
(2) A set of maximally d-dimensional Bell states can be
described as follows [31]
vlled
d
l
diluuv ⊕⊗= ∑−
=
1
0
/21 πφ (3)
The invert form of Eq. (3) is gotten as
∑−
=⊕
−=1
0,,
/21 d
vu
uvvij
dilued
ij φδπ
(4)
The vectors set { }uvφ is a set of orthonormal basis of an inner product space d2. So it can be used as a d-dimensional Bell state measurement (DBM). Furthermore,
we define the state uvφ
corresponding to two classical
dits “uv”, u=0,1,…,d-1; v=0,1,…,d-1, i.e. 00φ to “00”,
01φ to “01”, )1(0 −dφ to “0(d-1)”,
)1)(1( −− ddφ to “(d-1)(d-1)”.
Suppose the sender Alice wants to send an quantum
state, for example qudit a, aχ
to the receiver Charlie, where χ=0,1,…,d-1.
a
d
lla
la∑−
=
=1
0χ
(5) And the quantum channel is a three-qudit GHZ shared
by the sender Alice, the controller Bob and the receiver Charlie in advance in the form as
∑−
=
⊗⊗=1
0
1 d
lCBAABC
llld
φ (6)
where the qudit A is with Alice and the qudit B and C are in the hand of Bob and Charlie respectively. Therefore, the composite state of the quantum system composed of the particles in an unknown state and the GHZ state is
ABCaF φχ ⊗=
(7) When a d-dimensional Bell state measurement (DBM)
on particle a and particle A is done.
∑
∑∑−
=
−
=
−
=
=
⊗⊗⊗=
⊗=
1
0,
1
0
1
0
1
1
d
jlCBaAl
d
lCBAa
d
ll
ABCa
jjljad
llld
la
F φχ
(8)
552552552
Suppose the results of the GDBM are α1α2, i.e. 21ααφ ,
and then the state of the quantum system becomes the
total state can be rewritten in terms of aA
uvφ as
According to Eq.(4), we can get
∑−
=
− ⊕⊕=1
0,,
/21 d
vulCBaA
uvdilul vlvlea
dF φπ
(9) And then controller Bob measure the particles B with
the Xd basis. Suppose the result of the measurement on
the particle B isβ~
, and then the state of the quantum system becomes
∑
∑−
=
++−
−
=
−
⊕⎟⎠⎞
⎜⎝⎛=
⊕⊕=
1
0,,,
/])([22/3
1
0,,
/2
1
1
d
mvulCBaA
uvdmvlluil
d
vulCBaA
uvdilul
vlmead
vlvlead
F
φ
φ
π
π
(10) The retained subsystem composed of the particles
controlled by Charlie is in the state
βααπ
===
−
=
++−∑ ⊕= mvu
d
lC
dmvlluil vleaF ,,
1
0
/])([221
|' (11)
Then receiver can perform a corresponding unitary
operation pqUon particle C to reconstruct the original
quantum state according to the measurement of Alice and Bob. The operation is defined as Ref.[15].
lqleUd
l
diplpq ∑
−
=
⊕=1
0
/2π
(12) According Eq.(11) and Eq. (12), we can get
⎩⎨⎧
⊕==⊕
βαα
1
2 0pq
(13)
3. Multiparty controlled teleportation of a qudit state
We now generalize 1-controller to n-controllers case
with an arbitrary n≥ 2. Suppose Alice wants to send an
quantum state aχ
to the receiver Charlie via multi-controllers (Bobi, i=0,1,…,n).
The GHZ state of (n+2) particles is given as
∑−
=
+⊗=1
0
)2(1 d
l
n
CABl
diφ
(14) Similar to the analysis of 1-controller case, the
difference is the particle Bi is held in the hands of Bobi respectively, i=1,2,…,n. And each Bobi measure the particle in his hand with the Xd basis.
The composite state of the quantum system becomes
∑
∑∑−
=
⊗++−+
−
=
+⊗−
=
⊕⎟⎠⎞
⎜⎝⎛=
⊗=
1
0,,,
/])([22/)12(
1
0
)2(1
0
1
1
d
mvulC
n
BiaA
uvdmvlluil
n
d
l
n
a
d
ll
ii
i vmead
ld
laF
χφπ
(15) After the measurement of Alice and Bob, the retained
subsystem composed of the particles controlled by Charlie is in the state
ii
n
ii
mvu
d
lC
dmvllui
l vleaF βαα
π
===
−
=
++−
∑ ⊕∑
= =,,
1
0
/])([2
21
1 |'(16)
Then receiver can perform a corresponding unitary
operation pqUon particle C to reconstruct the original
quantum state according to the measurement of Alice and Bobi.
According Eq.(11) and Eq.(16), we can get
⎪⎩
⎪⎨⎧
⊕=
=⊕
∑=
n
iip
q
11
2 0
βα
α
(17) 4. Proposed QSDC protocol of d-dimensional based on GHZ state
In this section, a multiparty controlled QSDC protocol of d-dimensional based on GHZ state is proposed. Suppose Alice wants to send a dit (d-dimensional bit) information (m, m=0,1,…,d-1) to Charlie via many controllers Bobi using QSDC. Alice first checks eavesdropping in the transmission line by using random Z-basis or X-basis measurement. After ensuring the security of the quantum channel, Alice encodes her secret message on each of the GHZ states and sends it to the receivers directly using teleportation. According to Alice’s measurement results, the receivers can collaborate to acquire Alice’s secret message. The following content describes the proposed QSDC protocol in detail.
Step 1 According to random selection a basis from Z-
basis { 1,...,2,1,0 −d } or X-basis
{
~1,...,2~,1~,0~ −d
} for each time, Alice prepares randomly N (n+2)-particle GHZ states, each of which is in the state as Eq.(14) or following state
∑−
=
+⊗=
1
0
)2(~1~ d
l
n
CABl
di
φ (18)
We denote the ordered N GHZ states by {[P1(A), P1(Bi), P1(C)], [P2(A), P2(Bi), P2(C)], . . ., [PN(A), PN(Bi), PN(C)]}, where the subscript indicates the order of each state in the sequence, and A, B, C represent the three
553553553
particles of each state, i=1,2,…,n. Alice takes one particle from each state to form an ordered partner particle sequence, [P1(A), P2(A), . . ., PN(A)], called A sequence. The remaining partner particles compose Bi sequence, [P1(Bi), P2(Bi), . . ., PN(Bi)], and C sequence, [P1(C), P2(C), . . ., PN(C)].
Step 2 Alice sends Bi sequence and C sequence to Bobi and Charlie, respectively. Bobi and Charlie inform Alice that they each have received N particles.
To prevent the eavesdropper Eve or the controller Bobi from stealing the information about the unknown qudit state in this scheme, the parties can exploit the way in Ref. [13, 15] to set up the quantum channel securely. Alice prepares some decoy photons which are randomly in the
states { 1,...,2,1,0 −d ,
~1,...,2~,1~,0~ −d
}, to insert them into the original sequence of particles before sending them to Bobi and Charlie, respectively. After confirming the receipt of the sequences, Alice picks up the decoy photons to check the eavesdropping in the quantum line by comparing the results of measurement with the MB Zd or the MB Xd. Thus the process for setting up the quantum channel can be made to be secure.
Then if Alice confirms that there is no eavesdropping, they continue to execute the next step. Otherwise, they abort the communication.
Step 3 After ensuring the security of the quantum channel, Alice encodes her secret message on GHZ sequence. If the bit value of Alice’s secret message is “m”, m=0, 1,…, d-1, she prepares a particle a in the state m~ or m for the GHZ state in the sequence according to
which basis is selection in step 1. That is a in the state m~
if Z-basis is chosen, otherwise, a in the state m . We denote particle a as Pi(a), where i=1,2,…,N. If the state of
Pi(a) is m~ , then the state of particles Pi(a), Pi(A), Pi(Bi), and Pi(C) is
∑−
=
+⊗⊗=Ψ1
0
)2(1~ d
l
n
al
dm
(19) where the subscript a denotes particle Pi(a). If the state
of Pi(a) is m , then the state of the four particles becomes
∑−
=
+⊗⊗=Ψ
1
0
)2(~1'd
l
n
al
dm
(20) Step 4 The sender Alice first performs a d-dimensional
Bell state measurement (GDBM) on the particles Pi(a) and Pi(A) using Z-basis or X-basis as in step 1. And then each Bobi measure the particles Pi(Bi) with the X-basis or Z-basis. Here Alice transmits the message of basis selection to Bobi secretly through classical communication.
Step 5 Charlie can perform a unitary operation Upq on each of her particle Pi(C) according Eq.(17) to regenerate
the quantum state with the help of controller Bob and the public result of Bell measurement by Alice. And then Charlie measure the Pi(C) to get secret message “m” on the basis which Bobi through classical communication.
Now let us discuss the security for the present scheme. The proposed scheme is secure if the quantum transmission is secure. That is to say, if an eavesdropper Eve cannot escape from the communication parties eavesdropping check at Step 2, the scheme is secure. Charlie can not recover and measurement correctly without Bobi’ help because of two possible bases(X-basis or Z-basis).
5. Conclusions
In summary, we have presented a multiparty controlled
QSDC protocol of d-dimensional based on GHZ state. If an eavesdropper Eve cannot escape from the communication parties eavesdropping check, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. Our scheme is completely secure if the quantum channel is secure.
Acknowledgement
This paper is supported by Tianjin Nature Science
Fund 06YFJMJC00800.
References [1] C. H. Bennett, G. Brassard (1984). “Quantum
cryptography: Public key distribution and coin tossing”, in Proc. Int. Conf. Comput. Syst. Signal Process. pp.175-179.
[2] C. H. Bennett (1992). “Quantum cryptography using any two nonorthogonal states”. Phys. Rev. Lett. 68, pp.3121-3124.
[3] G.H. Zeng, F.C. Zhu, J.P. Fan (2005), “Networking Quantum Key Distribution Implemented by Tri-qubit State”. Information Security and Communications Privacy, No.6, pp.169-174.
[4] X.Q. Su, G.C. Guo (2004). “quantum communication and quantum computing”. Chinese Journal of Quantum Electronics. Vol. 21, No. 6, pp.716-718.
[5] J. Dong, J.F. Teng, S.Y. Wang (2008). “A Modified Protocol of Quantum State Sharing based on Entanglement Swapping and Random EPR Selection”. IEEE Int. Conference Neural Networks & Signal Processing. June, Zhenjiang, China, pp. 238-242.
[6] A.Tajima, A.Tanaka (2007). “Practical Quantum Cryptosystem for Metro Area Applications”. Selected Topics in Quantum Electronics IEEE. Vol. 13, No. 4, pp.1031-1038.
[7] K.H. Sheikh, S.S. Hyder, M.M.Khan (2006). “An overview of Quantum Cryptography for Wireless Networking Infrastructure”, CTS 2006. International Symposium on. pp.379-385.
[8] S.T. Cheng, C.Y. Wang (2005). “Quantum communication for wireless wide-area networks”. Selected Areas in
554554554
Communications, IEEE Journal on. Vol. 23, No. 7, pp.1424-1432.
[9] M.Dianati, R.Alleaume (2007). “Architecture of the Secoqc Quantum Key Distribution network”. Quantum, Nano, and Micro Technologies. ICQNM '07. pp.13-19.
[10] D. Mehrdad, A. Romain (2007). “Transport Layer Protocols for the Secoqc Quantum Key Distribution (QKD) Network Local Computer Networks”, LCN2007, pp.1025-1034.
[11] www.magiqtech.com, www.idquantique.com [12] A. Karlsson, M. Bourennane (1999). “Quantum
teleportation using three-particle entanglement”, Phys. Rev. A.58, 4394.
[13] Z. J. Zhang (2006). “Controlled teleportation of an arbitrary n-qubit quantum information using quantum secret sharing of classical message”, Phys. Lett. A. 55, 352.
[14] X. G. Zhan, H.M. Li, H.S. Zeng (2006). “Teleportation of Multi-qudit Entangled States”, Chin. Phys. Lett. 23, 2900.
[15] X.H. Li, F.G. Deng, H.Y. Zhou (2007). “Controlled Teleportation of an Arbitrary Multi-Qudit State in a General Form with d-Dimensional Greenberger--Horne--Zeilinger States”, Chin. Phys. Lett. 24, pp.1151-1153.
[16] J. Dong, J.F. Teng (2008). “Controlled teleportation of an arbitrary n-qudit state using nonmaximally entangled GHZ states”. Eur. Phys. J. D. Vol. 49, No. 1, pp.129-134.
[17] J. Wang, Q. Zhang, C.J. Tang (2006). “Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state”. Optics Communications. 266, pp.732–737.
[18] X.H. Li, F.G. Deng (2006). “Deterministic Secure Quantum Communication Without Maximally Entangled States”. arxiv.org/abs/quant-ph/0606007v3
[19] J. Wang, Q. Zhang, C.J. Tang (2007). “Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation”. Commun. Theor. Phys. 47, pp. 454–458.
[20] F.G. Deng, G.L. Long (2004). “Bidirectional quantum key distribution protocol with practical faint laser pulses”. Phys. Rev. A. 69, pp.052319-052325.
[21] Q.Y. Cai, B.W. Li (2004). “Deterministic Secure Communication Without Using Entanglement”. Chin. Phys. Lett. 21, pp.601-603.
[22] C. Wang, F.G. Deng, Y.S. Li, X.S. Liu, G.L. Long (2005). “Quantum secure direct communication with high-dimension quantum superdense coding”. Phys. Rev. A. 71, pp.044305-044309.
[23] Z.X. Man, Y.J. Xia, N. B. An (2006). “Quantum secure direct communication by using GHZ states and entanglement swapping ” J. Phys. B: At. Mol. Opt. Phys. 39 pp. 3855–3863
[24] X.H. Li, C.Y.Li, F.G. Deng (2007). “Quantum secure direct communication with quantum encryption based on pure entangled states”, Chinese Physics, Vol 16,No 8, pp. 2149-2153.
[25] X.R. Jin, X.J., Y.Q. Zhang (2006). “Three-party quantum secure direct communication based on GHZ states”. Physics Letters A. 354, pp. 67-70.
[26] J. Yany, J. Liu (2008). “Controlled Teleportation of Multi-qutrit Quantum Information by Swapping Entanglement”. Commun. Theor. Phys. Vol. 49, No. 2, pp. 338–342.
[27] A.K. Pati and P. Agrawal (2007). “Probabilistic teleportation of a qudit”. Phys. Lett. A. 371, pp.185-189.
555555555