Abstract
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
Similar content being viewed by others
Introduction
The pioneering work of Bennett and Brassard1 has been developed for the purpose of understanding quantum cryptography which is one of the most significant aspects of the laws of the quantum mechanics. This cryptography guarantees unconditional security2,3,4,5 that is proven through the no-cloning theorem6 as the transmitted quantum bit cannot be replicated or copied but its state can be teleported. Quantum teleportation and dense coding are the most often used quantum principles. In the former, the quantum information can be transmitted based on both classical communication and the maximally shared quantum entanglement among the distant parties7,8,9,10. In the latter, the classical information can be encoded and transmitted based on one quantum bit and on the maximally shared quantum entanglement among the distant parties as each quantum bit can transmit two classical bits11,12. A number of approaches and prototypes can be used to exploit quantum principles in order to secure communication between two parties and multiple parties13,14,15,16,17. While these approaches use different techniques to ensure private communication among authorized users, most of them still depend on the generation of secret random keys18,19.
A quantum secret communication concept has recently been introduced; it is a kind of quantum communication in which secret messages can be transmitted through a quantum channel with or without additional classical communications20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58. A quantum secure direct communication (QSDC) transmits the secret messages directly between the communicating parties, from sender to receiver, without additional classical communication protocols, except for those used for the necessary eavesdropping check. In other words, the quantum key distribution (QKD) process and the classical communication of ciphertext are reduced into one single quantum communication procedure in QSDC. In QSDC, the concept of direct transmission of secret messages involves two kinds of meaning: On one hand, secret messages rather than raw keys are transmitted; on the other hand, the receiver does not require any separate classical communication from the sender to decode out secret messages26,31,32,39,40,41,42,43,44,45,46,47,48,49,50,51,52,57,59. In 2002, Long and Liu52 put forward the first QSDC protocol, in which the secret message is transmitted directly. In the same year, by taking advantage of Einstein-Podolsky-Rosen (EPR) pairs as quantum information carriers, Boström and Felbinger20 put forward the famous QSDC protocol referred to as the ping - pong protocol later. In60, the authors enhanced the capability of the ping - pong protocol by adding two more unitary operations. In22, a two-step quantum secure direct communication protocol was proposed for transferring quantum information by utilizing Einstein-Podolsky-Rosen (EPR) pair blocks to secure the transmission. In21, the authentication and communication process was performed using Greenberg–Horne–Zeilinger (GHZ) states. First, the GHZ states were used for authentication purposes; the remaining GHZ states were used to transmit the secret message directly. In17, the architecture for a centralized multicast scheme was proposed basing on a hybrid model of quantum key distribution and classical symmetric encryption. The proposed scheme solved the key generation and the management problem using a single entity called centralized Quantum Multicast Key Distribution Centre. In61, a novel multiparty concurrent quantum secure direct communication protocol based on GHZ states and dense coding is introduced. In59, a managed quantum secure direct communication protocol based on quantum encoding and incompletely entangled states is presented. In57, a scheme for quantum secure direct dialogue protocols, which is adapted to both collective-dephasing noise and collective-rotation noise, is proposed by using the logical Bell states as the traveling states to resist collective noise. Different from QSDC, there is another kind of quantum secret communication named deterministic secure quantum communication (DSQC), where the receiver needs a separate classical communication from the sender to help decode out secret messages. In the framework of DSQC, the receiver can read out the secret message only after the transmission of at least one bit of additional classical information for each quantum bit, different from QSDC in which the secret message can be read out directly without exchanging any classical information20,23,24,26,29,36,38,53,55,56,58. In53, a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel is proposed as a four special two-qubit states are found can constitute a noise-free subspaces and so are utilized as quantum information carriers. In 2002, Beige et al.54 first proposed a DSQC scheme based on single-photon two-quantum bit states. Then in 2004, Yan and Zhang24 proposed a DSQC scheme based on EPR pairs and quantum teleportation. In 2005, Gao et al.55 and Man et al.26 proposed two DSQC protocols also based on entanglement swapping. In 2006, with EPR pairs based on the secret transmitting order of particles, Zhu et al.20 proposed two DSQC schemes, one is a round trip scheme and the other is a one way trip scheme. Lee et al.29 proposed a protocol for controlled DSQC with Greenberger-Horne-Zeilinger (GHZ) states. In 2009, Xiu et al.56 proposed a controlled DSQC scheme using five qubit entangled states and two-step security test. In58, a hyper entangled Bell state is used to design faithful deterministic secure quantum communication and authentication protocol over collective-rotation and collective-dephasing noisy channel, which doubles the channel capacity compared with using an ordinary Bell state as a carrier; a logical hyper entangled Bell state immune to collective-rotation and collective-dephasing noise is constructed. Different quantum authentication approaches have been developed for preventing various types of attacks and especially man-in-the-middle attack62,63,64,65,66.
However, these quantum secure direct communication approaches are still prone to provide a low degree of effectiveness and an inadequate level of security. Here, we propose a convenient and efficient scheme for transmitting a series of classical messages among two, three, or more users (generalized to N users). Therefore, disjointed users can transmit a secret message consisting of classical bits to a remote user . The transmission process is accomplished by utilizing the property of dense coding and Pauli unitary transformations. First, the quantum server authenticates and verifies the identities of the communicated disjointed users through the generated entangled shared key and the Controlled – NOT gate. After the authentication is completed successfully, the remaining generated entangled shared key is used to generate shared GHZ states, which are intended for directly transmitting the secret message. If there is a quantum channel among the users, they can communicate using our partial cooperation process. In that case, disjointed users generate a random sequence of bit strings of the transmitted plain message. Next, each user applies an appropriate unitary transformation according to his plain message bit string value and transmits the transformed message to . Then, retrieves the original sent secret message by applying the N – GHZ measurement to his/her particle and particles. Afterwards, the quantum server calculates the status of his or her particle according to x basis and announces his or her measurement results. Then, uses those measurements and the quantum server publication to retrieve the original sent secret bits by . If there is no quantum channel among the users, they can use our full cooperation process, but in this case the transformed message will be sent to the quantum server instead of .
The efficiency and effectiveness of our protocol can be summarized into five points. First, the GHZ state is the maximally entangled state, so that the correlation can be more easily destroyed once any single N particle is attacking. Second, using the N – GHZ particle makes eavesdropping detection more effective and secure in comparison to some of the other QSDC protocols. For example22, proposed a two-step quantum secure direct communication where an EPR pair block is used to transfer the secret message. Furthermore34, proposed a multi-step quantum secure direct communication protocol where blocks of a multi-particle maximally entangled states are used to transmit secret messages. These protocols fail because the eavesdropper can capture some of the particles in the sequence and transmit what is left to the receiver through the quantum channel. If the eavesdropper intercepts the message sequence and conducts a GHZ measurement, he/she can retrieve some of the secret message. Therefore, the probability of information leakage exists. Third, our protocol increases the transmitted information capacity by using N - GHZ states as these provide a large Hilbert space. Fourth, users can transmit a particular message to the receiver, , so the protocol is more effective as no quantum bits have to be discarded. Furthermore, the protocol is instantaneous as the receiver, is able to decode the message while receiving it and there is no additional classical exchange between (sender) users and (receiver). Finally, the security analysis of the authentication and communication processes of our protocol against many types of attacks proves that our protocol is unconditionally secured and the attacker will not reveal any information about the key or the transmitted message in the case of directly calculating the transferred particles over the communicated channel from the quantum server to the disjoint user and vice versa, as the attacker introduces an error probability irrespective of the sequence of measurement.
Methods
Bell States and Controlled – NOT
The Bell states are one of the main theories of quantum information processing that denote entanglement67,68. Bell states are specific, highly entangled quantum states of two particles denoted by EPR. There are many research groups that proposed different approaches for realizing and experimentally generating EPR states. In69 a high-intensity source of polarization-entangled photon pairs can be realized with high momentum definition. The proposed scheme allowed ready preparation of all four of EPR-Bell states with two-photon fringe visibilities in excess of 97%. In70 EPR can be experimentally setup by utilizing light pulse from a mode-locked Ti-sapphire laser through a frequency doubler. The ultraviolet pulse from the doubler is split into two beams by a balanced beam-splitter and is focused on four pairs of BBO crystals to provide four EPR photon pairs. In our scheme, EPR pair can be realized by utilizing the same concept introduced in70.
These entangled particles have interrelated physical characteristics despite being spatially separated. When the quantum state is a multi-qubit, transformation can be achieved by applying the controlled quantum gates CNOT (Controlled – NOT), FREDKIN (Controlled – SWAP) and TOFFOLI (Controlled – Controlled – NOT). CNOT has an input of two qubits. It transforms the computational basis states by flipping the state of the second qubit only when the first qubit has a measurement of 1; otherwise, the quantum state remains unchanged2,3,5,7,11. The four Bell states (EPR pairs) used in both the authentication and communication processes in our scheme are defined by (Eq. (1). Authentication between the quantum server and users is achieved by the generated entangled shared key and the gate. At the time of registration, the quantum server and disjoint user share a binary authentication key, AK. Each sends one entangled particle to form an EPR pair, , in which the q and u particles correspond with the quantum server and disjoint user, respectively. The quantum server preserves q at its location and transmits the u particle to the intended disjoint user, as shown in (Eq. (2). Once the disjoint user obtains its u particle, it prepares a new state particle, n (See (Eq. 3), by encoding the shared authentication information according to the specified operation. When the quantum CNOT gate OP is performed on the transmitted particle and n, the resulted particle r is a state of three entanglement particles (See Eq. 4). After applying the requested operation, the disjoint user keeps particle u at its side and sends the resulted particle to the quantum server. Once the quantum server receives the resulted particle, , it decodes it by applying a quantum CNOT gate OP on both the local particle q and n (See Eq. 6, 7). The quantum server verifies the identity of the disjoint user by measuring on the basis of Z. The resulted state must measure at either 0 or 1. If the measurement is equal to , the disjoint user is authenticated. However, if the resulted measurement is erroneous—meaning it is greater than the agreed threshold—then the authentication process will be terminated. Afterwards, the key is increased to authenticate the next disjoint user, sending the quantum server recursively back to step one until all disjoint users are authenticated.
where and ⊗ denotes the specified user operation.
where OP = 0 at and OP = 1 at . 0 and 1 are described by (Eq. (5))
where
Quantum Bit Transformation
Quantum computers can manipulate quantum information to transform a pure or mixed quantum state into another corresponding pure or mixed state2,3,5,7,11. In our scheme, the unitary transformation operations are defined by (Eq. (8)). For simplicity, we use X, Y, Z instead of , respectively. These are used to transform the GHZ state at the side of the sender(s) into an unreadable form that corresponds to the generated original classical message before transmitting it to the receiver.
Tables 1, 2, 3, 4 describe the correlation between the received classical value and its corresponding unitary and GHZ transformations. Tables 1 and 2 illustrate the correlation that occurs during the communication process between two disjoint users (, ) with partial and full cooperation of the quantum server, respectively. The generates a sequence of random bit strings of transmitted, plain message. According to each two transmitted bits, (00, 01, 10, 11), the disjoint user, , applies one of the unitary transformation operations, Ŭ = {Ŭ1, Ŭ2, Ŭ3, Ŭ4}, which correspond to the four Pauli operations, {I, X, Y, Z}, respectively. Afterwards, the GHZ states convert according to the transmitted bits and the transformation (See Supplementary Information 1) for the communication process between two disjointed users with partial and full cooperation of the quantum server).
Tables 3 and 4 describe the same correlation but among three disjointed users (, and ) with partial and full cooperation of quantum server respectively. The difference that a new user generates a random sequences bits string of transmitted plain message. applies or according to the value of particle 0 or 1 respectively. Afterwards, the GHZ states will be converted according to transmitted bits, and transformations (see Supplementary Information 2 for Communication Process between Three Disjoint Users with Partial and Full Cooperation of Quantum Server).
GHZ States, Measurement and Source
A GHZ state is a certain type of maximally entangled quantum state that includes at least three qubits (particles). This kind of state was first examined by Greenberger, Horne and Zeilinger in 198971. The standard GHZ state is defined as qubits = 3; when qubits > 3, the GHZ state is defined by Eq. (9) seen below:
In our scheme, when the quantum server receives a user(s) request for communication with another user, the quantum server distributes GHZ entanglement states among the involved participants’ users in the communication process. Distribution is established after successful completion of the authentication process prior to the commencement of the communication process. The quantum server distributes all generated particles but holds one for itself. As a consequence, the quantum server and the participated users become entangled due to the presence of only one particle per distributed GHZ state. In addition, GHZ measurement is used by the receiver or quantum server, depending on the type of cooperation used during inter-user communication. Consistent with the GHZ measurement result, the receiver determines which unitary operations are used by the senders to transform the GHZ state according to the original generated classical message before it is transmitted to the receiver. By obtaining the applied unitary operations, the receiver can retrieve the original sent message. The Eight GHZ States are defined by (Eq. (10)).
There’re many research groups proposed different approaches for realizing and experimentally generating multi-photon GHZ states. In72, an experimental entanglement of six-photon GHZ states, cluster states and graph states is proposed. The generating of six-photon GHZ states and cluster states is achieved by EPR-entangled photon pairs. In73 an effective protocol for preparation of N – photon GHZ states with conventional photon detectors and can be realized through a simpler optical setup with a high success probabilities. In74 a proposed a linear optical protocol to generate GHZ states of N distant photons with certain success probabilities. The proposed set up involved simple linear optical elements N pairs of the two-photon polarization entangled states and the conventional photon detectors. In75 an Experimental demonstration of five-photon entanglement and open-destination teleportation is proposed by utilizing two entangled photon pairs to generate a four-photon entangled state, which is then combined with a single-photon state. In76 N – particle GHZ states can be generated easily using the N encoders preparation with cross-Kerr nonlinearities and can be realized simply through linear optical elements and homodyne detectors. In70 Experimental generation of an eight-photon GHZ state is proposed. An eight-photon GHZ state with a measured fidelity of 0.59 ± 0.02 proved the presence of genuine eight-partite entanglement. This is achieved by improving the photon detection efficiency to 25% with a 300-mW laser pump. In our scheme, we use the same concept introduced in70,72 to generate shared GHZ states. In order to develop the realization of N – particle GHZ states, the photon detection efficiency has to be improved basing on laser pump. Furthermore, a large capacity of memory for all parties to store and retrieve the required information has to take into consideration.
After a successful completion of the authentication process between the quantum server and a specified user, the remaining EPR is used to generate shared GHZ states to transmit the secret message among communicated users directly. Figure 1 demonstrates how the GHZ states among , the quantum server and are generated according to the remaining EPR. Suppose, for example, the generated EPR for the authentication process between the quantum server and is given by (Eq. (11)). The quantum server particle is a part of another generated EPR for the purpose of authenticating (See Eq. 12). The result will then be a shared GHZ state among , the quantum server and (See Eq. 13). Similarly, , and so on can be generated.
Tables 5, 6, 7, 8 show the correlation between the quantum server publication, receiver measurement, sender operation(s) and sent bits. (Table 5) describes the correlation between the quantum server publication, measurement, operation and sent bits during a partial cooperation process between two disjoint users. The performs a Bell measurement on its particle and the particle; the quantum server then calculates the status of its particle according to the x basis {+, −} and announces the measurement results. The uses its measurements and the quantum server publications to retrieve the original secret bits sent by . For example, when the measurement is equivalent to and the quantum server publication is , the concludes that the applied an X operation and the sent bits were 01 (See Supplementary Table S1) for the correlation during a full cooperation process between two disjoint users). Table 6 describes the same correlation of a partial process, but among three disjoint users. Here, performs a GHZ measurement on its particle, particles and particles. The quantum server calculates the status of its particle according to the x basis {+, −} and announces the measurement results. Then, uses its measurement and the quantum server publications to retrieve the original secret bits sent by both and . For example, when the measurement is equivalent to and the quantum server publication is , can conclude that and applied Y and X operations, respectively and the sent bits were 101 (See Supplementary Table S4) for correlation during a full cooperation process between three disjoint users). Tables 7 and 8 illustrate the transmission of messages 100111 from to with partial and full support of the quantum server, respectively.
Results and Discussion
Masquerade as Dishonest Disjoint User Security Analysis
If an attacker would like to masquerade as dishonest disjoint user, then the attacker will work on the transmitting particle u (disjoint user particle) from the quantum server to the disjoint user. With the assumption that the attacker applying a universal operation on u see (Eq. (14, 15)).
where represents an additional state which is created by the attacker, a represents the attacker particle and,
When the attacker applying its operation, a new shared key state will be created see (Eq. (17, 18)).
The attacker transmits the new formulated state to the quantum server. Afterwards, the quantum server performs OP on the received state as a result one of four states , , , which equivalent to the dual bits 00, 01, 10 and 11. With the assumption that the dual bits are equivalent to 00 then the quantum server operation is equivalent see (Eq. (19))
Through performing 0 the result is obtained by (Eq. (20))
So the chance for discovering the attacker for is 00 can be computed using (Eq. (20)) as by (Eq. (21))
As well when the dual bits are equivalent to 01, so the chance for discovering the attacker for is 01 can be computed using Eq. (18) as shown in (Eq. (22))
When the dual bits are equivalent to 10, so the chance for discovering the attacker of is 10 and equivalent to 01. Furthermore the chance for discovering the attacker of is 11 and equivalent to 00. Accordingly, the total discovering probability of the attacker Total of each disjoint user is equivalent ½ see (Eq. (23, 24))
As stated by Simmons theory77,78, the result of the previous equation proved that the proposed scheme is unconditionally secured under this type of attack.
One-way Channel Substitution Fraudulent Attack Security Analysis
As the transmitted particle from the quantum server to the disjoint user doesn’t contain any fact about the authentication key, so in this type of attack only the restored n (new state particle) from the disjoint user to the quantum server have to be measured. The maximum reachable information which an attacker may obtain over the communicated channel between a quantum server and a disjoint user can be computed by Holevo theory79 see (Eq. (25))
As () is equivalent to Von Neumann entropy is a component in the hybrid status and is the possibility of i in the universe . So the eavesdropper just has information about the authentication key by directly calculating the n (new state particle), so the resulted () relies on the reduced density matrix of n, by substitution of (Eq. (25)) as shown in (Eq. (26))
As both n and ni required reduced density matrix for and i respectively. For any authentication key, the reduced density matrix of n can be represented in (Eq. (27))
In addition to, ni is equivalent to the subsequent equations from ((28) to (32))
Therefore;
By replacing values for both n and ni in Eq. (26), (n) = 0. So, the eavesdropper will not reveal any information about the key in case of directly calculating the transferred particles over the communicated channel from the quantum server to the disjoint user.
Two- Way Channel Substitution Fraudulent Attack Security Analysis
The attacker applies an operation at his/her side on the transmitted particle u and supportive particle . Afterwards, the attacker transmits the resulted particle to the disjoint user. When the disjoint user receives the transmitted particle, he/she does not realize that there is attacker and he did an operation. The disjoint user applyies his normal operation and transmits the resulted particle to the quantum server. The attacker intercepts the information particle sent by the disjoint user. The attacker applies an operation at his side to the information particle and supportive particle η. Afterwards, the attacker transmits the resulted particle to the quantum server. The attacker attempts to retrieve certain amount of information about the key by employing two supportive particles ε and η (See Supplementary Information 3 for Full Calculations of Two - Way Channel Substitution Fraudulent Attack along with equations).
When the two-bit key = 00, so the resulting decoding state by the quantum server is given in (Eq. (33, 34))
We can calculate the total possibility for discovering the attacker (Total) in the authentication process is given by (Eq. (35))
If the attacker would like to minimize his/her detection probability, he/she has to adjust Total as a minimum discovering probability (See Eq. 36) which is calculated under the condition of
So, the attacker’s total information amount on the transmitted key bits between the quantum server and the disjoint user can be estimated in (Eq. (37)).where represents the total operation performed by the attacker and , x represents the key
values (00, 01, 10, 11) with probability indicates the selected random values from variable x, with i, j, . Consequently, the joint gained information by attacker’s total operation is given in (Eq. (38))
Since (see Supplementary Information (4) for Proving Relation between and Total), by substitution in Eq. (38)
Therefore the total estimation probability e of AK is given in (Eq. (40))By simplification of Eq. (40) e of AK is given in (Eq. (41)) (see Supplementary Information (5) for Proving Relation between e, and )
If = 1 indicates that the total estimation probability e is maximized see (Eq. (42)) (see Supplementary Information (6) for Proving Relation between e, em and Total)
Therefore, the probability of the attacker for successfully retrieving the transmitted keys er see (Eq. (43))
By substituting (Eq. (42)) in equation (Eq. (43)), so
Figure 2A is shown that the possibility for discovering the attacker while attempting to retrieve any information about the key bits is equal to non-zero. For example if Total = 25% means the attacker can
gain maximal joint information on the transmitted keys between the quantum server and
disjoint user. From Fig. 2B, we can conclude that when the total estimation probability is maximized which means reaching to one, the attacker can positively maximum retrieve 0.5 bit of the transmitted key AK while the maximum total estimation probability em is equal to 25%.
Figure 2C illustrates that if the minimum discovery probability is equal to [0, 12.5, 25, 50]% and = 2, so the maximum values for successfully retrieving the information of the transmitted keys Ak by the attacker are [0.25, , , ] respectively. Also, for N = 16 the maximum successfully for retrieving information of the transmitted keys Ak by the attacker is [, ] respectively. So while the number of the transmitted bits is increasing, the possibility for successful retrieval the transmitted information is decreased (See Supplementary Figure S6 (A–D) and Table S5 (A–D) for Full Calculations for Relation between N, Total, er).
Figure 2D shows that the maximum and minimum values for successfully retrieving the information of the transmitted keys Ak by the attacker while N = [2, 4, 8, 16] and respectively. We can conclude that all maximum values are corresponding when em and Total is equal to [50, 0]%. So, the attacker can gain maximum information about the transmitted keys Ak at this situation. Furthermore, the minimum value for the attacker to gain information about the transmitted keys Ak is corresponding when the value of em and Total is equal to [12.5, 50]%. (See Supplementary Figure S7 (A–D) and Table S6 (A–D) for Full Calculations for Relation between er and N while em = [12.5, 25, 37.5, 50]% and ).
Figure 2E demonstrates the maximum and minimum values for successfully retrieving the information of the transmitted keys Ak by the attacker while is and respectively. From Fig. 2E, we can conclude that all maximum and minimum values are corresponding when em and Total is equal to and respectively. So, the attacker can gain maximum information about the transmitted keys Ak when em and Total equal to and minimum when em and Total is equal to . (See Supplementary Figure S8 (A–D) and Table S7 (A–D) for Full Calculations for Relation between er and N while em = [12.5, 25, 37.5, 50]% and ).
Figures 2F and 3 illustrate while the number of transmitted key bits N becomes larger, the possibility of successfully retrieving Ak becomes smaller and reach zero. So, the attacker will not reveal an enormous amount of information which can be ignored and avoided by updating key between the disjoint user and the quantum server periodically. In this case, the information of the attacker on the old key will be useless.
Generalization of Communication Process between N Disjoint Users with Partial Cooperation of Quantum Server
Here, we generalize our approach for Communication Process between N Disjoint Users with Partial Cooperation of Quantum Server as shown in Fig. 4A. So, disjointed disjoint users can transmit a secret message of classical bits to a remote user with partial cooperation of the quantum server. Firstly the quantum server distributes N particles of particles GHZ state to . chooses a randomly subset of and keeps it confident. In addition, generate a random sequence bit strings of transmitted plain message. Next, each user applies appropriate unitary transformation according to his plain message. The bit string value (Ŭ1 ⊗ Ŭ2 ... ⊗ ŬN−1) Ŭ corresponds to four Pauli operations {I, X, Y, Z}. Afterwards, the selected will be transformed according to plain messages and their applied unitary transformations to where and are one of defined GHZ states. Next, transmitted to , performs N – GHZ measurement on his particle and particles. Afterwards, the quantum server calculates the status of his particle according to x basis {+, −} and announces his measurement results. uses his measurements’ and the quantum server publication for retrieving the original secret sent bits by . (See Supplementary Figures S1 and S3 for Communication Process between Two and Three Disjoint Users with Partial Support of Quantum Server respectively).
Generalization of Communication Process between N Disjoint Users with Full Cooperation of Quantum Server
Here, we generalize our approach for Communication Process between N Disjoint Users with full Cooperation of Quantum Server as shown in Fig. 4B. The sequence of the steps is similar to a partial one except that the selected will be transformed to where and are one of the defined GHZ states. Next, transmitted to the quantum server, quantum server performs N – GHZ measurement on his particle and particles. Afterwards, calculates the status of his particle according to x basis {+, −} and announces his measurement results. uses his publication and the quantum server measurement for retrieving the original sent secret bits by . (See Supplementary Figures S2 and S4 of Communication Process between Two and Three Disjoint Users with Full Support of Quantum Server respectively).
Communication Process Security Analysis
After retrieves the original secret sent bits which sent by , informs about the positions of the transmitted particles and the selected unitary transformation applied to them. Afterwards, verifies the selected particles by and obtains an approximation of error percentage in the communication process. If the error percentage is under the specified threshold both and can continue the transmission of the secret messages, otherwise the communication process will be terminated. If an attacker tries to spy on the transmitted GHZ particles, the attacker at most can obtain one particle. So, the attacker couldn’t decide which operation is applied by , consequently couldn’t retrieve any transmitted secret bits. Suppose that the attacker apply an operation on and his qubit see (Eq. (45)).
Correspondingly, applying the unitary operation requires the following conditions + = 1 and + = 1.
So, the state of the protocol is transformed as follows, Firstly, the states after made a unitary operation see (Eq. (46)).
Secondly, the states after the attacker applies a unitary transformation on and his qubit see (Eq. (47, 48))
As shown in (Eq. (47, 48)), the attacker can’t gain any information during intercepting the communication process. As well the attacker introduces an error probability of ½ irrespective of the sequence of measurement. For example, suppose that the attacker measurement is the same as means the applied unitary transformation may be I or Z. If the measurements are different then the possible applied unitary transformation may be X or Y.
Additional Information
How to cite this article: Farouk, A. "et al. A generalized architecture of quantum secure direct communication for N disjointed users with authentication. Sci. Rep. 5, 16080; doi: 10.1038/srep16080 (2015).
References
Bennett, C. H. & Brassard, G. Quantum Cryptography: Public Key Distribution And Coin Tossing’. Theoretical Computer Science 560, 7–11 (2014).
Nielsen, M. & Chuang, I. Quantum computation and quantum information . (Cambridge University Press, 2000).
Zeng, G. H. Quantum cryptology . (Science Press, 2006).
Assche, G. Quantum Cryptography and Secret-Key Distillation . (Cambridge University Press, 2006).
Sharbaf, M. S. Quantum Cryptography: A New Generation of Information Technology Security System. Sixth International Conference on Information Technology. Nevada, USA, IEEE, 1644–1648 (April, 2009).
Wooters, W. K. & Zurek, W. H. A Single Quantum Cannot Be Cloned. Nature 299, 802–803 (1982).
Stinson, D. Cryptography Theory and Practice 3rd ed. (CRC press, 2006).
Bennett, C. H. "et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895–1899, doi: 10.1103/PhysRevLett.70.1895 (1993).
Chakrabarty, I. Teleportation via a mixture of a two qubit subsystem of a N-qubit W and GHZ state. Eur. Phys. J. D 57 (2), 265–269, doi: 10.1140/epjd/e2010-00017-8 (2010).
Liang, H., Liu, J., Feng, S. & Chen, J. Quantum teleportation with partially entangled states via noisy channels. Quantum Inf Process 12(8), 2671–2687 (2013).
Kaye, P. & Laflamme, R. An Introduction to Quantum Computing . (Oxford University Press, 2007).
Bennett, C. & Wiesner, S. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 69, 2881–2884 (1992).
Poppe, A., Peev, M. & Maurhart, O. Outline of the SECOQC quantum-key distribution network in Vienna. Int. J. Quantum Inform . 6, 209–218 (2008).
Peev, M. "et al. “The SECOQC quantum key distribution network in Vienna” New J. Phys. 11, 075001, 1367–2630 (2009).
Elliott, C. Building the quantum network. New J. Phys. 4, 46, doi: 10.1088/1367-2630/4/1/346 (2002).
Elliott, C. "et al. Current status of the DARPA quantum network. Quantum Information and Computation III. 5815, 138–149 (2005).
Metwaly, A. F., Rashad, M. Z., Omara, F. A. & Megahed, A. A. Architecture of multicast centralized key management scheme using quantum key distribution and classical symmetric encryption. Eur. Phys. J. Spec. Top . 223, 1711–1728 (2014).
Gisin, N., Ribordy, G., Tittel, W. & Zbinden, H. “Quantum cryptography,” Rev. Mod. Phys. 74, 145–195 (2002).
Beige, A., Englert, B., Kurtsiefer, C. & Weinfurter, H. Secure communication with single-photon two-qubit states. J. Phys. A: Math. Gen . 35, 407–413 (2002).
Boström, K. & Felbinger, T. Deterministic Secure Direct Communication Using Entanglement. Phys. Rev. Lett. 89, 187902, http://dx.doi.org/10.1103/PhysRevLett.89.187902 (2002).
Deng, F. & Long, G. Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319, http://dx.doi.org/10.1103/PhysRevA.69.052319 (2004).
Deng, F., Long, G. & Liu, X. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317, http://dx.doi.org/10.1103/PhysRevA.68.042317 (2003).
Lucamarini, M. & Mancini, S. Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501, http://dx.doi.org/10.1103/PhysRevLett.94.140501 (2005).
Yan, F. & Zhang, X. “A scheme for secure direct communication using EPR pairs and teleportation. Euro. Phys. J. B 41, 75–78 (2004).
Cai, Q. The Ping-Pong protocol can be attacked without eavesdropping. Phys Rev Lett . 91, 109801, http://dx.doi.org/10.1103/PhysRevLett.91.109801 (2003).
Man, Z., Xia, Y. & An, N. Quantum secure direct communication by using GHZ states and entanglement swapping. J Phys B: At Mol Opt Phys . 39, 3855–3863 (2006).
Zhu, A., Xia, Y., Fan, Q. & Zhang, S. Secure direct communication based on secret transmitting order of particles. Phys. Rev. A 73, 022338, http://dx.doi.org/10.1103/PhysRevA.73.022338 (2006).
Xue, P., Han, C., Yu, B., Lin, X. & Guo, G. Entanglement preparation and quantum communication with atoms in optical cavities. Phys. Rev. A 69, 052318, http://dx.doi.org/10.1103/PhysRevA.69.052318 (2004).
Lee, H., Lim, J. & Yang, H. Quantum direct communication with authentication. Phys. Rev. A 73, 042305, http://dx.doi.org/10.1103/PhysRevA.73.042305 (2006).
Zhang, Z., Liu, J., Wang, D. & Shi, S. Comment on “Quantum direct communication with authentication”. Phys. Rev. A 75, 026301, http://dx.doi.org/10.1103/PhysRevA.75.026301 (2007).
Wang, C., Deng, F., Li, Y., Liu, X. & Long, G. Quantum secure direct communication with high dimension quantum superdense coding. Phys. Rev. A 71, 044305, http://dx.doi.org/10.1103/PhysRevA.71.044305 (2005).
Gao, T., Yan, F. L. & Wang, Z. X. Quantum secure direct communication by EPR pairs and entanglement swapping. Nuov Cimen S i Fis B, 119, 313–318 (2004).
Gao, T., Yan, F. L. & Wang, Z. X. A simultaneous quantum secure direct communication scheme between the central party and other M parties. Chin. Phys. Lett. 22, 2473–2476 (2005).
Wang, C., Deng, F. & Long, G. Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state. Opt Commun, 253, 15–20 (2005).
Wang, J., Zhang, Q. & Tang, C. Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358, 256–258 (2006).
Qing-Yu, C. & Bai-Wen, L. Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004).
Cai, Q. Y. Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006).
Long, G.-L. "et al. Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2, 251–272 (2007).
Chang, Y., Xu, C., Zhang, S. & Yan, L. Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Chinese Sci Bull, 59(21), 2541–2546 (2014), doi: 10.1007/s11434-014-0339-x.
Yan, C., Shi-Bin, Z. & Li-Li, Y. A Bidirectional Quantum Secure Direct Communication Protocol Based on Five-Particle Cluster State. Chinese Phys Lett, 30(9), 090301 (2013), doi: 10.1088/0256-307x/30/9/090301.
Li, J., Nie, J. R., Li, R. F. & Jing, B. Improved security detection strategy in quantum secure direct communication protocol based on four-particle green-horne-zeilinger state. Z Naturforsch A, 67(6), 369 (2012), doi: 10.5560/zna.2012-0029.
Jian, L., Dan-Jie, S., Xiao-Jing, G. & Bo, J. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation. Chinese Phys C . 36(1), 31 (2012), doi: 10.1088/1674-1137/36/1/005.
Li, W., Chen, J., Wang, X. & Li, C. Quantum Secure Direct Communication Achieved by Using Multi-Entanglement. Int J Theor Phys . 54(1), 100–105 (2014), doi: 10.1007/s10773-014-2205-7.
Li, Y. H., Li, X. L., Sang, M. H., Nie, Y. Y. & Wang, Z. S. Bidirectional controlled quantum teleportation and secure direct communication using five-qubit entangled state. Quantum Inf Process, 12(12), 3835–3844 (2013), doi: 10.1007/s11128-013-0638-1.
Qin, S. J. Reexamining the security of controlled quantum secure direct communication by using four particle cluster states. Fopt . 51(9), 2714–2718 (2012), doi: 10.1007/s10773-012-1181-z.
Shukla, C., Pathak, A. & Srikanth, R. beyond the Goldenberg–Vaidman protocol: secure and efficient quantum communication using arbitrary, orthogonal, multi-particle quantum states. Int. J. Quant. Inform, 10(08), 1241009 (2012), doi: 10.1142/s0219749912410092.
Wang, J., Zhang, Q. & Tang, C. J. Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt Comm, 266(2), 732–737 (2006), doi: 10.1016/j.optcom.2006.05.035.
Xiao-Ming, X., Li, D., Ya-Jun, G. & Feng, C. Quantum secure direct communication with four-particle genuine entangled state and dense coding. Commun Theor Phys, 52(1), 60 (2009), doi: 10.1088/0253-6102/52/1/13.
Xiu, X. M., Dong, L., Gao, Y. J. & Chi, F. Quantum secure direct communication using six-particle maximally entangled states and teleportation. Commun Theor Phys . 51(3), 429–432 (2009), doi: 10.1088/0253-6102/51/3/09.
Yadav, P., Srikanth, R. & Pathak, A. Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique. Quantum Inf Process . 13(12), 2731–2743 (2014), doi: 10.1007/s11128-014-0825-8.
Long, G. L. Quantum secure direct communication. In Conference on Coherence and Quantum Optics. New York, United States, Optical Society of America (pp. M6-42). (June, 2013).
Long, G. L. & Liu, X. S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A . 65 (3), 032302 (2002).
Yuan, H., Zhang, Q., Hong, L., Yin, W. J. & Xu, D. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs. Int J Theor Phys . 53(8), 2565–2570 (2014).
Beige, A., Englert, B. G., Kurtsiefer, C. & Weinfurter, H. Secure Communication with a Publicly Known Key. Acta. Phys. Pol. A . 101(3), 357–368 (2002).
Gao, T., Yan, F. L. & Wang, Z. X. Deterministic secure direct communication using GHZ states and swapping quantum entanglement. J. Phys. A: Math. Gen . 38(25), 5761 (2005).
Xiu, X. M., Dong, L., Gao, Y. J. & Chi, F. Controlled deterministic secure quantum communication using five-qubit entangled states and two-step security test. Opt Comm, 282(2), 333–337 (2009).
Ye, T. Y. Quantum secure direct dialogue over collective noise channels based on logical Bell states. Quantum Inf Process . 14(4), 1487–1499 (2015).
Yan, C., Shi-Bin, Z., Li-Li, Y. & Gui-Hua, H. Faithful deterministic secure quantum communication and authentication protocol based on hyper entanglement against collective noise. Chinese Phys B, 24(8), 80306–80313 (2015).
Wang, T., Wen, Q. & Zhu, F. Controlled quantum secure direct communication with quantum encryption. Int. J. Quant. Inform . 6, 543–551 (2008).
Cai, Q. & Li, B. Improving the capacity of the Boström-Felbinger protocol. Phys. Rev. Lett. 69, 054301, http://dx.doi.org/10.1103/PhysRevA.69.054301 (2004).
Ying, S., Qiao-Yan, W. & Fu-Chen, Z. Multiparty Quantum Chatting Scheme. Chin. Phys. Lett. 25, 828–831 (2008).
Curty, M. & Santos, D. Quantum authentication of classical messages. Phys. Rev. A 64, 062309, http://dx.doi.org/10.1103/PhysRevA.64.062309 (2001).
Dušek, M., Haderka, O., Hendrych, M. & Myška, R. Quantum identification system. Phys. Rev. A 60, 149–156 (1999).
Zeng, G. & Zhang, W. Identity verification in quantum key distribution. Phys. Rev. A 61, 022303, http://dx.doi.org/10.1103/PhysRevA.61.022303 (2001).
Ljunggren, D., Bourennane, M. & Karlsson, A. Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305, http://dx.doi.org/10.1103/PhysRevA.62.022305 (2000).
Biham, E., Huttner, B. & Mor, T. Quantum cryptographic network based on quantum memories. Phys. Rev. A 54, 2651–2658 (1996).
Einstein, A., Podolsky, B. & Rosen, N. Can quantum mechanical description of physical reality be considered complete? Phys. Rev . 47, 777–780 (1935).
He, G. Q., Zhu, J. & Zeng, G. H. Quantum secure communication using continuous variable EPR correlations. Phys. Rev. A . 73, 1–7 (2006).
Kwiat, P. G. "et al. New high-intensity source of polarization-entangled photon pairs. Phys Rev Lett . 75(24), 4337, http://dx.doi.org/10.1103/PhysRevLett.75.4337 (1995).
Huang, Y. F. "et al. Experimental generation of an eight-photon Greenberger–Horne–Zeilinger state. Nature communications . 2, 546, doi: 10.1038/ncomms1556 (2011).
Greenberger, D. M., Horne, M. A. & Zeilinger, A. Bell’s Theory, Quantum Theory and Conceptions of the Universe . 69–72 (Kluwer Academic Publishers, 1989).
Pan, J. "et al. Experimental entanglement of six photons in graph states. Nature Physics 3, 91–95 (2007).
Xia, Y., Lu, P. & Zeng, Y. Effective protocol for preparation of N-photon Greenberger–Horne–Zeilinger states with conventional photon detectors. Quantum Inf Process, 11(2), 605–613 (2011), doi: 10.1007/s11128-011-0271-9.
Xia, Y., Song, J. & Song, H. S. Linear optical protocol for preparation of N-photon Greenberger-Horne-Zeilinger state with conventional photon detectors. Appl phys lett, 92(2), 1127, doi: 10.1063/1.2836268 (2008).
Zhao, Z. "et al. Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature, 430(6995), 54–58 (2004).
Xu, T., Xiong, W. & Ye, L. A scheme for generation of multi-photon GHZ states with cross-Kerr nonlinearities. J At Mol Sci . 4(1), 72–78 (2013), doi: 10.4208/jams.030111.032211a.
Simmons, G. J. Message Authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques. 12th IEEE Annual Electronics and Aerospace Conference, Washington, USA, IEEE, 661–662 (December, 1979).
Simmons, G. J. Authentication theory/coding theory. Advances in Cryptology-Proceedings of Crypto 84, Paris, France,Springer Berlin Heidelberg, 196, 411–431 (August, 1985).
Holevo, A. S. Statistical problems in quantum physics. Proceedings of the second Japan-USSR Symposium on probability theory, 330, 104–119 (1973).
Acknowledgements
A.F. would like to thanks Josep Batle, Yan-Bing Li, Mosayeb Naseri, Nanrun Zhou and Ming-Ming Wang for their fruitful discussion and helpful comments.
Author information
Authors and Affiliations
Contributions
A.F. and F.O. prepare authentication process, analysis of communication and authentication processes. A.F. prepares all figures and mathematics calculations. A.F., M.Z. and A.M. prepare the various types of communication process. All authors reviewed the manuscript and contributed for discussions of the project.
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Electronic supplementary material
Rights and permissions
This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/
About this article
Cite this article
Farouk, A., Zakaria, M., Megahed, A. et al. A generalized architecture of quantum secure direct communication for N disjointed users with authentication. Sci Rep 5, 16080 (2015). https://doi.org/10.1038/srep16080
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/srep16080
This article is cited by
-
A Quantum Dialogue Protocol in Discrete-time Quantum Walk Based on Hyperentangled States
International Journal of Theoretical Physics (2020)
-
Secure dynamic multiparty quantum private comparison
Scientific Reports (2019)
-
Improvement on ‘Multiparty Quantum Key Agreement with Four-Qubit Symmetric W State’
International Journal of Theoretical Physics (2019)
-
The Population Inversion and the Entropy of a Moving Two-Level Atom in Interaction with a Quantized Field
International Journal of Theoretical Physics (2018)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.