Secure Information Exchange Without Prior Key Distribution via Single-photon Hyperstates
Author affiliations
DOI:
https://doi.org/10.15625/0868-3166/17064Keywords:
Secure information exchange, information leakage, single-photon hyperstatesAbstract
Methods for two distant parties to exchange their secret messages using single photons are considered. There existed several such methods but they are either insecure or face with information leakage problem. Recently, Ye et al. [Quantum Inf. Process. 20 (2021) 209] have reported a method using single photons in both polarization and spatial degrees of freedom that is both efficient and resistant from information leakage. However, this method is not so feasible as it has specific limitations, namely, it requires availability of quantum memory and high classical communication cost. We propose in this paper a new method to overcome the above-said limitations. Our method is also efficient because we also use single photons in two degrees of freedom. However, the encoding operation in our method is modified so that no quantum memory is demanded at all and the execution of our method is simpler compared to the method of Ye et al. Moreover, the cost of classical communication in our method is 50\% cheaper than that in the method of Ye et al. Therefore, our method proves to be feasible, simple and economical that could be realized by means of current technologies.
Downloads
References
E. Schr¨odinger, Mathematical Proceedings of the Cambridge Philosophical Society 31 (1935) 555.
C. Bennett and S. Wiesner, Phys. Rev. Lett. 69 (1992) 2881.
C. H. Bennett, G. Brassard, C. Cr´epeau, R. Jozsa, A. Peres and K. W. Wootters, Phys. Rev. Lett. 70 (1993) 1895.
C. H. Bennett, D. P. DiVincenzo, P. W. Shor, J. A. Smolin, B. M. Terhal and W. K. Wootters, Phys. Rev. Lett. 87 (2001) 077902.
B. A. Nguyen and J. Kim, J. Phys. B: At. Mol. Opt. Phys. 41 (2008) 095501.
P. W. Shor, Proceedings 35th Annual Symposium on Foundations of Computer Science. IEEE Comput. Soc. Press., 1994, pp. 124 - 34.
A. R. Calderbank, E.M. Rains, P. W. Shor and N.J. A. Sloane, IEEE Transactions on Information Theory 44 (1998) 1369.
A. Ekert, Phys. Rev. Lett. 67 (1991) 661.
C. H. Bennett and G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing 175 (1984) 8.
M. Hillery, V. Buˇzek, and A. Berthiaume, Phys. Rev. A 59 (1999) 1829.
G. P. Guo and G. C. Guo, Phys. Lett. A 310 (203) 247.
B. A. Nguyen, Phys. Lett. A 328 (2004) 6.
B. A. Nguyen, J. Kor. Phys. Soc. 47 (2005) 562.
Y. Chen, Z. X. Man and Y.J. Xia, Chinese Phys. Lett. 24 (2007) 19.
D. Liu, J. L. Chen and W.Jiang, Int. J. Theor. Phys. 51 (2012) 2923.
F. Gao, F. Z. Guo, Q. Y. Wen and F. C. Zhu, Sci. China Ser. G: Phys, Mech. and Astr. 51 (2008) 559.
Y. G. Tan and Q. Y. Cai Q. Y. Int. J. Quant. Inf. 6 (2008) 325.
N. R. Zhou, T. X. Hua, G. T. Wu, C. S. He and Y. Zhang, Int. J. Theor. Phys. 53 (2014) 3829.
Downloads
Published
How to Cite
Issue
Section
License
Communications in Physics is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright on any research article published in Communications in Physics is retained by the respective author(s), without restrictions. Authors grant VAST Journals System (VJS) a license to publish the article and identify itself as the original publisher. Upon author(s) by giving permission to Communications in Physics either via Communications in Physics portal or other channel to publish their research work in Communications in Physics agrees to all the terms and conditions of https://creativecommons.org/licenses/by-sa/4.0/ License and terms & condition set by VJS.


