Quantum secure direct communication based on four-particle cluster state grouping

Quantum secure direct communication based on four-particle cluster state grouping

Accepted Manuscript Quantum Secure Direct Communication Based on Four-particle Cluster State Grouping Zhengwen Cao, Dan Song, Geng Chai, Chen He, Gua...

1MB Sizes 0 Downloads 16 Views

Accepted Manuscript

Quantum Secure Direct Communication Based on Four-particle Cluster State Grouping Zhengwen Cao, Dan Song, Geng Chai, Chen He, Guang Zhao PII: DOI: Reference:

S0577-9073(18)31028-1 https://doi.org/10.1016/j.cjph.2019.01.019 CJPH 794

To appear in:

Chinese Journal of Physics

Received date: Revised date: Accepted date:

25 July 2018 22 November 2018 17 January 2019

Please cite this article as: Zhengwen Cao, Dan Song, Geng Chai, Chen He, Guang Zhao, Quantum Secure Direct Communication Based on Four-particle Cluster State Grouping, Chinese Journal of Physics (2019), doi: https://doi.org/10.1016/j.cjph.2019.01.019

This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

ACCEPTED MANUSCRIPT

Highlights • The technical design enhances the communication efficiency and the qubit-

CR IP T

utilization ratio. • 91.921% of information can be exchanged in lossy channel.

• Bandwidth or lower frequency of channel needs to be considered in practical implementations.

• Appropriate error-correcting codes of receiver make up for the channel

AC

CE

PT

ED

M

AN US

deficiency.

1

ACCEPTED MANUSCRIPT

Quantum Secure Direct Communication Based on Four-particle Cluster State Grouping

a School

CR IP T

Zhengwen Caoa,∗, Dan Songa , Geng Chaia , Chen Hea , Guang Zhaoa of Information Science and Technology, Northwest University, Xi’an 710127, China

Abstract

In this paper we present a quantum secure direct communication protocol based

AN US

on four-particle cluster states. In our protocol both the sender and the receiver keep two particles of the cluster state, and we verify that our protocol can prevent the eavesdropper from intercepting valid messages. Meanwhile, we also analyze our protocol in a lossy channel under the attack of an eavesdropper. We show that both the communication efficiency and the qubit-utilization ratio

M

are improved compared with other existing schemes.

Keywords: Quantum secure direct communication, cluster state, lossy channel

ED

2010 MSC: 81P45

1. Introduction

PT

Quantum secure direct communication (QSDC) is an emerging type of quantum communication which is different from Quantum Key Distribution. A fundamental difference is that the secret information is directly transmitted through the quantum channel. QSDC was first proposed in [1], [2], [3], and then [4], [5]

CE 5

developed the idea of quantum dense-coding and proposed a scheme which em-

AC

ployed quantum entangled states to achieve approximate security. The use of various quantum states as the informational carrier in the QSDC

✩ This work is supported by the Natural Science Basic Research Program of Shaanxi Province (No. 2018JM6123), Project of Graduate Independent Innovative of Northwest University, China (Grant No. YZZ17173, No. YZZ17175). ∗ Corresponding author Email address: [email protected] (Zhengwen Cao)

Preprint submitted to Journal of LATEX Templates

February 27, 2019

ACCEPTED MANUSCRIPT

protocol includes a single photon state [6], the Bell state [5], [7], [8], the GHZ 10

state [9], [10], [11], the W state [12], [13] and the cluster state. Many QSDC protocols have been proposed using the cluster state to improve the perfor-

CR IP T

mance. In [14] the cluster state was proposed as a new entangled state, and [15] defined the maximal multi-entangled state (MMES) for the first time. [16], [17], [18] experimentally implemented the preparation of the cluster state. Sub15

sequently, [19] and [20] designed quantum teleportation protocols to transmit

single photon and EPR particles via cluster state channels. The authors in [21] and [22] loaded classical information into cluster state particles to realize QSDC.

AN US

The security of the quantum communication protocols has been gradually improved.

Based on the property of the cluster state, in this paper we propose a new

20

approach to further improve the performance of QSDC. The proposed protocol has some nice properties. First, the cluster states are just one-time transmitted particles in the quantum channel, so that the communication efficiency is im-

25

M

proved. Second, by analyzing the security bound of our protocol, we show that our work can be employed for error-correction in a lossy channel.

ED

The rest of this paper is organized as follows. In Sec. 2 we introduce our protocol based on four-particle cluster states. In Sec. 3 we show the security verification of the protocol under three major attacks, and in Sec. 4 we give some

30

PT

analysis in the case of a lossy channel. We compute the quantum communication transmission efficiency and the qubit-utilization ratio of this protocol in Sec. 5.

CE

Finally we conclude this work in Sec. 6.

AC

2. The proposed protocol based on four-particle cluster states Our QSDC protocol in this paper is based on four-particle cluster states. A

nice property of a cluster state is that it can maintain persistent entanglement

35

and a stable self-associated structure, based on which the entanglement of the cluster state is maintained despite the remote distance. Even if it is measured, the entanglement characteristic cannot be easily destroyed and disturbed by

3

ACCEPTED MANUSCRIPT

the de-coherence effect. As is shown in Fig. 1, at the beginning the cluster state consists of four particles a1 , a2 , a3 , and a4 , which are entangled before 40

measurement. Assuming that particle a2 is separated from the cluster state

CR IP T

via measurement, the remaining particles are still entangled. Hence, the fourparticle cluster state is transformed into a three-particle cluster state.

After the measurement

AN US

Before the measurement

Figure 1: The measurement of one particle of the cluster state.

2.1. The main idea of the proposed protocol

We employ the four-qubit cluster state to prepare the quantum communication channel:

1 (|0000i + |0011i + |1100i − |1111i)1234 , 2

(1)

ED

|ψi1234 =

M

45

where the subscripts 1, 2, 3 and 4 indicate the four correlated particles, |0i and

PT

|1i are the computational basis of the single particle. Alice

CE

a1

AC

a3

a2

Entangled Channel

a4

Bob

Alice

Bob

a2

a1

PM

a3

Collapsed Channel a4

Figure 2: The PM of two particles of the cluster in our protocol.

The entangled channel of our protocol is illustrated in Fig. 2, where Alice and

Bob are the legitimate sender and receiver, respectively. At the very beginning, 50

a channel security test is performed: a single photon is randomly inserted in

4

ACCEPTED MANUSCRIPT

the particle sequences which are then sent from Alice to Bob. Bob returns the measurement results of the positions of the photons to Alice for the comparison test. Alice loads the encrypted information via local unitary operations. Then

55

CR IP T

the cluster state is measured with the projective measurement (PM) by Alice and Bob, respectively. Finally, Bob recovers the classical initial cryptographs with Alice’s PM results. 2.2. The flow chart of the QSDC protocol

In this section we describe the details of the protocol, which include the

AN US

following steps.

Step 1 (particle preparation): Alice prepares N groups of four-particle cluster

60

states and records the qubits information. She divides these four-particle cluster groups into two sequences, namely, S1 (a1 , a3 ) and S2 (a2 , a4 ). She keeps one of the sequences S1 (a1 , a3 ) and sends the other S2 (a2 , a4 ) to Bob.

Step 2 (channel detection): Alice randomly inserts some single photons in the sequence as a detection sequence S2 0 and records the positions of the photons.

M

65

She preserves the measurement basis sequence used for preparing the single

ED

photons and sends the detecting sequence S2 0 to Bob via the quantum channel. Bob receives the whole sequence of S2 0 . Meanwhile, Alice transmits the position information of the photons to Bob through the classical channel. Bob selects the measurement basis randomly, X-basis or Z-basis, for the single photon of

PT

70

the corresponding position based on the position information of the photons

CE

sent by Alice. The X-basis can be expressed as: 1 |−i = √ (|0i − |1i) . 2

1 |+i = √ (|0i + |1i) , 2

(2)

AC

Then Bob returns the measurement basis sequence to Alice by the classical channel. Alice compares the measurement basis sequence from Bob to ensure

75

the channel’s safety. If the error rate is higher than the security threshold, the channel is unsafe and there exists an eavesdropper. In this case the communication should be terminated, otherwise, the channel is safe and we can implement step 3. 5

ACCEPTED MANUSCRIPT

Step 3 (encoding): If the channel is safe, the original information sequence 80

M can be transmitted from Alice to Bob. The different local unitary operations are selected by Alice to encode the original information sequence M on the

CR IP T

quantum states sequence S1 (a1 , a3 ). The local unitary operation is expressed as: I = |0i h0| + |1i h1| ,

X = |0i h1| + |1i h0| ,

(3)

where I and X belong to the Pauli matrices [23]. The relationship between 85

the unitary transformations and the classical information sequence of the cor-

AN US

responding particles a1 , a3 is shown in Table 1.

Table 1: Unitary transformation corresponding to the coding regulation.

a1

a3

00

I

I

01

X

X

10

X

I

11

I

X

M

Information sequence

ED

Step 4 (measurement): Alice performs a PM on the two particles that she has reserved. Bob performs a PM on the two particles a2 and a4 which he holds and records the measurement results. After that, Alice sends her measurement results as a classical message to Bob via the classical channel.

PT

90

Step 5 (message recovery): Bob compares his measurement results with Alice’s measurement results to determine which unitary operation is selected

CE

by Alice. Thereby he can recover the original information sequence M . The corresponding encoding regulation is shown in Table 2. For instance, if the four-qubit cluster state is |0011i, then Alice’s measurement will be |11i because

AC

95

of the encoding operation of XI. If Bob gets his PM as |01i, he will obtain the classical information sequence ‘M ’ as ‘10’.

6

CR IP T

ACCEPTED MANUSCRIPT

Table 2: The correspondence of the measurement results and the unitary transformations.

Transform

Alice’s result

Bob’s result

|0i |0i

I ⊗I

|0i |0i

|0i |0i

|0i |1i

I ⊗I

|0i |1i

|0i |1i

|1i |0i

I ⊗I

|1i |0i

|1i |0i

|1i |1i

I ⊗I

|1i |1i

|1i |1i

|0i |0i

X ⊗X

|1i |1i

|0i |0i

|0i |1i

X ⊗X

|1i |0i

|0i |1i

|1i |0i

X ⊗X

|0i |1i

|1i |0i

|1i |1i

X ⊗X

|0i |0i

|1i |1i

|0i |0i

X ⊗I

|1i |0i

|0i |0i

|0i |1i

X ⊗I

|1i |1i

|0i |1i

|1i |0i

X ⊗I

|0i |0i

|1i |0i

|1i |1i

X ⊗I

|0i |1i

|1i |1i

|0i |0i

I ⊗X

|0i |1i

|0i |0i

|0i |1i

I ⊗X

|0i |0i

|0i |1i

|1i |0i

I ⊗X

|1i |1i

|1i |0i

|1i |1i

I ⊗X

|1i |0i

|1i |1i

M

ED

PT AC

CE

AN US

PM bases

7

M

00

01

10

11

ACCEPTED MANUSCRIPT

3. Security analysis We verify the security of our protocol under three major attacks and two situations in a noisy channel of QSDC: the intercept-resend attack, the entangled CNOT attack and the assisted particle attack.

CR IP T

100

The interception and resend attack: Eve can capture part of the par-

ticles and send her own quantum state to Bob in advance. Since there are four possible outcomes in the measurement of the PM measured quantum states, 105

Eve intercepts these two particles and gets the right measurement results with the probability of

1 4.

Let us assume that Alice sends N qubits to Bob in each

AN US

communication. Eve needs to recover all the N qubits and sends the N decoy

qubits to Bob. The probability will be ( 41 )N and it will approach to 0 with an increase of N . That is to say, the more qubits exchanged between Alice and 110

Bob in one communicating process, the more unlikely it will be that Eve obtains all the information of the qubits. Therefore, the eavesdropping attack can be

M

found during Bob’s detection process.

The entangled CNOT attack: Eve can perform a CNOT operation when Alice is sending particles to Bob. Suppose the particles a5 and a6 are generated by Eve which are entangled with a2 and a4 of the cluster state. Eve can group

ED

115

a2 and a4 with a5 , a6 , respectively. The particles (a2 and a4 ) are the controlled qubits, and the particles (a5 and a6 ) are the target qubits. The quantum system

PT

will become:

AC

CE

|Ψi123456

1 (|000000i123456 + |110001i123456 + 2 |001110i123456 − |111111i123456 ) 1 = (|00i13 |0000i2456 + |10i13 |1001i2456 + 2 |01i13 |0110i2456 − |11i13 |1111i2456 )  1 − + + = [ φ 13 φ 24 φ 56 + φ− 24 φ− 56 + 2 + + −  φ φ φ + φ− 24 φ+ 56 + 13 24 56 + + +  ϕ ϕ ϕ + ϕ− 24 ϕ− 56 + 13 24 56 − + − − +  ϕ ϕ ϕ ϕ ϕ ]. + 13 24 56 24 56 =

8

(4)

ACCEPTED MANUSCRIPT

We can obviously determine that Eve is correspondingly equal to Bob. How120

ever, Eve can be discovered during the single photon detection process, since Alice and Bob will get 50% incorrect results when they analyze the classical

CR IP T

results. Meanwhile, they deem that the channel is not safe. Therefore, the implementation of the entanglement attack is ineffective.

The assisted particle attack: Let us assume that Eve steals some of 125

the information. She performs an operation and creates an entangled state

with the two particles in the sequence S2 . According to the Stinespring dilation theorem [4], Eve’s eavesdropping is equivalent to performing a unitary operation

AN US

ˆ on the Hilbert space, which consists of quantum signals and auxiliary systems. E

The auxiliary state of Eve is |ei. We assume the entanglement between a2 and 130

a4 can be shown as |φ+ i = |ϕiEve

√1 2



(|0i |0i + |1i |1i), and then

 |0i ⊗ |0ei + |1i ⊗ |1ei √ 2 α |00e00 i + β |01e01 i + α0 |11e11 i + β 0 |10e10 i √ , 2

ˆ⊗ E

=

(5)

M

=

where α, α0 , β and β 0 are complex amplitudes of the singlet states and |α|2 +

ED

|β|2 = 1, and the same for α0 and β 0 . The error rate of Eve’s attack is 2

2

2

PError = |β| = 1 − |α| = 1 − |α0 | .

(6)

PT

It can be seen that Eve is bound to interfere with the system and change the states under an auxiliary particle attack, which will be discovered by the legiti135

mate communication party in the channel security detection phase.

CE

In view of information theory, the accessible amount of information in the

AC

quantum system is limited to the Holevo bound [24], χ(ρ) = S(ρ) −

X

pi S(ρi ),

(7)

i

where S(ρ) is the von Neumann entropy of the state ρ and ρ =

P

i

pi ρi . ρi is the

quantum state which is prepared by the communicating party with probability

140

pi . If the communicating party produces a state |0i or |1i with a probability of P 1 i pi log pi = 1 bits. 2 , the entropy of the photon in the sequence is H(P ) = − 9

ACCEPTED MANUSCRIPT

Eve can obtain a message, which satisfies the inequality IE ≤ S(ρ) −

X

pi S(ρi ) < H(P ).

(8)

i

CR IP T

Since there are four encoding ways of unitary transformations between Alice and Bob, they can exchange 2-bit information via two particles. Assuming the 145

information is disclosed, Eve will deduce the corresponding unitary transforma-

tion which contains only 2 × (− 41 log2 41 ) = 1 bits of unknown information. It can be seen from Eq. (8) that Eve can get 1-bit of information at most. But in

the detection step Eve will be found out, because this cluster state is disturbed.

150

AN US

Therefore, Eve will be discovered and the communication will be terminated. It

is worth mentioning that the single photon detection and the unitary operation selection should be random so that our protocol can identify a variety of attacks. There are three other attacks existing in quantum communications: the denial of service attack, the invisible photon-Trojan horse attack and the time

155

M

delay-Trojan horse attack. First, the eavesdropper cannot perform unitary operations on photons, because each of them is determinate and after the operation the photon will be disturbed and the legal party will be aware of the disturbance.

ED

Second, the eavesdropper must insert other photons with different wavelengths, then Alice encodes these photons with a unitary operation. Eve can obtain the corresponding unitary operation but not the initial information, because the unitary operation is dependent on wavelength. Finally, the time delay-Trojan

PT

160

horse attack is described as Eve inserting a photon with the same wavelength

CE

but not synchronized. In this case, Eve cannot recover the valid information of the unitary operation.

AC

4. The communication in a lossy channel

165

As we all know, QSDC can be implemented when the communication ar-

rives at a level of unconditional security theoretically. Let us consider a special circumstance where the communication channel is a lossy one. Meanwhile, we can regard this situation as the one where the eavesdropper controls the legal 10

ACCEPTED MANUSCRIPT

communication channel. We assume that A and B represent Alice and Bob, 170

respectively.

CR IP T

4.1. The mutual information of the channel transmission probability The channel transmission probability is γ ∈ [0, 1]. Then, let us discuss the relation between the channel capacity and the channel transmission probability.

Assume that Alice can send a perfect state with probability P (A1 ), while Bob 175

can correctly receive the state with probability P (B1 |A1 ) = γ. On the other hand, the transmitting probability of an imperfect state of Alice and the prob-

AN US

ability of corresponding reception by Bob are P (A2 ) and P (B1 |A2 ) = 1 − γ, respectively. Therefore, P (B2 |A1 ) = 1 − γ and P (B2 |A2 ) = γ. Meanwhile, Bob

will correctly receive the state with a probability of P (B1 ) and an incorrect 180

one with P (B2 ). Hence, we need to consider how P (Ai |Bi ) changes with the increase of channel transmission probability γ and i ∈ 1, 2.

Alice prepares a perfect state and sends it to Bob with probability of P (A1 ) =

M

p and an imperfect one with P (A2 ) = 1 − p, where p ∈ [0, 1]. We can express P (B1 ) with the Law of Total Probability. X i

185

P (Ai )P (B1 |Ai ) = 2pγ + 1 − γ − p.

ED

P (B1 ) =

(9)

So, P (B2 ) = 1 − P (B1 ) = −2pγ + γ + p. P (Ai |Bi ) can be calculated with Bayes’

AC

CE

PT

theorem as follows:

pγ , 1 − p − γ + 2pγ 1 − γ − p + pγ , P (A2 |B1 ) = 1 − p − r + 2pγ p − pγ P (A1 |B2 ) = , p + γ − 2pγ γ − pγ P (A2 |B2 ) = . p + γ − 2pγ

P (A1 |B1 ) =

(10) (11) (12) (13)

According to the definition of entropy, the mutual information I(A; B) can be represented in Eq. (14) and simulated in Fig. 3. I(A; B)

= H(Ai ) − H(Ai |Bi ) 11

ACCEPTED MANUSCRIPT

= −

X i

[−

P (Ai ) log2 P (Ai ) −

X

X i

P (Ai |Bj ) log2 P (Ai |Bj )].

(14)

AN US

CR IP T

j

P (Bj )

Figure 3: A schematic plot of the relation among the channel transmission probability (γ), the source probability (P (A1 )) and the mutual information (I(A; B)) in a lossy channel. The

M

‘∗’ depicts a coordinate (γ, P (A1 ), I(A; B)) when P (A1 ) = 0.5.

We present the relation between the channel transmission probability (γ), the source probability (P (A1 )) and the mutual information (I(A; B)) in Fig. 3.

ED

190

It is worth mentioning that we only consider the binary communication channel which has the supreme value of entropy at 1 bit/symbol, theoretically. The

PT

channel is symmetric and the mutual information reaches the maximum when P (A1 ) = 0.5.

According to the property of the von Neumann entropy [25], if P (Ai ) is the

CE

195

probability of the proportion of perfect cluster state, I(A; B) needs to satisfy

AC

an inequality, X S( P (Ai )ρi ) ≥ I(A; B),

(15)

i

where S is an entropy of the probability based on the different state sent by Alice.

200

Assume that in our case Alice needs to transmit two particles S2 (a2 , a4 ) with

12

ACCEPTED MANUSCRIPT

the form of a reduced density matrix: = tr(|φ+ ihφ+ |) = 1.

trρi

(16)

S(

X

P (Ai )ρi ) = 1.

i

CR IP T

The von Neumann entropy can be calculated in Eq. (17),

(17)

We can see that our protocol can transmit the maximum information Imax = 2 bits. From Fig. 3, there exists I0.5(A;B) = 0.91921 bits per unit. Therefore, we 205

can obtain I(A; B) = 2 ·

0.91921 1

= 1.83842 bits, which satisfies the inequality in

AN US

Eq. (15). Therefore, we need to choose a communication channel with efficiency larger than 0.5. From the simulation, the maximum number needs to satisfy 0.5 ≤ γ ≤ 0.99 when P (A1 ) = 1, simultaneously. 4.2. Bit error-correcting in a lossy channel

If the information is transferred in an awful channel, like a Gaussian channel,

210

M

let us discuss the measurement which is taken by Bob for a secure communication. We can clearly see that Eve can steal 1 bit of information at most from

ED

the above analysis, so there will be a 1 bit error in each unit of the four-particle cluster states. Therefore, Bob needs to correct the error bits in the sequence, if 215

he does not throw away those error bits. Let us seek a solution for this problem,

PT

which means that the error rate is higher than the threshold, i.e., an insecure communication.

CE

Our protocol can exchange 2 bits via 2 qubits, so Bob needs to detect these 2 error qubits and correct one of them. There exists four types of states which

220

need to be exchanged, like |0i |0i, |0i |1i, |1i |0i and |1i |1i. After an lossy trans-

AC

mission, all the four will be changed in two situations, one is |0i |1i, |0i |0i, |1i |1i and |1i |0i, and the other one is |1i |0i, |1i |1i, |0i |0i and |0i |1i. According to the quantum error correcting condition [24], the error can be expressed as Pauli matrices [24]. Likewise, I, X, Y, Z represents no error, bit-flipped, bit&phase-

225

flipped and phase-flipped errors occurring in any of the two indifferent qubits,

13

ACCEPTED MANUSCRIPT

respectively. We just need to consider the bit-flipped error and phase-flipped error in our protocol. The errors, which exist in one of two qubits, can be expressed as IX, XI,

230

CR IP T

IZ and ZI. Bob needs to seek the corresponding anticommutation relation operators for these errors and construct the quantum error-correcting code for our protocol.

Table 3: The anticommutation relation operators with two errors.

IX

XI

IZ

ZI

Operators

IZ

ZI

IX

XI

AN US

Errors

During the channel detection stage, both legal sides of the communication will detect the error, which means that there exists an eavesdropper. In this case, Bob receives the error information and needs to recover and correct it. Alice 235

encodes the secret information into two qubits, the quantum error-correcting

M

code can be constructed in Eq. (18), where Mi is the row of the matrix of the quantum error-correcting code.

ED

g1 :

M1 = XX

g2 :

M2 = XZ

g3 :

M3 = ZX

(18)

PT

Assuming that in one of the two qubits a bit-flipping error occurs, such as the second qubit, EX2 = IX. Here, I means that the first qubit has no error. Bob can implement his quantum error-correcting code on this error EX2 .

CE

240

That is to say, there exists a gi satisfying the anticommutation relationship, i.e.

AC

{Mi , EX2 } = 0. It can be calculated as follows: M2 EX2

= (X ⊗ Z)(I ⊗ X) = (I ⊗ X)(X ⊗ Z) = X ⊗ ZX = −(X ⊗ XZ) = −EX2 M2 .

(19)

Then Bob can detect that the error occurred in the second qubit via the quantum

14

ACCEPTED MANUSCRIPT

error-correcting code {g1 , g2 , g3 }, and correct it via the corresponding anticom245

mutation relation operators.

The transmission efficiency of our protocol is ξ =

CR IP T

5. Efficiency analysis bs qt +bt

=

2 4+2

= 0.33, where

bs is the useful classical bits which should be exchanged, qt is the total number

of qubits, bt is the total number of classical bits. The encoding regulation is 1 250

qubit corresponding to 1 bit information. There are only two particles involving the encoding of the message. The qubit-utilization ratio is η =

qu qt

=

2 4

= 0.5,

AN US

where qu is the useful number of qubits which are transmitted in the protocol. A comparison with other related protocols is shown in Table 4.

[26] designed a QSDC protocol based on five-particle cluster state. We can 255

see that 2 bit classical information was transmitted via a 5 qubit, which had a lower qubit utilization ratio than our work. [27] and [28] proposed two QSDC

M

protocols based on a four-particle cluster state. In [27], there was 1 bit exchanged in communication, which is less than 2 bits. Meanwhile, an XORoperation needs to be engaged in the receiver and controller in [28]. This is redundant, since the quantum property can guarantee the security of commu-

ED

260

nication, and the efficiency will be decreased with more information exchanged.

PT

Therefore, it is clear that the efficiency and qubit utilization ratio of the suggested protocol are higher than the protocols of [26], [27] and [28].

AC

CE

Table 4: The efficiencies of different protocols.

Protocol

Efficiency ξ

Qubit utilization ratio η

Wang et al. [27]

0.10

0.20

Chang et al. [26]

0.14

0.25

Nanvakenari et al. [28]

0.18

0.33

Proposed protocol

0.33

0.50

15

ACCEPTED MANUSCRIPT

6. Conclusion and outlook In recent years, QSDC has been experimentally realized in only a few labo-

265

ratories. [29] reported the first experimental demonstration of quantum secure

CR IP T

direct communication with single photons, which was based on the DL04 pro-

tocol equipped with a simple frequency coding. It has the advantage of being robust against channel noise and loss. In this case, we need to consider a fi270

nite maximum number N of frequency channels, which is a value changing with

the maximum and minimum modulation frequencies and the channel frequency spacing. Quantum memory has been used to implement QSDC in [30], which

AN US

takes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network. 275

Regarding the coincidence rate, the bit rate is approximately 2.5 per second and the error rate is approximately 0.1, which results in the 90% fidelity. All in all, we need to consider the channel frequency and bit rate to improve the fidelity of

quantum source.

M

communication. Theoretically, we need to choose a big bandwidth and superior

Our QSDC protocol based on a four-particle cluster is theoretically proved,

280

ED

and it is shown that it can withstand the attack from eavesdropping, for instance, the intercept-resend attack, the entangled CNOT attack and the as-

PT

sisted particle attack. In addition, we analyzed our protocol in a lossy channel, meanwhile, the receiver can correct the error bit according to his quantum errorcorrecting code without throwing it away.

CE

285

References

AC

References

[1] G. L. Long, X. S. Liu, Theoretically efficient high-capacity quantum-key-

290

distribution scheme, Physical Review A 65 (3) (2002) 032302.

[2] A. Beige, B. G. Englert, C. Kurtsiefer, H. Weinfurter, Secure communi-

16

ACCEPTED MANUSCRIPT

cation with a publicly known key, Acta Physica Polonica 101 (3) (2001) 357. [3] A. Beige, B. G. Englert, C. Kurtsiefer, H. Weinfurter, Secure communica-

ical and Genenral 35 (28) (2002) L407–L413(7).

295

CR IP T

tion with single-photon two-qubit states, Journal of Physcis A: Mathemat-

[4] K. Bostrom, T. Felbinger, Deterministic secure direct communication using entanglement, Physical Review Letters 89 (18) (2002) 187902.

[5] F. G. Deng, L. L. Gui, X. S. Liu, Two-step quantum direct communication

AN US

protocol using the einstein-podolsky-rosen pair block, Physical Review A 68 (4) (2003) 113–114.

300

[6] W. Jian, Z. Quan, C. J. Tang, Quantum secure direct communication based on order rearrangement of single photons, Physical Letters A 358 (4) (2006) 256–258.

M

[7] T. Gao, F. L. Yan, Z. X. Wang, Quantum secure direct communication by

313.

ED

epr pairs and entanglement swapping, IL Nuovo Cimento B 119 (3) (2004)

305

[8] L. Kai, X. Y. Huang, J. H. Teng, Z. H. Li, Quantum secure direct com-

PT

munication based on secret initial states of epr pairs, Third International Conference on Multimedia Information Network and Security (2011) 73–76. [9] Y. Xia, C. B. Fu, F. Y. Li, S. Zhang, K. H. Yeon, C. I. Um, Controlled

CE

310

secure direct communication by using ghz entangled state, Journal of the

AC

Korean Physical Society 47 (5) (2005) 753.

[10] Z. X. Man, Y. J. Xia, N. B. An, Quantum secure direct communication by

315

using ghz states and entanglement swapping, Journal of Physics B Atomic Molecular and Optical Physics 39 (39) (2006) 3855.

[11] A. Banerjee, A. Pathak, Maximally efficient protocols for direct secure quantum communication, Physical Letters A 376 (45) (2012) 2944–2950. 17

ACCEPTED MANUSCRIPT

[12] H. J. Cao, H. S. Song, Quantum secure direct communication scheme using a w state and teleportation, Chinese Physics Letters 23 (2) (2006) 290–292. 320

[13] L. Dong, X. M. Xiu, Y. J. Gao, F. Chi, Improvement on quantum secure

Theoretical Physics 51 (2) (2009) 232–234.

CR IP T

direct communication with w state in noisy channel, Communications in

[14] H. J. Briegel, R. Raussendorf, Persistent entanglement in arrays of interacting particles., Physical Review Letters 86 (5) (2001) 910–3. 325

[15] P. Facchi, G. Florio, U. Marzolino, G. Parisi, S. Pascazio, Classical statis-

AN US

tical mechanics approach of multipartite entanglement, Journal of Physics A: Mathematial and Theoretical. 43 (22) (2010) 225303.

[16] P. C. Ma, Y. B. Zhan, Scheme for remotely preparing a four-particle entangled cluster-type state, Optics Communications 283 (12) (2010) 2640–2643. 330

[17] S. Y. Ma, M. X. Luo, X. B. Chen, Y. X. Yang, Schemes for remotely

M

preparing an arbitrary four-qubit χ -state, Quantum Information Process-

ED

ing 13 (9) (2014) 1951–1965.

[18] H. Y. Jia, Y. B. Li, F. Gao, Quantum private comparison using genuine four-particle entangled states, International Journal of Theoretical Physics 51 (4) (2012) 1187–1194.

PT

335

[19] X. Tan, X. Zhang, J. Fang, Perfect quantum teleportation by four-particle

CE

cluster state, Information Processing Letters 116 (5) (2016) 347–350. [20] Y. Yu, X. W. Zha, W. Li, Quantum broadcast scheme and multi-output

AC

quantum teleportation via four-qubit cluster state, Quantum Information

340

Processing 16 (2) (2017) 41.

[21] Y. Y. Nie, X. U. Wei, Q. N. Zhang, L. I. Yuan-Hua, M. H. Sang, Controlled quantum secure direct communication by using five-particle cluster states, Acta Photonica Sinica 43 (1) (2014) 108–112.

18

ACCEPTED MANUSCRIPT

[22] Y. B. Li, T. T. Song, W. Huang, W. W. Zhan, Fault-tolerant quantum secure direct communication protocol based on decoherence-free states, In-

345

ternational Journal of Theoretical Physics 54 (2) (2015) 589–597.

entropy, Cambridge University Press.

CR IP T

[23] C. I. L., N. M. A, Fast track communication: A classical bound on quantum

[24] M. A. Nielson, I. L. Chuang, Cambridge University Press, 2000. 350

[25] C. K. Zachos, Fast track communication: A classical bound on quantum

entropy, Journal of Physics A Mathematical General 40 (21) (2007) F407–

AN US

F412.

[26] Y. Chang, C. Xu, S. Zhang, L. Yan, Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad, Chinese Science Bulletin 59 (21) (2014)

355

2541–2546.

M

[27] M. Wang, W. Ma, D. Shen, X. Yin, A new controlled quantum secure direct communication protocol based on a four-qubit cluster state, Modern

360

ED

Physical Letters B 28 (24) (2014) 357. [28] M. Nanvakenari, M. Houshmand, An efficient controlled quantum secure di-

PT

rect communication and authentication by using four particle cluster states, International Journal of Quantum Information 15 (01) (2017) 1750002.

CE

[29] J. Y. Hu, B. Yu, M. Y. Jing, L. T. Xiao, S. T. Jia, G. Q. Qin, G. L. Long, Experimental quantum secure direct communication with single photons, Light Science & Applications 5 (9) (2016) e16144.

AC

365

[30] W. Zhang, D. S. Ding, Y. B. Sheng, L. Zhou, B. S. Shi, G. C. Guo, Quantum secure direct communication with quantum memory., Physical Review Letters 118 (22) (2017) 220501.

19