Authentication of Quantum Dialogue Under Noise | SpringerLink
Skip to main content

Authentication of Quantum Dialogue Under Noise

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11067))

Included in the following conference series:

  • 2236 Accesses

Abstract

In this paper, we verify conversation between two parties to ensure any information in the matter discussed during the dialogue is not disclose to other parties. We tackle this problem through decoy and steganography to detect the parties’ identities if any of them is incorrect, and to ensure that the conversation channel is secured. We propose using DFS immune-combined noise characteristics, a generalized entangled states that converts previously shared IDs into logical quantum states for noise immunity, randomly mixed message sequence and transmit. We perform identity authentication and eavesdropping detections to improve the security and efficiency of agreement between the parties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nguyen, B.A.: Quantum dialogue. Phys. Lett. A 328(1), 6–10 (2004)

    Article  MathSciNet  Google Scholar 

  2. Ji, X., Zhang, S.: Secure quantum dialogue based on single-photon. Chin. Phys. 15(7), 1418–1420 (2006)

    Article  Google Scholar 

  3. Ji, X., Jing, X.R., Zhang, Y.Q., Zhang, S.: Quantum dialogue by using single photons. Alta Sinise Quantum Opt. 14(3), 273–276 (2008)

    Google Scholar 

  4. Shi, G.F., Xi, X.Q., Hu, M.L., et al.: Quantum dialogue by using single photons. Opt. Commun. 283(9), 1984–1986 (2010)

    Article  Google Scholar 

  5. Shi, G.F., Tian, X.L.: Quantum secure dialogue based on single photons and controlled-not operations. J. Mod. Opt. 57(20), 2027–2030 (2010)

    Article  Google Scholar 

  6. Yang, Y.G., Wen, Q.Y.: Quasi-secure quantum dialogue using single photons. Sci. Chin. Ser. G-Phys. Mech. Astron. 50(5), 558–562 (2007)

    Article  Google Scholar 

  7. Gao, G., Wang, L.P.: A protocol for bidirectional quantum secure communication based on genuine four-particle entangled states. Commun. Theor. Phys. 54(3), 447–451 (2010)

    Article  MathSciNet  Google Scholar 

  8. Lin, T.H., Lin, C.Y., Hwang, T.: Man-in-the-middle attack on “quantum dialogue with authentication based on Bell states”. Int. J. Theor. Phys. 52(9), 3199–3203 (2013)

    Article  MathSciNet  Google Scholar 

  9. Gao, G., Fang, M., Wang, Y., et al.: A ping-pong quantum dialogue scheme using genuine four-particle entangled states. Int. J. Theor. Phys. 50(10), 3089–3095 (2011)

    Article  MathSciNet  Google Scholar 

  10. Shen, D.S., Ma, W.P., et al.: Quantum dialogue with authentication based on Bell states. Int. J. Theor. Phys. 52(6), 1825–1835 (2013)

    Article  MathSciNet  Google Scholar 

  11. Ye, T.Y., Jiang, L.Z.: Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state. Phys. Scripter 89(1), 015103 (2014)

    Article  Google Scholar 

  12. Bauchi, L., Baumstein, S.L., Pirandola, S.: Quantum fidelity for arbitrary Gaussian states. Phys. Rev. Lett. 115(26), 260501 (2015)

    Article  Google Scholar 

  13. Obento, P.C., Paula, F.M., Sandy, M.S.: Trace-distance correlations for x states and the emergence of the pointer basis in Marconian and non-Marconian regimes. Phys. Rev. A 92(3), 032307 (2015)

    Article  Google Scholar 

  14. Pick, V., Keefe, P.D.: Physics at the FQMT. Phys. Scripter 151(1), 001–014 (2012)

    Google Scholar 

  15. Inoue, K.: Quantum noise in parametric amplification under phase-mismatched conditions. Optics Commun. 366, 71–76 (2016)

    Article  Google Scholar 

  16. Oiler, E., Isogamic, T., Miller, J., et al.: Audio-band frequency-dependent squeezing for gravitational-wave detectors. Phys. Rev. Lett. 116(4), 041102 (2016)

    Article  Google Scholar 

  17. Pan, J.-W., et al.: Multiphoton entanglement and interferometry. Rev. Mod. Phys. 84, 777–838 (2016)

    Article  Google Scholar 

  18. Pfaff, W., et al.: Unconditional quantum teleportation between distant solid-state quantum bits. Science 345, 532–535 (2016)

    Article  MathSciNet  Google Scholar 

  19. Steffen, L., et al.: Deterministic quantum teleportation with feed-forward in a solid state system. Nature 500, 319–322 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong-Fen Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, DF., Wang, RJ., Adu-Gyamfi, D., Chen, Jl., Yang, YM., Liu, MZ. (2018). Authentication of Quantum Dialogue Under Noise. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11067. Springer, Cham. https://doi.org/10.1007/978-3-030-00018-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00018-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00017-2

  • Online ISBN: 978-3-030-00018-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics