A secure quantum identity authentication protocol by employing the mechanism of the secret transmitting
order scheme via the Einstein-Podolsky-Rosen pairs is proposed. With the help of a certificated authority, two
legitimate users can faithfully accomplish the authentication and distribute the quantum key simultaneously.
Investigation on security of our protocol is also provided which shows the protocol remains robust when confronted
with series typical individual attacks. During the protocol, no local operation and classical communication is
applied.
We present a quantum secure direct communication(QSDC) scheme as an extension for a proposed supervised
secure entanglement sharing protocol. Starting with a quick review on the supervised entanglement sharing
protocol - the "Wuhan" protocol [Y. Li, et al., quant-ph/0709.1449 (2007)], we primarily focus on its further
extend using for a QSDC task, in which the communication attendant Alice encodes the secret message directly
onto a sequence of 2-level particles which then can be faithfully teleported to Bob using the shared maximal
entanglement states obtained by the previous "Wuhan" protocol. We also evaluate the security of the QSDC
scheme, where an individual self-attack performed by Alice and Bob - the out of control attack is introduced
and the robustness of our scheme on the OCA is documented.
We give a feasibility analysis on entanglement distribution in quantum repeater-based space quantum communication.
After a quick review of the Quantum Repeater techniques, two typical communication scenarios are provided as
examples and a further feasibility analysis for entanglement distribution in general deep space quantum communication
on link requirements, transmission attenuations and terminal requirements are documented.
An overview of the Quantum Repeater techniques based on Entanglement Distillation and Swapping is provided. Beginning with a brief history and the basic concepts of the quantum repeaters, the article primarily focuses on the communication model based on the quantum repeater techniques, which mainly consists of two fundamental modules --- the Entanglement Distillation module and the Swapping module. The realizations of Entanglement Distillation are discussed, including the Bernstein's Procrustean method, the Entanglement Concentration and the CNOT-purification method, etc. The schemes of implementing Swapping, which include the Swapping based on Bell-state measurement and the Swapping in Cavity QED, are also introduced. Then a comparison between these realizations and evaluations on them are presented. At last, the article discusses the experimental schemes of quantum repeaters at present, documents some remaining problems and emerging trends in this field.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.