WO2009020380A2 - A secure quantum telephone system - Google Patents

A secure quantum telephone system Download PDF

Info

Publication number
WO2009020380A2
WO2009020380A2 PCT/MY2008/000079 MY2008000079W WO2009020380A2 WO 2009020380 A2 WO2009020380 A2 WO 2009020380A2 MY 2008000079 W MY2008000079 W MY 2008000079W WO 2009020380 A2 WO2009020380 A2 WO 2009020380A2
Authority
WO
WIPO (PCT)
Prior art keywords
telephone system
secure
quantum
communicating parties
communicate securely
Prior art date
Application number
PCT/MY2008/000079
Other languages
French (fr)
Other versions
WO2009020380A3 (en
Inventor
Ressa Suhardiman
Jesni Shamsul
Mohamed Ridza Wahiddin
Original Assignee
Mimos Berhad
International Islamic University Malaysia, (Iium)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad, International Islamic University Malaysia, (Iium) filed Critical Mimos Berhad
Publication of WO2009020380A2 publication Critical patent/WO2009020380A2/en
Publication of WO2009020380A3 publication Critical patent/WO2009020380A3/en

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B82NANOTECHNOLOGY
    • B82YSPECIFIC USES OR APPLICATIONS OF NANOSTRUCTURES; MEASUREMENT OR ANALYSIS OF NANOSTRUCTURES; MANUFACTURE OR TREATMENT OF NANOSTRUCTURES
    • B82Y10/00Nanotechnology for information processing, storage or transmission, e.g. quantum computing or single electron logic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N10/00Quantum computing, i.e. information processing based on quantum-mechanical phenomena
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding

Definitions

  • the present invention relates to a secure quantum telephone system and more particularly the present invention relates to a secure quantum telephone system which allows for two communicating parties to communicate securely by invoking the basic principle in quantum mechanics. Most particularly the present invention relates to a system which allows two way secure communication by eliminating the need to duplicate the setup and to measure by using Bell basis.
  • Quantum key distribution is arguably the only currently feasible realization of the application of quantum mechanics to the field of information theory and cryptography. Promising security based on the postulates of quantum mechanics, it allows one to abandon the notion of security in computational complexity, e.g. the RSA and by making no presuppositions regarding an adversary that it only functions in the possibilities of the quantum world.
  • the present invention to introduce a novel protocol making use of two nonsinglet maximally entangled states to allow for such a bidirectional communication to be achieved securely namely "secure quantum telephone".
  • the present invention adopts the definition of deterministic when the encoding/decoding procedure in principle allows a recipient to infer with certainty what was encoded by the transmitter. It is another objective of the present invention to be more feasible as by not resorting to the usage of Bell measurements nor GHZ state measurements. It is yet another objective of the present invention to introduce a novel protocol that may be used to realize the protocol with currently available technology.
  • the present invention relates to a secure quantum telephone system for two communicating parties to communicate securely.
  • Said secure quantum telephone system comprises of a means for two communicating parties in a secure environment by invoking the basic principle in quantum mechanics and wherein further comprises a system with means which allows two way secure communication by eliminating the need to duplicate the setup.
  • the system includes a laser pulse which would be pumped into barium borate (BBO) and crystal will generate one of the four Bell states.
  • BBO barium borate
  • the polarization of fibers is maintained to implement the paths.
  • the length of loop should be greater than the line of sight, distance between U2's lab and Ul's lab.
  • Ul's is further equipped with a LCP rotator, a, polarized beam splitter, and two avalanche photo diode detectors and wherein Ul will choose the measurement basis by controlling the rotator.
  • Ul will choose the measurement basis by controlling the rotator.
  • U2 Ul may just inform U2 over the public channel and wherein U2 would deduce with certainty Ul's encoding as the resulting state of the operation and wherein a control mode would proceed with Ul making projective measurements of the first qubit and informs U2 of the basis used and result to check for errors.
  • Figure 1 shows a diagrammatic view of the present invention.
  • Ul's lab is equipped with a LCP rotator R2, a, polarized beam splitter
  • U3 In the simplest scenario where an adversary U3 attempts an Intercept Resend (IR) strategy, U3 needs to measure U2's qubits before sending them to Ul thereafter. Such an attack would result in U3 sending a separable state to Ul and a CHSH test would give S
  • Another method of attack conceivable by U3 would be the QNENI where U3 would exchange the pairs U3 receives with U3's own Bell pair. Simply enough, U3 receives and distributes the relevant pairs in a sequential manner just as U2 would. In this way, U3 would know perfectly the information encoded by Ul and upon performing a Bell measurement to distinguish between the pure Bell states U2 sent; U3 would know what encoding U2 would deduce from Ul's announcement. However, in a control mode, U3 would have Ul measure her half of the Bell pair and her only way of avoiding detection is to somehow influence U2's result so that, Ul and U3 would have a maximal CHSH violation.
  • Ul and U2 may check for errors, d instead of the CHSH and for the IR and QMM attack.
  • the probability of detection gives d - 25% and d - 50% respectively.
  • U3's probability of stealing for example, I ⁇ I
  • I AE is the amount of mutual information shared between Ul and U3 given an attack scheme. It, is straightforward to see for c > 0, the protocol is secure.
  • the present invention does not require Bell measurements, rather only sharp von Neumann measurements and security is promised by the monogamous nature of maximally entangled pairs. This is checked by testing the CHSH violation to ensure purity of the states sent.
  • the theoretical efficiency of the present protocol is comparable to BB84. While granting security in the face of all IR attacks, it should be noted the present protocol does not share the flaw against QMM attacks.
  • the present invention setup is very much feasible given current technology. It should be also noted that in reality, the protocol works as a telephone so to speak only in the case of noiseless channels and in the case otherwise, the protocol may be used (supplemented by error correction schemes and privacy amplification) for a normal QKD setup.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Nanotechnology (AREA)
  • Chemical & Material Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Pure & Applied Mathematics (AREA)
  • Software Systems (AREA)
  • Mathematical Optimization (AREA)
  • Optics & Photonics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Condensed Matter Physics & Semiconductors (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Mathematics (AREA)
  • Crystallography & Structural Chemistry (AREA)
  • Artificial Intelligence (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Optical Communication System (AREA)

Abstract

The present invention relates to a secure quantum telephone system for two communicating parties to communicate securely. Said secure quantum telephone system comprises of a means for two communicating parties in a secure environment by invoking the basic principle in quantum mechanics and wherein further comprises a system with means which allows two way secure communication by eliminating the need to duplicate the setup.

Description

A SECURE QUANTUM TELEPHONE SYSTEM
FIELD OF THE INVENTION
The present invention relates to a secure quantum telephone system and more particularly the present invention relates to a secure quantum telephone system which allows for two communicating parties to communicate securely by invoking the basic principle in quantum mechanics. Most particularly the present invention relates to a system which allows two way secure communication by eliminating the need to duplicate the setup and to measure by using Bell basis.
BACKGROUND OF THE INVENTION
Quantum key distribution (QKD) is arguably the only currently feasible realization of the application of quantum mechanics to the field of information theory and cryptography. Promising security based on the postulates of quantum mechanics, it allows one to abandon the notion of security in computational complexity, e.g. the RSA and by making no presuppositions regarding an adversary that it only functions in the possibilities of the quantum world.
A host, of QKD protocols emerged starting from the pioneering work of BB84, entanglement based protocols like Ekert 91 and variants. Deterministic setups then came to be proposed in principle for the possibility of secure direct communication (we note that this would only he true in the context, of a noiseless channel). Other protocols like Chen et al. includes deterministic only in the context of no wastage of qubits due to wrong measurement, bases or even in the test for an eavesdropper. However, most of these protocols mentioned do not allow for a bidirectional form of communication without necessitating double setups; or simply put, for any such setup allowing User 1 to encode bits for User 2, another duplicate to allow for User 2 to encode bits for User 1 is necessary. To overcome the above mentioned disadvantages, it is an objective of the present invention to introduce a novel protocol making use of two nonsinglet maximally entangled states to allow for such a bidirectional communication to be achieved securely namely "secure quantum telephone". The present invention adopts the definition of deterministic when the encoding/decoding procedure in principle allows a recipient to infer with certainty what was encoded by the transmitter. It is another objective of the present invention to be more feasible as by not resorting to the usage of Bell measurements nor GHZ state measurements. It is yet another objective of the present invention to introduce a novel protocol that may be used to realize the protocol with currently available technology.
SUMMARY OF THE INVENTION
The present invention relates to a secure quantum telephone system for two communicating parties to communicate securely. Said secure quantum telephone system comprises of a means for two communicating parties in a secure environment by invoking the basic principle in quantum mechanics and wherein further comprises a system with means which allows two way secure communication by eliminating the need to duplicate the setup. The system includes a laser pulse which would be pumped into barium borate (BBO) and crystal will generate one of the four Bell states. A
U2 then prepares his Bell states by controlling an electro-optical liquid crystal polarization (LCP) rotator and wherein after traversing through a fiber path, one photon will be sent to a Ul 's lab while the other will be sent to a looped fiber.
According to the present invention the polarization of fibers is maintained to implement the paths. The length of loop should be greater than the line of sight, distance between U2's lab and Ul's lab.
Ul's is further equipped with a LCP rotator, a, polarized beam splitter, and two avalanche photo diode detectors and wherein Ul will choose the measurement basis by controlling the rotator. In order to encode and send the desired bits to
U2, Ul may just inform U2 over the public channel and wherein U2 would deduce with certainty Ul's encoding as the resulting state of the operation and wherein a control mode would proceed with Ul making projective measurements of the first qubit and informs U2 of the basis used and result to check for errors.
BRIEF DESCRIPTION OF THE FIGURES
Figure 1 shows a diagrammatic view of the present invention.
DETAILED DESCRIPTION OF THE PRESENT INVENTION
The present invention will be now be described in detail with reference made to the accompanied figure. For the ease of describing the present invention, User 1, 2 ,3 n would be defined as Ul, U2, U3 Un.
Reference is made to Figure 1, wherein the present invention shows a feasible free-space setup to implement the present invention key distribution protocol. A laser pulse would be pumped into barium borate (BBO) and crystal will generate one of the four Bell states depending on the cutting angle of the crystal. U2 then prepares his Bell states, either φ+ > or
Figure imgf000004_0001
>by controlling an electro-optical liquid crystal polarization (LCP) rotator, R.l. After traversing through a fiber path a-c, one photon (half of the Bell pair) will be sent to UIs lab while the other will be sent to the looped fiber Ll on the arm b-c. In the present invention, it is required here that the polarization maintained (PM) fibers to implement the paths a-c and b-c. The length of loop Ll should be greater than the line - of - sight, distance between
U2's lab and Ul's lab since the second photon can only be sent out from U2's lab after a measurement has been done by Ul onto the first photon. In the present invention Ul's lab is equipped with a LCP rotator R2, a, polarized beam splitter
PBS, and two avalanche photo diode detectors. Ul will choose the measurement basis by controlling the rotator R2. It is also important to consider the losses of the fiber since we need to delay the traveling time of photon 2 in fiber loop Ll.
In the simplest scenario where an adversary U3 attempts an Intercept Resend (IR) strategy, U3 needs to measure U2's qubits before sending them to Ul thereafter. Such an attack would result in U3 sending a separable state to Ul and a CHSH test would give S | < 2. Another method of attack conceivable by U3 would be the QNENI where U3 would exchange the pairs U3 receives with U3's own Bell pair. Simply enough, U3 receives and distributes the relevant pairs in a sequential manner just as U2 would. In this way, U3 would know perfectly the information encoded by Ul and upon performing a Bell measurement to distinguish between the pure Bell states U2 sent; U3 would know what encoding U2 would deduce from Ul's announcement. However, in a control mode, U3 would have Ul measure her half of the Bell pair and her only way of avoiding detection is to somehow influence U2's result so that, Ul and U3 would have a maximal CHSH violation.
To commit to a measurement herself on the quhit received from U2, U3 would, uninterestingly translates into Ul into U2 again measuring non correlated separable states, resulting withls | ≤ 2. Having access to Ul's other half (disentangled state), say | E) as well as her half of U2's sent entangled qubit her hope would be for U2 to make his measurement on the | E) (this implicitly suggests U3's hope that, she uses the same entangled state that, U2 does). U3 therefore looks for a process T as such:
r(φ(φ|,|£)))→| £),|x)(x|
The j Φ) (Φ is the density operator of the entangled qubit at U2's station and I x) ( x I is the state that U3 has after the process T. The first term on the right hand side of the above shown equation would be the state of the qubit now belonging to U2 and the second to U3. We believe U3 may best achieve this by virtue of a teleportation scheme. However, differently from the conventional teleportation scheme, U2 would not be making any unitary transformation on his qubit and therefore only in half the instances would U2 actually make a measurement on \ E) . The other half the time, U2 would be making a measurement on a state orthogonal to \ E) . We may imagine then Ul and U2 testing CHSH on the state that is a mixture of the entangled states expected.
Figure imgf000006_0001
Alternatively, Ul and U2 may check for errors, d instead of the CHSH and for the IR and QMM attack. The probability of detection gives d - 25% and d - 50% respectively. U3's probability of stealing for example, I= ΠIAE bit of information without, being detected is P(C, d) = (1-C)n /[1-C (l-d)]n where IAE is the amount of mutual information shared between Ul and U3 given an attack scheme. It, is straightforward to see for c > 0, the protocol is secure.
The theoretical efficiency of a QKD protocol is expressed as ε = ba / (qt + bt), where, bs is the expected number of secret, bits received, qt is the number of transmitted qubits on the quantum channel, and bt is the number of transmitted bits on the classical channel. It is straightforward to calculate out" the protocol as having an efficiency of ε = [2/(2+2)] = 1/2. However, as mentioned above, it is more reasonable to assume that Ul and U2 would encode/decode in separate runs.
Hence an average efficiency for the protocol is εmin = [1/(2+1) + l/(2+2)]/2 =
7/24 (Ul encoding differs from U2's). This would be comparable to that of BB84. it should be noted that in the spirit of the present invention the control modes are not consider in the calculations wherein the probability c may be taken to be small and therefore tile bits sacrificed are negligible.
Further modification and other embodiments of the present invention would be described in detail now.
In certain sense, it is essentially very much similar to the protocol with an additional step allowing for either of the parties to encode/decode information. It is considered that U2 sending any of the four Bell states in a sequential manner as before and the encodings would he in the Bell states. It should be noted that encoding is reflected in the unitary operations producing these Bell states starting from the singlet state. Ul upon receiving U2's qubit would acknowledge receipt, over the public channel. U2 then sends the second qubit and Ul makes Bell measurements to distinguish which of the Bell states U2 sent. Ul then considers a unitary transformation or the identity operation, which would transform the state that U2 sent.
In order to encode and send the desired bits to U2 as| ^') , Ul may just inform U2 over the public channel of the relevant operation considered. U2 would deduce with certainty Ul's encoding as the resulting state of the operation on the state he sent. A control mode would proceed with Ul making projective measurements of the first qubit and informs U2 of the basis used and result to check for errors. It is further noted that the efficiency of the modified protocol εm = 4/(2+3) = 4/5 (average = [2/(2+3) + 2/(2+l)]/2 = 8/15) where the three classical bits come from Ul's receipt and operation disclosed. However, all in all, given the experimental demands of this modification which includes Bell measurements as well as more quantum memory capacity (fiber loop on both Ul and U2's side).
Therefore, in the present invention, a novel and simple protocol for two way secure quantum communications have been described. In line with simplicity for a protocol and ease of possible implementation, the present invention does not require Bell measurements, rather only sharp von Neumann measurements and security is promised by the monogamous nature of maximally entangled pairs. This is checked by testing the CHSH violation to ensure purity of the states sent. The theoretical efficiency of the present protocol is comparable to BB84. While granting security in the face of all IR attacks, it should be noted the present protocol does not share the flaw against QMM attacks.
The present invention setup is very much feasible given current technology. It should be also noted that in reality, the protocol works as a telephone so to speak only in the case of noiseless channels and in the case otherwise, the protocol may be used (supplemented by error correction schemes and privacy amplification) for a normal QKD setup.

Claims

1. A secure quantum telephone system for two communicating parties to communicate securely characterize in that wherein said secure quantum telephone system comprises of a means for two communicating parties in a secure environment by invoking the basic principle in quantum mechanics and wherein further comprises a system with means which allows two way secure communication by eliminating the need to duplicate the setup and wherein the system includes a laser pulse which would be pumped into barium borate (BBO) and crystal will generate one of the four Bell states and wherein a
U2 then prepares his Bell states by controlling an electro-optical liquid crystal polarization (LCP) rotator and wherein after traversing through a fiber path, one photon will be sent to a Ul' s lab while the other will be sent to a looped fiber.
2. A secure quantum telephone system for two communicating parties to communicate securely as claimed in Claim 1 wherein the polarization of fibers is maintained to implement the paths.
3. A secure quantum telephone system for two communicating parties to communicate securely as claimed in Claim 1 wherein the length of loop should be greater than the line of sight, distance between U2's lab and Ul's lab.
4. A secure quantum telephone system for two communicating parties to communicate securely ad claimed in Claim 1 wherein Ul's is further equipped with a LCP rotator, a, polarized beam splitter, and two avalanche photo diode detectors and wherein Ul will choose the measurement basis by controlling the rotator.
5. A secure quantum telephone system for two communicating parties to communicate securely as claimed in Claim 1 wherein in order to encode and send the desired bits to U2, Ul may just inform U2 over the public channel and wherein U2 would deduce with certainty Ul's encoding as the resulting state of the operation and wherein a control mode would proceed with Ul making projective measurements of the first qubit and informs U2 of the basis used and result to check for errors.
6. A secure quantum telephone system for two communicating parties to communicate securely as claimed in Claim 1 wherein where at least three classical bits come from Ul's receipt and operation is disclosed.
PCT/MY2008/000079 2007-08-09 2008-08-08 A secure quantum telephone system WO2009020380A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI20071327 2007-08-09
MYPI20071327A MY143940A (en) 2007-08-09 2007-08-09 A secure quantum telephone system

Publications (2)

Publication Number Publication Date
WO2009020380A2 true WO2009020380A2 (en) 2009-02-12
WO2009020380A3 WO2009020380A3 (en) 2009-04-30

Family

ID=40341923

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2008/000079 WO2009020380A2 (en) 2007-08-09 2008-08-08 A secure quantum telephone system

Country Status (2)

Country Link
MY (1) MY143940A (en)
WO (1) WO2009020380A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108923914A (en) * 2018-06-21 2018-11-30 西北大学 A kind of quantum key delivering method based on 4 Particle Cluster states

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6897434B1 (en) * 2002-02-28 2005-05-24 Northwestern University All-fiber photon-pair source for quantum communications
US7113598B2 (en) * 2003-05-14 2006-09-26 Science Research Laboratory, Inc. Methods and systems for high-data-rate quantum cryptography
JP2007184700A (en) * 2006-01-05 2007-07-19 Mitsubishi Electric Corp Quantum cryptography communication system and method, polarization/phase modulation converter, and phase/polarization modulation converter

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6897434B1 (en) * 2002-02-28 2005-05-24 Northwestern University All-fiber photon-pair source for quantum communications
US7113598B2 (en) * 2003-05-14 2006-09-26 Science Research Laboratory, Inc. Methods and systems for high-data-rate quantum cryptography
JP2007184700A (en) * 2006-01-05 2007-07-19 Mitsubishi Electric Corp Quantum cryptography communication system and method, polarization/phase modulation converter, and phase/polarization modulation converter

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
J.S. SHAARI ET AL.: 'Secure Quantum Telephones' QUANTUM PHYSICS 08 March 2007, pages 2 - 3 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108923914A (en) * 2018-06-21 2018-11-30 西北大学 A kind of quantum key delivering method based on 4 Particle Cluster states

Also Published As

Publication number Publication date
MY143940A (en) 2011-07-29
WO2009020380A3 (en) 2009-04-30

Similar Documents

Publication Publication Date Title
Deng et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block
Silberhorn et al. Continuous variable quantum cryptography: Beating the 3 dB loss limit
Fei et al. Teleportation attack on the QSDC protocol with a random basis and order
WO2005117330A2 (en) Key bank systems and methods for qkd
CN107666356B (en) Requirement classical communication person based on single photon has half quantum dialogue method of measurement capability
KR101252757B1 (en) Polarization Coding Quantum Cryptography System
CN113726516B (en) Three-party quantum secure direct communication method based on independence of two degrees of freedom measuring equipment
KR20040058326A (en) Cryptographic communication apparatus
CN112272085A (en) Measuring equipment irrelevant quantum key distribution method based on time slice assisted Bell state measurement
Zhong et al. Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol.
CN110830241B (en) Bell state-based semi-quantum privacy comparison method without requiring classic communicant to have measurement capability
CN110247768B (en) Certificable semi-quantum secret sharing method and system based on GHZ state
Gao Quantum key distribution by swapping the entanglement of χ-type state
WO2012047087A1 (en) Apparatus for flipping the polarization state of an optical pulse between a transmitter and a receiver in quantum key distribution and method thereof
Li et al. Deterministic quantum secure direct communication protocol based on hyper-entangled state
CN110730070B (en) Bell state-based semi-quantum privacy comparison method
JP2016025550A (en) Quantum entanglement photon pair generation device and quantum encryption key distribution device
WO2009020380A2 (en) A secure quantum telephone system
CN114172646A (en) Super-entanglement-based quantum secure direct communication method irrelevant to measuring equipment
El Rifai Quantum secure communication using polarization hopping multi-stage protocols
CN112929171B (en) Controlled quantum conversation method based on five-quantum-bit entangled state
Xu et al. Quantum Mutual Implicit Authentication Key Agreement Protocol without Entanglement with Key Recycling
CN113225182B (en) Controlled bidirectional quantum secure direct communication method based on six-quantum-bit entangled state
Chun-Yan et al. Efficient quantum secure communication with a publicly known key
Banerjee et al. On Assisted Quantum Key Authentication Protocol

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08793796

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08793796

Country of ref document: EP

Kind code of ref document: A2