arXiv Analytics

Sign in

arXiv:0705.1746 [quant-ph]AbstractReferencesReviewsResources

Secure quantum key distribution network with Bell states and local unitary operations

Chun-Yan Li, Hong-Yu Zhou, Yan Wang, Fu-Guo Deng

Published 2007-05-12Version 1

We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing and measuring the Bell states, and the users encodes the states with local unitary operations. For preventing the server from eavesdropping, we design a decoy when the particle is transmitted between the users. It has high capacity as one particle carries two bits of information and its efficiency for qubits approaches 100%. Moreover, it is not necessary for the users to store the quantum states, which makes this scheme more convenient for application than others.

Comments: 5 pages, 2 figures. The decoy-photon technique is presented in a clear way for preventing a potentially dishonest server on a network from eavesdropping quantum communication freely. This technique may be useful in quantum secret sharing (of classical information or quantum information), controlled teleportation, and so on
Journal: Chinese Physics Letters 22, 1049-1052 (2005)
Categories: quant-ph
Related articles: Most relevant | Search more
arXiv:quant-ph/0310077 (Published 2003-10-12, updated 2004-10-26)
Certain quantum key distribution achieved by using Bell states
arXiv:1111.4273 [quant-ph] (Published 2011-11-18, updated 2012-07-25)
Retraction of "Near-Deterministic Discrimination of All Bell States with Linear Optics," Phys. Rev. Lett. 107, 080403 (2011) and Erratum Phys. Rev. Lett. 107, 219901 (2011)
arXiv:quant-ph/0204004 (Published 2002-04-01, updated 2002-04-09)
The distillable entanglement of multiple copies of Bell states