+ All Categories
Home > Documents > Improved Eavesdropping Detection Strategy in Quantum Direct Communication Protocol Based on...

Improved Eavesdropping Detection Strategy in Quantum Direct Communication Protocol Based on...

Date post: 27-Aug-2016
Category:
Upload: bo
View: 213 times
Download: 0 times
Share this document with a friend
12
Int J Theor Phys (2012) 51:2759–2770 DOI 10.1007/s10773-012-1151-5 Improved Eavesdropping Detection Strategy in Quantum Direct Communication Protocol Based on Five-Particle Cluster State Jian Li · Hai-Fei Jin · Bo Jing Received: 18 October 2011 / Accepted: 1 April 2012 / Published online: 19 April 2012 © Springer Science+Business Media, LLC 2012 Abstract In order to improve the eavesdropping detection efficiency in a two-step quantum direct communication protocol, an improved eavesdropping detection strategy using the five- particle cluster state is proposed in which the five-particle cluster state is used to detect eavesdroppers. During the security analysis, the method of the entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdropper can obtain and the interference that has been introduced. If the eavesdroppers intend to obtain all information, the eavesdropping detection rate of the original two-step quantum direct communication protocol by using EPR pair block as detection particles will be 50 %; while the proposed strategy’s detection rate will be 88 %. In the end, the security of the proposed protocol is discussed. The analysis results show that the eavesdropping detection strategy presented is more secure. Keywords Quantum direct communication · Five-particle cluster state · Eavesdropping detection · Protocol security · Dense coding scheme 1 Introduction The goal of researching cryptography is to ensure that the secret message is only available to the two authorized parties of the communication and that the transmission will not be altered. So far, it is trusted that the only proven secure cryptosystem is the one-time-pad scheme in which the secret key is as long as the message. The two parties staying far apart who want to transmit their secret message must distribute the secret key first. But it is difficult to distribute securely the secret key securely through a classical channel. The quantum key distribution J. Li · H.-F. Jin ( ) · B. Jing School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, People’s Republic of China e-mail: [email protected] B. Jing Department of Computer Science, Beijing Institute of Applied Meteorology, Beijing 100029, People’s Republic of China
Transcript

Int J Theor Phys (2012) 51:2759–2770DOI 10.1007/s10773-012-1151-5

Improved Eavesdropping Detection Strategy in QuantumDirect Communication Protocol Based on Five-ParticleCluster State

Jian Li · Hai-Fei Jin · Bo Jing

Received: 18 October 2011 / Accepted: 1 April 2012 / Published online: 19 April 2012© Springer Science+Business Media, LLC 2012

Abstract In order to improve the eavesdropping detection efficiency in a two-step quantumdirect communication protocol, an improved eavesdropping detection strategy using the five-particle cluster state is proposed in which the five-particle cluster state is used to detecteavesdroppers. During the security analysis, the method of the entropy theory is introduced,and two detection strategies are compared quantitatively by using the constraint between theinformation that the eavesdropper can obtain and the interference that has been introduced.If the eavesdroppers intend to obtain all information, the eavesdropping detection rate ofthe original two-step quantum direct communication protocol by using EPR pair block asdetection particles will be 50 %; while the proposed strategy’s detection rate will be 88 %.In the end, the security of the proposed protocol is discussed. The analysis results show thatthe eavesdropping detection strategy presented is more secure.

Keywords Quantum direct communication · Five-particle cluster state · Eavesdroppingdetection · Protocol security · Dense coding scheme

1 Introduction

The goal of researching cryptography is to ensure that the secret message is only available tothe two authorized parties of the communication and that the transmission will not be altered.So far, it is trusted that the only proven secure cryptosystem is the one-time-pad scheme inwhich the secret key is as long as the message. The two parties staying far apart who want totransmit their secret message must distribute the secret key first. But it is difficult to distributesecurely the secret key securely through a classical channel. The quantum key distribution

J. Li · H.-F. Jin (�) · B. JingSchool of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, People’sRepublic of Chinae-mail: [email protected]

B. JingDepartment of Computer Science, Beijing Institute of Applied Meteorology, Beijing 100029, People’sRepublic of China

2760 Int J Theor Phys (2012) 51:2759–2770

(QKD), whose task is to create a secret key between two remote authorized users, is oneof the most remarkable applications of quantum mechanics and the only proven protocolfor secure key distribution. Since Bennett and Brassard presented the pioneer QKD protocol(BB84 protocol) [1] in 1984, a lot of quantum information security processing methods havebeen advanced, such as quantum teleportation [2–7], quantum dense coding [8, 9], quantumsecret sharing [10, 11] and so on.

In recent years, a novel concept, quantum secure direct communication (QSDC) was putforward and studied by some groups. Different from the key distribution whose object is toestablish a common random key between two parties, the secure direct communication isto transmit important message directly without first establishing a random key to encryptthem first. Thus, the secure direct communication is more demanding on the security. Asa secure direct communication, it must satisfy two requirements. First, the secure messageshould be read out directly by the legitimate user Bob when he receives the quantum statesand no additional classical information is needed after the transmission of particles. Second,the secret message which has been encoded already in the quantum states should not leakeven though an eavesdropper may get hold of the channel. That is to say, the eavesdroppercannot only be detected but also obtains blind results. As classical message can be copiedfully, it is impossible to transmit secret message directly through classical channels. Butwhen quantum mechanics enters into the communication, the story will change.

Another class of quantum communication protocols [12–14] used to transmit secret mes-sage is called deterministic secure quantum communication (DSQC). Certainly, the receivercan read out the secret message only after he exchanges at least one bit of classical informa-tion for each particle with the sender in a DSQC protocol, which is different from QSDC.DSQC is similar to QKD, but it can be used to obtain deterministic information, not a ran-dom binary string, which is different from the QKD protocols in which the user cannotpredict whether an instance is useful or not.

Many people are interested in researching QSDC, and many protocols like QSDC havealready been proposed, including the protocols without using entanglement [15–17], the pro-tocols using entanglement [18–23] and the two-way QSDC protocols [24–33]. The QSDCprotocol can also be used in some special environments such as the environment first pro-posed by Boström et al. [34] and Deng et al. [18]. In Ref. [34], Boström and Felbingerpresented a famous QSDC protocol which is called “ping-pong” protocol. But researchershave found many vulnerabilities in the “ping-pong” protocol. For example, the “ping-pong”protocol cannot resist the “man-in-middle attack” and the transmission capacity is low.

In order to improve the eavesdropping detection efficiency in two-step quantum di-rect communication protocol, an improved eavesdropping detection strategy using the five-particle cluster state is proposed, in which the five-particle cluster state is used to detecteavesdroppers. During the security analysis, the method of the entropy theory is introduced,and two detection strategies are compared quantitatively by using the constraint between theinformation that the eavesdropper can obtain and the interference that has been introduced.If the eavesdroppers intend to obtain all information, the eavesdropping detection rate ofthe original two-step quantum direct communication protocol by using EPR pair block asdetection particles will be 50 %; while the proposed strategy’s detection rate will be 88 %.In the end, the security of the proposed protocol is discussed. The analysis results show thatthe eavesdropping detection strategy presented is more secure.

For simplicity, we suppose that the protocol presented in Ref. [18] is shortened as DPPand the improved protocol in this paper is shortened as FPP.

Int J Theor Phys (2012) 51:2759–2770 2761

2 DPP Protocol

An EPR pair can be in one of the four Bell states,

∣∣ψ−⟩ = 1√

2

(|01〉 − |10〉), (1)

∣∣ψ+⟩ = 1√

2

(|01〉 + |10〉), (2)

∣∣φ−⟩ = 1√

2

(|00〉 − |11〉), (3)

∣∣φ+⟩ = 1√

2

(|00〉 + |11〉). (4)

If the state of a single photon being measured, the Bell state will collapse and the state ofthe other particle will be completely determined if we know the measurement result of thefirst photon. As is known to us all, the basic principle of the original “ping-pong” protocol isthat one bit information can be encoded in the states |ψ±〉, which is completely unavailableto anyone who only has access to either of the particles. To extract secret message fromAlice, Bob must own both particles, for no experiment performed on only one particle candistinguish these states from each other [34].

Let us start with a brief description of the DPP protocol.(S1) Alice prepares an ordered N EPR pairs in state |ψ−〉, extracts all the first particles,

and forms the sequence S1 in order. The remainder particles are formed the sequence S2 inorder.

(S2) Alice sends the sequence S1 to Bob. Alice and Bob then check eavesdropping by thefollowing procedure: (a) Bob chooses randomly a number of the photons from the sequenceS1 and tells Alice which particle he has chosen. (b) Bob chooses randomly one of the twosets of MBs, say σZ and σX to measure the chosen photons. (c) Bob tells Alice the MBhe has chosen for each photon and the outcomes of his measurements. (d) Alice uses thesame MB as Bob to measure the corresponding photons in the sequence S2 and checks theresults with Bob. If no eavesdropper exists, their results should be completely opposite. Thisis the first eavesdropping check. After that, if the error rate is small, Alice and Bob canconclude that there is no eavesdropper in the line. Alice and Bob continue to perform step(S3); otherwise, they have to discard their transmission and abort the communication.

(S3) Alice encodes her messages on the sequence S2 and transmits them to Bob. Beforethe transmission, Alice must encode the EPR pairs. In order to guard for eavesdropping inthis transmission, Alice has to add a small trick in the sequence S2. She selects randomly inthe sequence S2 some particles and performs on them randomly one of the four operations.The number of such particles will not be big as long as it can provide an analysis of theerror rate. Only Alice knows the positions of these sampling particles and keeps them secretuntil the communication is completed. The remaining sequence S2 particles are used to carrythe secret message directly. To encode the message, they use the dense coding scheme ofBennett and Wiesner [8], where the information is encoded on an EPR pair with a localoperation on a single qubit. Here, the dense coding idea was generalized into secure directcommunication. Different from dense coding, in this protocol, both the particles in an EPRpair are sent from Alice to Bob in two steps, and the transmission of EPR pairs is done inblock. Explicitly, Alice makes one of the four unitary operations (U0,U1,U2 and U3) to eachof her particles,

2762 Int J Theor Phys (2012) 51:2759–2770

U0 = I = |0〉〈0| + |1〉〈1|, (5)

U1 = σz = |0〉〈0| − |1〉〈1|, (6)

U2 = σx = |1〉〈0| + |0〉〈1|, (7)

U3 = −iσy = |1〉〈0| − |0〉〈1|. (8)

And they transform the stat |ψ−〉 into |ψ−〉, |ψ+〉, |φ−〉 and |φ+〉, respectively. These oper-ations correspond to 00, 01, 10 and 11, respectively.

(S4) After the transmission of sequence S2, Alice tells Bob the positions of the samplingpairs and the type of the unitary operations on them. Bob performs the Bell-basis measure-ment on the sequence S1 and S2 simultaneously. By checking the sampling pairs that Alicehas chosen, he will get an estimate of the error rate in the sequence S2 transmission. Infact, in the second transmission, Eve can only disturb the transmission and cannot steal theinformation because she can only get one particle from an EPR pair.

(S5) If the error rate of the sampling pairs is reasonably low, Alice and Bob can then en-trust the process, and continue to correct the error in the secret message using error correc-tion methods. Otherwise, Alice and Bob abandon the transmission and repeat the procedurefrom the beginning.

(S6) Alice and Bob do error correction on their results. This procedure is exactly thesame as that in QKD. However, to preserve the integrity of the message, the bits preservingcorrection code, such as CASCADE [35], should be used.

3 FPP Protocol

3.1 The Process of the FPP Protocol

In the protocol presented in Ref. [36], the transmission is managed in batches of N EPRpairs. An advantage of block transmission scheme is that we can check the security of thetransmission by measuring some of the decoy photons [37, 38] in the first step, where bothAlice and Bob contain a particle sequence at hand, which means that an eavesdropper hasno access to the first particle sequence, then no information will be leaked to her whatevershe has done to the second particle sequence. Follow this method using block transmission.The FPP scheme is proposed and shown in Fig. 1.

In general, an N -particle cluster state is given by Raussendorf and Briegel [39]

|CN 〉 = 1

2N/2

N⊗

a=1

(|0〉aσ a+1Z + |1〉a

)

with σN+1Z = 1. These states show a strong violation of local reality and are shown to be

robust against decoherence. Much work has been done in trying to characterize the entangle-ment exhibited by these states, owing to their promising usefulness in quantum informationtheory. These states have been identified as task-oriented maximally entangled states. Andin this paper, we use five-particle cluster state as the decoy photons, and define

|ψ〉 = 1

2

(|00000〉 + |00111〉 + |11101〉 + |11010〉). (9)

Now let us give an explicit process for the FPP.(S1) Bob prepares a large enough number (N) of Bell states |φ+〉 in order. He extracts all

the first particles in these Bell states, forming the sequence A (the travel qubits) in order. The

Int J Theor Phys (2012) 51:2759–2770 2763

Fig. 1 The process of the FPP

sequence A is used to transmit secure message. The remaining particles form the sequenceB (the home qubits) in order.

(S2) Bob prepares a large number (cN/(1 − c)) of five-particle cluster states |ψ〉 andforms the sequence C to detect eavesdropping. Here, c expresses the probability of switchingto the control mode in the original “ping-pong” protocol [34]. Note that the sequence C

includes 5cN/(1 − c) particles. In the sequence C, Bob reserves the particle 4 and 5 of thefive-particle cluster state, and makes the Bell measurement. After that, Bob inserts particles1, 2, 3 of the five-particle cluster state to the sequence A randomly, forming a new sequenceD, which includes decoy photons of five-particle cluster state. Only Bob knows the positionof decoy photons.

(S3) Bob stores the sequence B and sends the sequence D to Alice.(S4) After Alice received the sequence D, Bob tells her the positions where the decoy

photons are and the measurement of particles 4 and 5 of five-particle cluster state in C. Then,Alice extracts the decoy photons from the sequence D and performs measurement. This isthe first eavesdropping check. If there is no eavesdropper, when Bob’s measurement is |00〉,then the measurement result of particles 1, 2, 3 should be |000〉; when Bob’s measurement is|11〉, then particles 1, 2, 3 should be |001〉; when Bob’s measurement is |01〉, then particles1, 2, 3 should be |111〉; when Bob’s measurement is |10〉, then particles 1, 2, 3 should be|110〉, and they continue to the next step (S5), the FPP protocol keeping on. Otherwise, thecommunication is interrupted, and the FPP protocol switches to (S1).

2764 Int J Theor Phys (2012) 51:2759–2770

(S5) Alice discards the decoy photons, then the sequence D becomes to the sequenceA again. Alice encodes her messages on the sequence A and transmits it to Bob. In orderto guard for eavesdropping in this transmission, Alice also has to insert some five-particlecluster state particles in the sequence A before the transmission. Alice only inserts particles1, 2, 3 of the five-particle cluster state in the sequence A and reserves the particle 4 and 5.Only Alice knows the positions of these decoy photons and the measurement results of theparticles 4 and 5, and keeps them until the communication is completed. The sequence A areused to carry the secret message directly. To increase the transmission capacity, the densecoding scheme is used to encode the secret message. Different from dense coding, in thisprotocol, the transmission of EPR pairs is done in block. Explicitly, Alice makes one ofthe four unitary operations (U0,U1,U2 and U3) to each of her particles, and they transformthe state |φ+〉 into |φ+〉, |φ−〉, |ψ+〉 and |ψ−〉, respectively. These operations correspond to00, 01, 10 and 11, respectively. Then Alice transmits the sequence A which carries decoyphotons to Bob.

(S6) After transmitting the sequence A, Alice tells Bob the positions of the decoy pho-tons and the measurement results of the particles 4 and 5. To obtain the secret message, Bobperforms Bell-basis measurement on the sequences A and B simultaneously. By checkingthe decoy photons that Alice insert, Bob will get an estimate of the error rate in the sequenceA transmission. In fact, Eve can only disturb the transmission and cannot steal the informa-tion because she can only get one particle from an EPR pair. If the error rate of the decoyphotons is reasonably low, Alice and Bob can then entrust the process, and continue to trans-mit the secret message. Otherwise, Alice and Bob abandon the transmission and repeat theprocedures from the beginning.

As discussed above, the secret message can be transmitted securely between Alice andBob, and the eavesdropper will be found out if she disturbs the quantum line. Eve cannotread out the information from the EPR pairs even if she captures the sequence A, becauseno one can read the information from one particle of the EPR pair alone. So, the improvedprotocol is secure.

3.2 The security analysis of the protocol

In the original “ping-pong” protocol, the author calculated the maximal amount of the in-formation I (dlO) that Eve can eavesdrop and the probability dlO that Eve is detected [34].And the function I (dlO) is provided. When p0 = p1 = 0.5,

I (dlO) = −dlO log2dlO − (1 − dlO) log2(1 − dlO). (10)

The above method can be used to compare the efficiency of eavesdropping detectionbetween the two protocols.

Now, let us analyze the efficiency of eavesdropping detection in FPP protocol. In orderto gain the information that Alice operates on the travel qubits, Eve performs the unitaryattack operation E on the composed system firstly. Then Alice takes a coding operation onthe travel qubits. Eve performs a measurement on the composed system at last. Note that,all transmitted particles are sent as block before detecting eavesdropping, which is differentfrom the original “ping-pong” protocol. For Eve does not know which particles are used todetect eavesdropping, so what she can only do is only performing the same attack operationon all the particles. As for Eve, the state of the travel qubits is indistinguishable from thecomplete mixture, so all the travel qubits are considered in either of the states |0〉 or |1〉 withequal probability p = 0.5.

Generally speaking, supposing there is a group of decoy photons at the five-particle clus-ter state |ψ〉, and after performing the attack operation E, the states |0〉 and |1〉 become

Int J Theor Phys (2012) 51:2759–2770 2765

∣∣ϕ′

0

⟩ = E ⊗ |0x〉 = α|0x0〉 + β|1x1〉, (11)∣∣ϕ′

1

⟩ = E ⊗ |1x〉 = m|0y0〉 + n|1y1〉, (12)

where |xi〉 and |yi〉 are the pure ancillary states determined by E uniquely, and

|α|2 + |β|2 = 1, |m|2 + |n|2 = 1. (13)

Then let us calculate the detection probability. Attacked by Eve, the state of composed sys-tem becomes

|ψ〉Eve = E ⊗ E ⊗ E ⊗ I ⊗ I

[1

2

(|0x0x0x0x0x〉 + |0x0x1x1x1x〉

+ |1x1x1x0x1x〉 + |1x1x0x1x0x〉)]

= 1

2

[(

α|0x0〉 + β|1x1〉) ⊗ (

α|0x0〉 + β|1x1〉) ⊗ (

α|0x0〉 + β|1x1〉) ⊗ |00〉

+ (

α|0x0〉 + β|1x1〉) ⊗ (

α|0x0〉 + β|1x1〉) ⊗ (

m|0y0〉 + n|1y1〉) ⊗ |11〉

+ (

m|0y0〉 + n|1y1〉) ⊗ (

m|0y0〉 + n|1y1〉) ⊗ (

m|0y0〉 + n|1y1〉) ⊗ |01〉

+ (

m|0y0〉 + n|1y1〉) ⊗ (

m|0y0〉 + n|1y1〉) ⊗ (

α|0x0〉 + β|1x1〉 ⊗ |10〉)]. (14)

Obviously, when Alice performs measurement on the decoy photons, the probabilitywithout eavesdropper is

p(|ψ〉Eve

) = 1

4

(|α3|2 + |α2n|2 + |n3|2 + |n2α|2). (15)

So the lower bound of the detection probability is

dlF = 1 − p(|ψ〉Eve

) = 1 − 1

4

(|α3|2 + |α2n|2 + |n3|2 + |n2α|2). (16)

Suppose |α|2 = a, |β|2 = b, |m|2 = s, |n|2 = t , where a, b, s and t are positive real num-bers, and a + b = s + t = 1. Then

dlF = 1 − 1

4

(

a3 + a2t + t3 + t2a)

. (17)

However, in DPP, authors have calculated the efficiency of eavesdropping detection. Heredon’t analyze it again. The efficiency is

dlD = |β|2 = ∣∣β ′∣∣2 = 1 − |α|2 = 1 − ∣

∣α′∣∣2. (18)

Now, let us analyze how much information Eve can gain maximally when there is nocontrol mode. First, Alice takes measurement on the photon in her hand with single-photondetector and the state is |0〉 supposing that the quantum state of the photon in the hand ofAlice is |0〉, which is similar to that in Ref. [18]. Then the state of the system composed ofBob’s photon is

∣∣ψ ′⟩ = E|0,E〉 ≡ E|0〉|E〉 = α|0〉|ε00〉 + β|1〉|ε01〉 ≡ α|0, ε00〉 + β|1, ε01〉, (19)

and Eve’s probe can be described by

ρ ′ = |α|2|0, ε00〉〈0, ε00| + |β|2|1, ε01〉〈1, ε01| + αβ∗|0, ε00〉〈1, ε01|+ α∗β|1, ε01〉〈0, ε00|. (20)

2766 Int J Theor Phys (2012) 51:2759–2770

After encoding the unitary operations U0,U1,U2 and U3 with the probabilities p0,p1,p2

and p3, respectively, the state reads

ρ ′′ = (p0 + p3)|α|2|0, ε00〉〈0, ε00| + (p0 + p3)|β|2|1, ε01〉〈1, ε01|+ (p0 − p3)αβ∗|0, ε00〉〈1, ε01| + (p0 − p3)α

∗β|1, ε01〉〈0, ε00|+ (p1 + p2)|α|2|1, ε00〉〈1, ε00| + (p1 + p2)|β|2|0, ε01〉〈0, ε01|+ (p1 − p2)αβ∗|1, ε00〉〈0, ε01| + (p0 − p3)α

∗β|0, ε01〉〈1, ε00|, (21)

which can be rewritten in the orthogonal basis {|0, ε00〉, |1, ε01〉, |1, ε00〉, |0, ε01〉},

ρ ′′ =

⎜⎜⎜⎜⎝

(p0 + p3)|α|2 (p0 − p3)αβ∗ 0 0

(p0 − p3)α∗β (p0 + p3)|β|2 0 0

0 0 (p1 + p2)|α|2 (p1 − p2)αβ∗

0 0 (p0 − p3)α∗β (p1 + p2)|β|2

⎟⎟⎟⎟⎠

, (22)

with

p0 + p1 + p2 + p3 = 1. (23)

The information I0 that Eve can get is equal to the Von Neumann entropy

I0 =3

i=0

−λi log2 λi, (24)

where λi (i = 0,1,2,3) are the eigenvalues of ρ ′′, which are

λ0,1 = 1

2(p0 + p3) ± 1

2

(p0 + p3)2 − 16p0p3|α|2|β|2

= 1

2(p0 + p3) ± 1

2

(p0 + p3)2 − 16p0p3

(

d − d2)

, (25)

λ2,3 = 1

2(p1 + p2) ± 1

2

(p1 + p2)2 − 16p1p2|α|2|β|2

= 1

2(p1 + p2) ± 1

2

(p1 + p2)2 − 16p1p2(

d − d2)

. (26)

In the case of p0 = p1 = p2 = p3 = 0.25, where Alice encodes exactly 2 bits, expression(25)–(26) is simplify to λ0 = 0.5d,λ1 = 0.5(1 − d),λ2 = 0.5d and λ3 = 0.5(1 − d). Inter-estingly, the maximal information gain is equal to the Shannon entropy of a binary channel

I0(d) = −1

2d log2

(1

2d

)

−(

1

2− 1

2d

)

log2

(1

2− 1

2d

)

− 1

2d log2

(1

2d

)

−(

1

2− 1

2d

)

log2

(1

2− 1

2d

)

. (27)

Then assume that Bob sends |1〉 rather than |0〉. The above security analysis can be done infull analogy, resulting in the same crucial relations. The maximal amount of information isequal to the Shannon entropy of a binary channel

I1(d) = −1

2d log2

(1

2d

)

−(

1

2− 1

2d

)

log2

(1

2− 1

2d

)

− 1

2d log2

(1

2d

)

−(

1

2− 1

2d

)

log2

(1

2− 1

2d

)

. (28)

Int J Theor Phys (2012) 51:2759–2770 2767

Fig. 2 The comparison of the two detection results. The dotted line expresses the function I (dlD) in DPPand the thick line expresses the function I (dlF ) in FPP. Obviously, if Eve wants to get the full information,she must encounter the higher detection efficiency in FPP

So the maximal amount of information that Eve can obtain is

I = 0.5(I0 + I1) = 1 − d log2 d − (1 − d) log2(1 − d). (29)

After some simple mathematical calculations in FPP, when a = t , get

dlF = 1 − a3, (30)

and the maximum I is

I (dlF ) = 1 + H(

3√

1 − dlF

)

, (31)

where

H(x) = −x log2 x − (1 − x) log2(1 − x). (32)

However, in DPP, the maximum I is

I (dlD) = 1 − dlD log2 dlD − (1 − dlD) log2(1 − dlD) = 1 + H(dlD). (33)

The above analysis shows that function I (dlD) and I (dlF ) have the similar algebraicproperties. If Eve wants to gain the full information (I = 2), the probabilities of eavesdrop-ping detection are dlD(I = 2) = 0.5 in DPP and dlF (I = 2) = 0.88 in FPP.

In order to contrast the two functions, Fig. 2 is given. As are shown in Fig. 2, if Eve wantsto gain the full information, she must face a larger detection probability in FPP than DPP.This also indicates that FPP is more secure than DPP.

Taking the probability c of the decoy mode into account, the effective transmission rate,i.e. the number of message bits per protocol run, is 1 − c, which is equal to the probabilityfor a message transfer. So, if Eve wants to eavesdrop one message transfer without beingdetected, the probability for this event is

s(c, d) = (1 − c) + c(1 − d)(1 − c) + c2(1 − d)2(1 − c) + · · · = 1 − c

1 − c(1 − d). (34)

2768 Int J Theor Phys (2012) 51:2759–2770

Fig. 3 Eavesdropping success probability as a function of the maximal eavesdropped information, plottedfor different detection probabilities d

Then the probability of successful eavesdropping I = nI (d) bits is s(I, c, d) = s(c, d)I/I (d).So

s(I, c, d) =(

1 − c

1 − c(1 − d)

)I/I (d)

, (35)

where

I (d) = 1 + H( 3√

1 − d)

. (36)

Now let us analyze the security of the FPP. In the limit I → ∞ (a message or key of infi-nite length) get s → 0, so the presented protocol in this paper is asymptotically secure. If thesecurity of the quantum channel is ensured, the protocol is completely secure. For example,a choice of the decoy mode is c = 0.5. In Fig. 3, the eavesdropping success probability as afunction of the information gain I is plotted, for c = 0.5 and for different detection probabil-ities d which Eve can choose. Note that for d < 0.5, Eve only gets one part of the messageright and does not even know which part she has got. So, the FPP protocol is proved secure.

4 Conclusion and Further Work

In summary, an improved eavesdropping detection strategy based on quantum direct com-munication protocol and five-particle cluster state has been introduced, and two eavesdrop-ping detection strategies are compared quantitatively by using the constraint between theinformation that eavesdropper obtains and the interference introduced. In FPP, the sequenceB is always in hands of Bob and Eve can only touch the sequence A. Any useful messagewill not be leaked to the potential eavesdropper. So the security message can be securelytransmitted to the receiver. Compared with the DPP, in the FPP protocol, the five-particlecluster state particles are used to detect eavesdropping which increases the efficiency ofdetection eavesdropping.

In the analysis, if the eavesdropper obtains the full information, she must face a largerdetection probability in the FPP than DPP, which shows that the efficiency of eavesdropping

Int J Theor Phys (2012) 51:2759–2770 2769

detection in FPP is higher than DPP. So it can ensure the quantum direct communicationprotocol is more secure. In order to detect eavesdropping, Bob sends more decoy photonsthan DPP, while this method reduces the number of measurement. That is, Bob gains thebetter security at the cost of sending more particles.

As we know, the quantum direct communication protocol can also be used as an efficientQKD protocol. In this paper, only the situation that the improved protocol is used as a QKDstrategy is considered. So the weaknesses which the quantum direct communication protocolmust be faced, such as the noise channel [40, 41], the Dos attack [42, 43] and so on, maynot be considered. In the further work, the other QSDC protocol will be researched.

Acknowledgements The project was supported by The National Natural Science Foundation of China(Grant No. 61100205).

References

1. Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Pro-ceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Banga-lore, India, pp. 175–179. IEEE, New York (1984)

2. Bennett, C.H., Brassard, G., Crepeau, C., et al.: Teleporting an unknown quantum state via dual classicaland Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895 (1992)

3. Bouwmeester, D., Pan, J.W., Mattle, K., et al.: Experimental quantum teleportation. Nature 390, 575(1997)

4. Bouwmeester, D., Mattle, K., Pan, J.W., et al.: Experimental quantum teleportation of arbitrary quantumstates. Appl. Phys. B 67, 749 (1998)

5. Yoon-Ho, K., Kulik, S.P., Yanhua, S.: Quantum teleportation with a complete Bell state measurement.In: Quantum Electronics and Laser Science Conference, p. 223 (2001)

6. Hari, P.: Quantum teleportation. In: International Conference on Emerging Trends in Electronic andPhotonic Devices $ Systems (2009)

7. Akira, F.: Quantum teleportation and quantum information processing. In: Quantum Electronics andLaser Science Conference (2010)

8. Bennett, C.H., Wiesner, S.J.: Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 69, 2881 (1992)

9. Klause, M., Weinfurter, H., Paul, G.K., et al.: Dense coding in experimental quantum communication.Phys. Rev. Lett. 76, 25 (1996)

10. Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)11. Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)12. Shimizu, K., Imoto, N.: Communication channels secured from eavesdropping via transmission of pho-

tonic Bell states. Phys. Rev. A 60, 157 (1999)13. Shimizu, K., Imoto, N.: Single-photon-interference communication equivalent to Bell-state-basis cryp-

tographic quantum communication. Phys. Rev. A 62, 054303 (2000)14. Beige, A., Englert, B.G., Kurtsiefer, C., et al.: Secure communication with a publicly known key. Acta

Phys. Pol. A 101, 357 (2002)15. Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69,

052319 (2004)16. Cai, Q.Y., Li, B.W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett.

21, 601 (2004)17. Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev.

Lett. 94, 140501 (2005)18. Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-

Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)19. Cai, Q.Y., Li, B.W.: Improving the capacity of the Boström-Felbinger protocol. Phys. Rev. A 69, 054301

(2004)20. Gao, T., Yan, F.L., Wang, Z.X.: A simultaneous quantum secure direct communication scheme between

the central party and other M parties. Chin. Phys. Lett. 22, 2473 (2005)21. Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle

Green-Horne-Zeilinger state. Opt. Commun. 253, 15 (2005)

2770 Int J Theor Phys (2012) 51:2759–2770

22. Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on thesecret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)

23. Li, X.H., Li, C.Y., Deng, F.G., et al.: Quantum secure direct communication with quantum encryptionbased on pure entangled states. Chin. Phys. Lett. 16, 2149 (2007)

24. Nguyen, B.A.: Quantum dialogue. Phys. Lett. A 328, 6 (2004)25. Man, Z.X., Zhang, Z.J., Li, Y.: Quantum dialogue revisited. Chin. Phys. Lett. 22, 22 (2005)26. Ji, X., Zhang, S.: Secure quantum dialogue based on single-photon. Chin. Phys. Lett. 15, 1408 (2006)27. Man, Z.X., Xia, Y.J., Nguyen, B.A.: Quantum secure direct communication by using GHZ states and

entanglement swapping. J. Phys. B, At. Mol. Opt. Phys. 39, 3855 (2006)28. Man, Z.X., Xia, Y.J.: Controlled bidirectional quantum direct communication by using a GHZ state.

Chin. Phys. Lett. 23, 1680 (2006)29. Xia, Y., Fu, C.B., Zhang, S., et al.: Quantum dialogue by using the GHZ state. J. Korean Phys. Soc. 48,

24 (2006)30. Jin, X.R., Ji, X., Zhang, Y.Q., et al.: Three-party quantum secure direct communication based on GHZ

states. Phys. Lett. A 354, 67 (2006)31. Man, Z.X., Xia, Y.J.: Improving of security of three-party quantum secure direct communication based

on GHZ states. Chin. Phys. Lett. 24, 15 (2007)32. Chen, Y., Man, Z.X., Xia, Y.J.: Quantum bidirectional secure direct communication via entanglement

swapping. Chin. Phys. Lett. 24, 19 (2007)33. Yang, Y.G., Wen, Q.Y.: Quasi-secure quantum dialogue using single photons. Sci. China Ser. G 50(5),

558 (2007)34. Boström, K., Felbringer, T.: Deterministic secure direct communication using entanglement. Phys. Rev.

Lett. 89, 187902 (2002)35. Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Lecture Notes in Computer

Science, vol. 765, p. 410 (1994)36. Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev.

A 65(3), 032302 (2002)37. Li, C.Y., Zhou, H.Y., Wang, Y., et al.: Secure quantum key distribution network with Bell states and local

unitary operations. Chin. Phys. Lett. 22(5), 1049 (2005)38. Li, C.Y., Li, X.H., Deng, F.G., et al.: Efficient quantum cryptography network entanglement and quantum

memory. Chin. Phys. Lett. 23(11), 2897 (2006)39. Raussendorf, R., Briegel, J.: A one-way quantum computer. Phys. Rev. Lett. 86, 5188 (2001)40. Wójcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett.

90(15), 157901 (2003)41. Deng, F.G., Li, X.H., Li, C.Y., et al.: Eavesdropping on the “ping-pong” quantum communication proto-

col freely in a noise channel. Chin. Phys. Lett. 16, 277 (2007)42. Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801

(2003)43. Zhang, Z.J., Man, Z.X.: The improved Boström-Felbinger protocol against attacks without eavesdrop-

ping. Int. J. Quantum Inf. 2, 521 (2004)


Recommended