Deterministic Secure Direct Communication Using Mixed state

Preprint English OPEN
Cai, Qing-yu;
(2003)
  • Subject: Quantum Physics

We show an improved ping-pong protocol which is based on the protocol showed by Kim Bostrom and Timo Felbinger [Phys. Rev. Lett. 89, 187902 (2002); quant-ph/0209040]. We show that our protocol is asymptotically secure key distribution and quasisecure direct communicatio... View more
  • References (11)
    11 references, page 1 of 2

    [1]. C. H. Bennett and G. Brassard, 1984, in proceedings of the IEEE International Conf erence on Computers, Systems and Si gnal Pr oces sin g, Bangalor, India, (IEEE, New York), pp. 175-179.

    [2]. A. Ekert, Phys. Rev. Lett. 67, 661 (1991).

    [3]. D. Bruss, Phys.Rev. Lett. 81, 3018 (1998).

    [4]. A. Beige, B.-G. Englert, C. Kurtsiefer, and H. Weinfurter, Acta Phys. Pol. A 101, 357 (2002).

    [5]. Kim Bostrom and Timo Felbinger, Phys. Rev. Lett. 89, 187902 (2002).

    [6]. E. H. Lieb and M. B. Ruskai. Phys. Rev. Lett., 30, 434-436, (1973).

    [7]. E. H. Lieb and M. B. Ruskai. J. Math. Phys., 14, 1938-1941, (1973).

    [8]. M. A. Nielsen and I. L. Chuang. Quantum Computation and Quantum Information (Cambridge University Press, Cambridge, UK, 2000).

    [9]. W. F. Stinespring, Proc. Am. Math. Soc. 6, 211 (1955).

    [10]. A. Beveratos, R. Brouri, T. Gacoin, A. Villing, J.-P. Poizat, and P. Grangier. Phys. Rev. Lett. 89, 187901, (2002).

  • Metrics
Share - Bookmark