\begin{document}$ |0\rangle $\end{document} particles or \begin{document}$ |+ \rangle $\end{document} particles) are found in the two particles. Then their positions are marked as L and they traverse down until all the identity keys are traversed, obtaining a position sequence L. After sending the two particles to Bob for eavesdropping detection, Bob measures the L position of the two particles on the corresponding basis according to the value of the identity key, the measurement results are coded, and compared with the identity key IDA to complete the identity authentication. After sending the particles for the third time. the receiver extracts all the detected particles, and then the GHZ state particles are jointly measured, and the original information is recovered through the previously given coding rules, so as to realize quantum safe direct communication. The design of this scheme is simple and efficient, and the communication can be realized without complex unitary transformation. The correctness analysis proves that the scheme is correct in theory. The security analyses of interception/measurement retransmission attack, Trojan horse attack, denial of service attack, auxiliary particle attack, identity impersonation attack, and other attacks prove that the scheme can resist common internal attacks and external attacks, and solve the problem of information leakage. The transmission efficiency of the scheme is 1, the quantum bit utilization is 1, and the coding capacity is a quantum state carrying 3 bits of information. Compared with some previous schemes, this scheme has obvious advantages in these three aspects. The biggest advantage is that the sender does not need to assume the legitimacy of the receiver when sending information, so it has high practical application value."> - 必威体育下载

Search

Article

x

留言板

姓名
邮箱
手机号码
标题
留言内容
验证码

downloadPDF
Citation:

    Zhou Xian-Tao, Jiang Ying-Hua
    PDF
    HTML
    Get Citation
    Metrics
    • Abstract views:2964
    • PDF Downloads:53
    • Cited By:0
    Publishing process
    • Received Date:24 August 2022
    • Accepted Date:03 October 2022
    • Available Online:19 October 2022
    • Published Online:20 January 2023

      返回文章
      返回
        Baidu
        map