TY - JOUR
T1 - Secure quantum communication using classical correlated channel
AU - Danulussi Alves Costa, Dimitri
AU - de Almeida, N. G.
AU - Villas-Boas, C. J.
N1 - We thank Grants #2012/02816-5, #2012/00176-9 and #2013/04162-5, São Paulo Research Foundation (FAPESP), Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq) and Instituto Nacional de Ciência e Tecnologia Informação Quântica (INCT-IQ) for the financial support. NGA thanks FAPEG for financial support.
PY - 2016/10
Y1 - 2016/10
N2 - We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice’s measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.
AB - We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice’s measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.
U2 - 10.1007/s11128-016-1389-6
DO - 10.1007/s11128-016-1389-6
M3 - Article
VL - 15
SP - 4303
EP - 4311
JO - Quantum Information Processing
JF - Quantum Information Processing
IS - 10
ER -