Published in

IOP Publishing, Chinese Physics Letters, 5(22), p. 1049-1052, 2005

DOI: 10.1088/0256-307x/22/5/006

Links

Tools

Export citation

Search in Google Scholar

Secure quantum key distribution network with Bell states and local unitary operations

Journal article published in 2005 by Li Chun-Yan, Hong-Yu Zhou, Cy Li, Wang Yan, Fu-Guo Deng ORCID
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing and measuring the Bell states, and the users encodes the states with local unitary operations. For preventing the server from eavesdropping, we design a decoy when the particle is transmitted between the users. It has high capacity as one particle carries two bits of information and its efficiency for qubits approaches 100%. Moreover, it is not necessary for the users to store the quantum states, which makes this scheme more convenient for application than others. ; Comment: 5 pages, 2 figures. The decoy-photon technique is presented in a clear way for preventing a potentially dishonest server on a network from eavesdropping quantum communication freely. This technique may be useful in quantum secret sharing (of classical information or quantum information), controlled teleportation, and so on