1. Introduction
Quantum communication uses physical principles to ensure the security of communication. Bennett and Brassard proposed the quantum key distribution (QKD) protocol in 1984 (BB84) [1] which provides a secure way for key agreement. Long and Liu proposed quantum secure direct communication (QSDC) [2] in 2000, which provides secure and reliable communication in a channel with both noise and eavesdropping [2]. Rapid inevitable developments have been made in the fields of QKD and QSDC [1,2,3,4,5,6,7,8,9,10]. QSDC and QKD are designed for different application scenarios: QKD uses quantum states for key negotiation, which is used in classical processes to transmit information. QSDC does not require the use of keys and can directly load information onto quantum states for secure transmission, eliminating some processes and the related hidden security vulnerabilities. QSDC is communication in the traditional communication sense, namely it is the transmission of information from one place to another place. Therefore, QSDC can perform the distribution of a predetermined key in classical cryptography. Because QSDC is a type of classical communication, it is compatible with the existing Internet naturally. Therefore, the secure repeater network formed by QSDC leverages QSDC to transmit classical encrypted messages and relay them using classical repeaters [11,12], can construct quantum networks with end-to-end security using existing technologies, and thus can accelerate the development of quantum networks. Another advantage of QSDC is that it can perform stealth communication, offering secrecy and protection of the users because quantum signals are weak and difficult to be found, and furthermore the users can perceive their exposure by inspecting a sudden change in their communication error rate.
QSDC transmits information directly through a quantum channel, using entanglement [2,4,5,13,14] or single photons [3,13]. The security of these protocols has been completed [15,16,17] based on the quantum wiretap channel theory [18,19,20]. Due to imperfections in measurement devices, practical systems possess security loopholes [21,22,23]. In order to fix these loopholes, measurement-device-independent QSDC (MDI-QSDC) [24,25] protocols have been developed. In 2021, Long et al. proposed a simple and powerful method to increase channel capacity using masking (INCUM) [26], which increases the channel capacity and communication distance of QSDC. There have been several successful demonstrations of QSDC in fiber [15,27,28] and in free space [29,30]. In 2020, a secure-classical repeater QSDC network have been proposed and experimentally demonstrated [11,12]. A 15-user QSDC network with direct links has been reported [31]. In 2022, Zhang et al. reported a QSDC system with mixed coding of phase and time-bin states and achieved a communication distance of 102.2 km in fiber, setting up a new world record [32].
Traditional QSDC protocols [2,3,24,25] require two-way transmission, which leads to double loss of signal in the channel and also limits the transmission distance by half compared to one-way protocols in principle. Remarkably, with the help of the quantum-memory-free (QMF) technique, one-way QSDC protocols have been proposed [33,34] and QMF-QSDC with sophisticated coding has also been designed [35,36]. In addition, there are some one-way QSDC protocols using hyperentanglement [37,38,39].
However, the MDI-QSDC [24,25] protocols face several practical limitations, including reliance on immature quantum memory, the assumption of ideal entangled or single-photon light sources, limited transmission distances and low secrecy rates. Single-photon-memory MDI-QSDC [40] utilizes QMF technique to eliminate the dependency of MDI-QSDC protocol on high-performance quantum memory. To further address other issues, we propose a one-photon-interference MDI QSDC (OPI-QSDC) protocol in this paper. Our OPI-QSDC protocol is a new one-way MDI-QSDC protocol that operates without relying on quantum memory. Moreover, we harnesses single-photon interference, as utilized in twin-field QKD protocols [41,42,43,44,45,46,47,48,49] that have broken the repeaterless quantum communications bound known as the Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound [50]. This bound has been extended into bipartite quantum interactions [51] and quantum network universal limitations [52]. In the OPI-QSDC protocol, Alice and Bob are able to achieve single-photon interference at the intermediate node Charlie by utilizing phase-locking techniques [53], when using weak coherent light sources. This doubles the transmission distance compared to other one-way QSDC protocols [34]. We analyze the security of our protocol using quantum wiretap channel theory and simulate its performance, demonstrating its ability to break the PLOB bound.
The remainder of this paper is organized as follows. In Section 2, we describe the detailed steps of the proposed OPI-QSDC protocol, while in Section 3, we analyze its security. Then in Section 4, we present our numerical analysis of performance. Finally, we give a conclusion in Section 5.
2. Details of Protocol
In this section, we propose our OPI-QSDC protocol. As illustrated in Figure 1a, we suppose that Alice and Bob utilize phase locking techniques to lock the frequency and global phase of their lasers. They then simultaneously send light pulses to Charlie, an untrusted third party right in the middle between them. We use to represent the message that Alice wants to transmit to Bob, and represents the ciphertext. In particular, The detailed steps of our protocol are as follows.
Step 1: encoding. Alice encodes the message M to be transmitted to form the codeword C. Encoding operations use forward error correction codes, secure codes [36] and INCUM [26]. Details of the encoding process can be found in the Appendix A.
Step 2: mode preparation. Alice and Bob randomly select the coding mode with a probability of and the multi-intensity mode with a probability of p, where . The quantum states sent in each mode are as follows.
Coding mode: a weak coherent state for logical 0 or a weak coherent state for logical 1, where is the intensity of the coherent state. In this mode, Alice selects the coherent state to be sent based on the encoding result. For example, if the encoding result is 0, Alice sends a state; otherwise, she sends a state. Bob randomly chooses to send these two states.
Multi-intensity mode: three different intensity and phase-randomized weak coherent states and , where and are randomly chosen from the set of , while , and , are randomly chosen from .
Step 3: measurement. Charlie measures the pulses sent by Alice and Bob using single-photon interferometer, and publishes measurement results. Let and denote the measurement outcome of and , where value “0” indicates a no-click event and value “1” indicates a click event. As shown in Figure 1c, Alice and Bob discard the no-click events and two-click events, and retain the one-click events, namely .
Step 4: mode matching. After all measurements are completed, Alice and Bob publish the modes information. They retain the measurement results of the same modes, and discard the measurement results of different modes, as shown in Figure 1b. Note that there is a probability of for a mode mismatch, resulting in the loss of information transmitted by Alice. However, Alice and Bob can utilize error correcting codes in Step 1 to recover the lost information. If they both send the multi-intensity mode, they publish the intensity and phase of the weak coherent state. Then they retain pulses with and or .
Step 5: parameter estimation. Alice and Bob randomly publish the bit values in some coding modes to estimate the quantum bit error rate (QBER), and then use different intensity values in multi-intensity modes to estimate the amount of information leakage. Based on these results of parameter estimation, they proceed to step 6.
Step 6: decoding. Bob decodes the message M from the codeword C. Details of the decoding process can be found in the Appendix A.
3. Security Analysis
In order to complete our security proof, we introduce an equivalent entanglement-based OPI-QSDC protocol, as detailed in Appendix B. In this protocol, we transform the laser source into an entanglement-photon source that can be analyzed conveniently. This way, the security of the entanglement-based protocol will imply the security of OPI-QSDC.
According to quantum wiretap channel theory [16,17,18,54,55], there is a secrecy capacity that enables us to reliably and securely transmit the message to recipients by using a forward encoding with a coding rate R lower than it, where and are the main channel’s capacity and wiretap channel’s capacity, respectively. We discard the case where there is no detector click and both detectors click, then first consider the case where only detector clicks. In this case, the achievable secrecy rate is
(1)
where is the mutual information of Alice and Bob when only detector clicks, while is the mutual information of Alice and Eve when only detector clicks. We assume the channel of Alice and Bob is a symmetric channel, thus(2)
where is the binary entropy function, i.e., , and e is quantum bit error rate (QBER). In our protocol, we use X basis to transmit information, so , where is the X-basis error rate when only detector clicks.To calculate , we can analyze the process of eavesdropping and then use the results of the parameter estimation. See Appendix B for details of the derivation. The upper bound on is
(3)
where is the total gain, i.e., the conditional probability of only detector clicks when Alice and Bob send pulses with the intensity of u, while is the probability when there are photons in the channel. is the yield of the -photon state, i.e., the conditional probability of only detector clicks when there are photons in the channel. Hence, the achievable rate is(4)
where is the mode matching rate, and is an inefficiency function for forward coding. We skip the discussion for only clicks; however, it holds in a similar manner, which is(5)
Finally, the total secrecy rate formula is given by(6)
4. Performance Analysis
4.1. Comparison with Other QSDC Protocols
We performed numerical simulations for characterizing the performance of the proposed OPI-QSDC and other QSDC protocols [3,24]. The key parameter settings for our simulations are shown in Table 1 [32,42].
As shown in Figure 2, the OPI-QSDC protocol is able to exceed the PLOB bound when 228 km with practical parameters. The Appendix C contains derivation details of simulation formulas. We also simulate the performance of MDI-QSDC [24] and DL04 [3] protocol with the method of INCUM [26]. The MDI-QSDC and DL04 protocols are two-way protocols which suffer double channel loss over a certain transmission distance. To be more precise, the MDI-QSDC protocol detects twice to complete the transmission of information, while DL04 protocol detects only once. Therefore, the explicit secrecy rate equations used to draw the idealized protocol performance in Figure 2 are:
(7)
where , are the detection efficiencies and the channel losses function, respectively. The DL04 protocol’s beginning rates will be higher than the OPI-QSDC, since we did not account for the effects of real light sources on its performance when we parameterized the protocols. The Appendix D contains further simulation details of the DL04 and MDI-QSDC protocols.4.2. Effect of Light Intensity
The effects of light intensity u on the OPI-QSDC protocol have been explored separately. The data in Table 1 are utilized to determine the parameters of the numerical simulations in this subsection.
In terms of light intensity, there are two aspects to consider. Firstly, as the light intensity increases, the mean photon number in the channel also increases, leading to a corresponding increase in the gain . Secondly, the even-photon-number component in the channel becomes more prominent, resulting in a higher phase-error rate . As illustrated in Figure 3, the OPI-QSDC protocol demonstrates its optimal performance when the light intensity is set to . With these parameters, our OPI-QSDC protocol achieves a maximum transmission distance of 443.5 km. This finding underscores the significance of employing a relatively weaker coherent state light source to enhance the protocol’s performance in practical applications. However, it is worth noting that an excessively weak light source may also lead to a low transmission distance.
5. Conclusions
In summary, we have proposed an OPI-QSDC protocol, and its security has been analyzed when using practical coherent light sources. This protocol has the following advantages compared to previous QSDC protocols: (1) It has a longer transmission distance and a higher secrecy rate. It provides a new option for the application scenarios of QSDC; for example, the OPI-QSDC protocol can play a role in long-distance intercity quantum communication. (2). The property of MDI further improve the safety of the system when using devices with imperfections. (3). It is more practical because it uses coherent state light sources.
The performance analysis of our protocol shows that, compared to the DL04 and MDI-QSDC protocols, it has a longer transmission distance which could achieve 443.5 km with a light intensity of 0.046 when using standard optical fiber. Additionally, it surpasses the PLOB bound when the transmission distance exceeds 228 km. In the future, the OPI-QSDC protocol has the potential to be put into practical application and may find applications in the global quantum Internet.
Conceptualization, X.-J.L.; Software, X.-J.L.; Formal analysis, X.-J.L.; Writing—original draft, X.-J.L.; Writing—review & editing, M.W., X.-B.P. and Y.-R.Z.; Supervision, G.-L.L. All authors have read and agreed to the published version of the manuscript.
No new data were created or analyzed in this study.
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 1. Schematic diagram of OPI-QSDC protocol and the process of mode matching and measurement. BS, 50:50 beam splitter; [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], single-photon detector. (a) In the OPI-QSDC protocol, we assume that the laser source and coding process of Alice and Bob will not be attacked by Eve, which is marked with a solid box. The untrusted Charlie uses a single-photon interferometer to measure the signals sent by Alice and Bob, but the measurement is completely controlled by Eve, which is marked with a dashed box. The three communication parties also need to use the open classic channel marked with the green box to exchange information. We assume that the information in this channel published by Alice and Bob will not be tampered with by Eve. (b) Red and blue pulses represent coding mode and multi-intensity mode, respectively. The same mode sent by Alice and Bob will be able to achieve a mode matching, and deterministic transmission of information. (c) We take the case where only detector [Forumla omitted. See PDF.] clicks as an example. At this time, Charlie publishes that [Forumla omitted. See PDF.] = 1, [Forumla omitted. See PDF.] = 0.
Figure 2. Secrecy rate [Forumla omitted. See PDF.] versus the transmission distance of OPI-QSDC and other QSDC protocols. The black line is the PLOB bound. The green, blue, and red line represent OPI-QSDC, DL04 and MDI-QSDC protocol, respectively. The solid (dashed) lines indicate the parameterized (idealized) protocol performance. For the specific parameters, the rate of OPI-QSDC surpasses the PLOB bound when [Forumla omitted. See PDF.] 228 km. The longest transmission distance of our protocol is able to achieve 440 km.
Figure 3. The longest transmission distance versus the light intensity u. The red-solid line indicates the longest distance that can be transmitted by OPI-QSDC protocol under different light intensities. The blue-dashed line d = 443.5 km and the pink-dashed line u = 0.046 mark the maximum distance and corresponding light intensity that can be transmitted by our protocol.
Key parameter settings of simulation.
Parameter | Value | Description |
---|---|---|
| 0.2 dB/km | the attenuation coefficient |
| 15% | the efficiency of detectors |
| | the probability of dark count |
| 1.5% | the misalignment probability |
f | 1.2 | the inefficiency function for forward coding |
u | 0.046 | the light intensity |
Appendix A. Details of Encoding and Decoding
To ensure the security of QSDC, it is essential to establish the channel’s security before loading information. To achieve this, in the OPI-QSDC protocol, the message to be transmitted is divided into multiple frames, with each frame containing several bits. The security of each frame is guaranteed by using the estimation results of the previous frame parameters. The first frame is used for transmitting random numbers. The schematic diagram of the OPI-QSDC protocol in i-th frame, including the complete encoding and decoding process, is illustrated in
Figure A1. The schematic diagram of the OPI-QSDC protocol in i-th frame with detailed encoding and decoding process. SSTS: shared secure transmission sequence. IM: intensity modulator. PM: phase modulator. RNG: random number generator.
The detailed steps of i-th frame are as follows.
Step 1: encoding. Alice encodes the message M to be transmitted as follows.
(1). Alice uses SSTS S to encrypt plaintext message M and obtains Y, where
(2). Alice encodes Y into X and then places it in the cache.
Step 2: mode preparation. Alice and Bob randomly select the coding mode with a probability of
Coding mode: If Alice chooses this mode, she continues the encoding process:
(1). Alice selects
(2). Alice generates a local random bit string
(3). Alice maps each bit of
(4). Alice sends the quantum states to Charlie.
If Bob chooses this mode, he randomly chooses to send state
Multi-intensity mode: Three different intensity and phase-randomized weak coherent states
Step 3: measurement. Charlie measures the pulses sent by Alice and Bob using single-photon interferometer, and publishes measurement results. Let
The step 2 and step 3 are repeated for several rounds until the transmission of
Step 4: mode matching. After all measurements are completed, Alice and Bob publish the modes information. They retain the measurement results of the same modes, and discard the measurement results of different modes. If they both send the multi-intensity mode, they publish the intensity and phase of the weak coherent state. Then they retain pulses with
Step 5: parameter estimation. After completing the above steps, Alice and Bob can obtain the gain
The Step 2 to Step 5 are repeated for several rounds until the transmission of X is complete.
Step 6: decoding. Bob publishes the positions of his measurements which have valid results and Alice publishes the value of the local random bit
If the SSTS pool is depleted during the transmission process, Alice and Bob will need to transmit
Appendix B. Details of Security Analysis
In this section, we analyze the security of the OPI-QSDC protocol by analyzing the equivalent entanglement-based protocol. We first introduce the equivalence transformation process of our protocol, as shown in
Figure A2. Transmitters used for security analysis of OPI-QSDC. LS: laser source; EP: entangled-photon source; BS, 50:50 beam splitter; [Forumla omitted. See PDF.], [Forumla omitted. See PDF.]: single-photon detector; [Forumla omitted. See PDF.]: different amplitude and phase-randomized coherent states of Alice (Bob); [Forumla omitted. See PDF.]: X-basis measurement. (a) OPI-QSDC protocol. (b) Equivalent view of OPI-QSDC protocol. (c) Entanglement-based OPI-QSDC protocol.
For convenience, we briefly show the process of the OPI-QSDC protocol in
To randomly transmit bits 0 and 1, Bob can prepares an entangled state
We can also consider an entanglement-based version of this protocol, namely the measurement of Alice and Bob can be delayed after Eve’s announcement of the successful event. Therefore, we obtain
Step 1: encoding. Same as OPI-QSDC protocol.
Step 2: mode preparation. Alice and Bob randomly select the coding mode with a probability of
Coding mode: Alice prepares an entangled state
Multi-intensity mode: Same as OPI-QSDC protocol.
Step 3: measurement. Charlie measures the pulses sent by Alice and Bob using single-photon-interferometer and publishes measurement results. Alice and Bob discard the no-click events and two-click events, and retain the one-click events, namely
Step 4: mode matching. Same as OPI-QSDC protocol.
Step 5: parameter estimation. Same as OPI-QSDC protocol.
Step 6: decoding. Same as OPI-QSDC protocol.
We use
Next, we analyze the eavesdropping process and calculate
Next, we analyze the process of our protocol to estimate the phase-error rate
Appendix C. Derivation Details of Parameterized OPI-QSDC Protocol
To determine the performance of OPI-QSDC protocol, we use the channel model in [
We consider the case where only detector
Then we consider the case when there is n photons in the channel
Finally, we consider the case of both Alice and Bob to send the coherent state
The X-basis QBER are caused by dark counts,
Therefore, when
Appendix D. Simulation Formulas for DL04 and MDI-QSDC Protocol
The secrecy rate of DL04 protocol with INCUM is given by [
The secrecy rate of MDI-QSDC protocol with INCUM is given by [
References
1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems & Signal Processing; Bangalore, India, 9–12 December 1984; pp. 175-179.
2. Long, G.-L.; Liu, X.-S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A; 2002; 65, 032302. [DOI: https://dx.doi.org/10.1103/PhysRevA.65.032302]
3. Deng, F.-G.; Long, G.-L. Secure direct communication with a quantum one-time pad. Phys. Rev. A; 2004; 69, 052319. [DOI: https://dx.doi.org/10.1103/PhysRevA.69.052319]
4. Wang, C.; Deng, F.-G.; Li, Y.-S.; Liu, X.-S.; Long, G.L. Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A; 2005; 71, 044305. [DOI: https://dx.doi.org/10.1103/PhysRevA.71.044305]
5. Wang, C.; Deng, F.G.; Long, G.L. Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state. Opt. Commun.; 2005; 253, pp. 15-20. [DOI: https://dx.doi.org/10.1016/j.optcom.2005.04.048]
6. Deng, F.-G.; Long, G.L. Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A; 2004; 70, 012311. [DOI: https://dx.doi.org/10.1103/PhysRevA.70.012311]
7. Zhang, Y.; Ni, Q. Design and analysis of random multiple access quantum key distribution. Quantum Eng.; 2020; 2, e31. [DOI: https://dx.doi.org/10.1002/que2.31]
8. Kish, S.P.; Villaseñor, E.; Malaney, R.; Mudge, K.A.; Grant, K.J. Feasibility assessment for practical continuous variable quantum key distribution over the satellite-to-earth channel. Quantum Eng.; 2020; 2, e50. [DOI: https://dx.doi.org/10.1002/que2.50]
9. Pan, D.; Ng, S.X.; Ruan, D.; Yin, L.; Long, G.; Hanzo, L. Simultaneous two-way classical communication and measurement-device-independent quantum key distribution with coherent states. Phys. Rev. A; 2020; 101, 012343. [DOI: https://dx.doi.org/10.1103/PhysRevA.101.012343]
10. Cui, Z.-X.; Zhong, W.; Zhou, L.; Sheng, Y.-B. Measurement-device-independent quantum key distribution with hyper-encoding. Sci. China Phys. Mech.; 2019; 62, 110311. [DOI: https://dx.doi.org/10.1007/s11433-019-1438-6]
11. Long, G.-L. Quantum secure direct communication: Current status and perspective application in network. Proceedings of the IEEE Global Communications Conference; Taiwan, China, 7–11 December 2020.
12. Long, G.-L.; Pan, D.; Sheng, Y.-B.; Xue, Q.; Lu, J.; Hanzo, L. An evolutionary pathway for the quantum internet relying on secure classical repeaters. IEEE Netw.; 2022; 36, pp. 82-88. [DOI: https://dx.doi.org/10.1109/MNET.108.2100375]
13. Pan, D.; Li, K.; Ruan, D.; Ng, S.X.; Hanzo, L. Single-photon-memory two-step quantum secure direct communication relying on einstein-podolsky-rosen pairs. IEEE Access; 2020; 8, pp. 121146-121161. [DOI: https://dx.doi.org/10.1109/ACCESS.2020.3006136]
14. Cao, Z.; Wang, L.; Liang, K.; Chai, G.; Peng, J. Continuous-variable quantum secure direct communication based on gaussian mapping. Phys. Rev. Appl.; 2021; 16, 024012. [DOI: https://dx.doi.org/10.1103/PhysRevApplied.16.024012]
15. Qi, R.-Y.; Sun, Z.; Lin, Z.-S.; Niu, P.-H.; Hao, W.-T.; Song, L.-Y.; Huang, Q.; Gao, J.-C.; Yin, L.-G.; Long, G.-L. Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl.; 2019; 8, 22. [DOI: https://dx.doi.org/10.1038/s41377-019-0132-3] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/30728960]
16. Wu, J.; Lin, Z.; Yin, L.; Long, G.-L. Security of quantum secure direct communication based on Wyner’s wiretap channel theory. Quantum Eng.; 2019; 1, e26. [DOI: https://dx.doi.org/10.1002/que2.26]
17. Wu, J.; Long, G.-L.; Hayashi, M. Quantum secure direct communication with private dense coding using a general preshared quantum state. Phys. Rev. Appl.; 2022; 17, 024012. [DOI: https://dx.doi.org/10.1103/PhysRevApplied.17.064011]
18. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J.; 1975; 54, pp. 1355-1387. [DOI: https://dx.doi.org/10.1002/j.1538-7305.1975.tb02040.x]
19. Devetak, I. The private classical capacity and quantum capacity of a quantum channel. IEEE Trans. Inform. Theory; 2005; 51, pp. 44-55. [DOI: https://dx.doi.org/10.1109/TIT.2004.839515]
20. Cai, N.; Winter, A.; Yeung, R.W. Quantum privacy and quantum wiretap channels. Probl. Inform. Transm.; 2004; 40, pp. 318-336. [DOI: https://dx.doi.org/10.1007/s11122-005-0002-x]
21. Qi, B.; Fung, C.-H.F.; Lo, H.-K.; Ma, X. Time-shift attack in practical quantum cryptosystems. arXiv; 2005; arXiv: quant-ph/0512080[DOI: https://dx.doi.org/10.26421/QIC7.1-2-3]
22. Makarov, V.; Hjelme, D.R. Faked states attack on quantum cryptosystems. J. Mod. Optic.; 2005; 52, pp. 691-705. [DOI: https://dx.doi.org/10.1080/09500340410001730986]
23. Makarov, V. Controlling passively quenched single photon detectors by bright light. New J. Phys.; 2009; 11, 045005. [DOI: https://dx.doi.org/10.1088/1367-2630/11/6/065003]
24. Niu, P.-H.; Zhou, Z.-R.; Lin, Z.-S.; Sheng, Y.-B.; Yin, L.-G.; Long, G.-L. Measurement-device-independent quantum communication without encryption. Sci. Bull.; 2018; 63, pp. 1345-1350. [DOI: https://dx.doi.org/10.1016/j.scib.2018.09.009] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/36658905]
25. Zhou, Z.; Sheng, Y.; Niu, P.; Yin, L.; Long, G.; Hanzo, L.; Zhou, Z.-R.; Sheng, Y.-B.; Niu, P.-H.; Yin, L.-G. et al. Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech.; 2020; 63, 230362. [DOI: https://dx.doi.org/10.1007/s11433-019-1450-8]
26. Long, G.-L.; Zhang, H.-R. Drastic increase of channel capacity in quantum secure direct communication using masking. Sci. Bull.; 2021; 66, pp. 1267-1269. [DOI: https://dx.doi.org/10.1016/j.scib.2021.04.016]
27. Hu, J.-Y.; Yu, B.; Jing, M.-Y.; Xiao, L.-T.; Jia, S.-T.; Qin, G.-Q.; Long, G.-L. Experimental quantum secure direct communication with single photons. Light Sci. Appl.; 2016; 5, e16144. [DOI: https://dx.doi.org/10.1038/lsa.2016.144] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/30167186]
28. Zhu, F.; Zhang, W.; Sheng, Y.; Huang, Y. Experimental long-distance quantum secure direct communication. Sci. Bull.; 2017; 62, pp. 1519-1524. [DOI: https://dx.doi.org/10.1016/j.scib.2017.10.023]
29. Pan, D.; Lin, Z.; Wu, J.; Sun, Z.; Ruan, D.; Yin, L.; Long, G. Experimental free-space quantum secure direct communication and its security analysis. Photonics Res.; 2020; 8, pp. 1522-1531. [DOI: https://dx.doi.org/10.1364/PRJ.388790]
30. Zhang, W.; Ding, D.-S.; Sheng, Y.-B.; Zhou, L.; Shi, B.-S.; Guo, G.-C. Quantum secure direct communication with quantum memory. Phys. Rev. Lett.; 2017; 118, 220501. [DOI: https://dx.doi.org/10.1103/PhysRevLett.118.220501]
31. Qi, Z.; Li, Y.; Huang, Y.; Feng, J.; Zheng, Y.; Chen, X. A 15-user quantum secure direct communication network. Light Sci. Appl.; 2021; 10, 183. [DOI: https://dx.doi.org/10.1038/s41377-021-00634-2]
32. Zhang, H.-R.; Sun, Z.; Qi, R.-Y.; Yin, L.-G.; Long, G.-L.; Lu, J.-H. Realization of quantum secure direct communication over 100 km fiber with time-bin and phase quantum states. Light Sci. Appl.; 2022; 11, 83. [DOI: https://dx.doi.org/10.1038/s41377-022-00769-w]
33. Wen, K.; Deng, F.-G.; Long, G.L. Reusable vernam cipher with quantum media. arXiv; 2007; arXiv: quant-ph/0711.1632
34. Deng, F.-G.; Long, G.L. Repeatable classical one-time-pad crypto-system with quantum mechanics. arXiv; 2019; arXiv: quant-ph/1902.04218
35. Sun, Z.; Qi, R.; Lin, Z.; Yin, L.; Long, G.; Lu, J. Design and implementation of a practical quantum secure direct communication system. Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps); Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1-6.
36. Sun, Z.; Song, L.; Huang, Q.; Yin, L.; Long, G.; Lu, J.; Hanzo, L. Toward practical quantum secure direct communication: A quantum-memory-free protocol and code design. IEEE Trans. Commun.; 2020; 68, pp. 5778-5792. [DOI: https://dx.doi.org/10.1109/TCOMM.2020.3006201]
37. Zhou, L.; Xu, B.-W.; Zhong, W.; Sheng, Y.-B. Device-independent quantum secure direct communication with single-photon sources. Phys. Rev. Appl.; 2023; 19, 014036. [DOI: https://dx.doi.org/10.1103/PhysRevApplied.19.014036]
38. Zhou, L.; Sheng, Y.-B. One-step device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron.; 2022; 65, 250311. [DOI: https://dx.doi.org/10.1007/s11433-021-1863-9]
39. Ying, J.-W.; Zhou, L.; Zhong, W.; Sheng, Y.-B. Measurement-device-independent one-step quantum secure direct communication. Chin. Phys. B; 2022; 31, 120303. [DOI: https://dx.doi.org/10.1088/1674-1056/ac8f37]
40. Li, X.-J.; Pan, D.; Long, G.-L.; Hanzo, L. Single-photon-memory measurement-device-independent quantum secure direct communication—Part II: A practical protocol and its secrecy capacity. IEEE Commun. Lett.; 2023; 27, pp. 1060-1064. [DOI: https://dx.doi.org/10.1109/LCOMM.2023.3247176]
41. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature; 2018; 557, pp. 400-403. [DOI: https://dx.doi.org/10.1038/s41586-018-0066-6] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/29720656]
42. Ma, X.; Zeng, P.; Zhou, H. Phase-matching quantum key distribution. Phy. Rev. X; 2018; 8, 031043. [DOI: https://dx.doi.org/10.1103/PhysRevX.8.031043]
43. Wang, X.-B.; Yu, Z.-W.; Hu, X.-L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A; 2018; 98, 062323. [DOI: https://dx.doi.org/10.1103/PhysRevA.98.062323]
44. Curty, M.; Azuma, K.; Lo, H.-K. Simple security proof of twin-field type quantum key distribution protocol. NPJ Quantum Inform.; 2019; 5, 64. [DOI: https://dx.doi.org/10.1038/s41534-019-0175-6]
45. Cui, C.; Yin, Z.-Q.; Wang, R.; Chen, W.; Wang, S.; Guo, G.-C.; Han, Z.-F. Twin-field quantum key distribution without phase postselection. Phys. Rev. Appl.; 2019; 11, 034053. [DOI: https://dx.doi.org/10.1103/PhysRevApplied.11.034053]
46. Liu, Y.; Zhang, W.J.; Jiang, C.; Chen, J.P.; Zhang, C.; Pan, W.X.; Ma, D.; Dong, H.; Xiong, J.M.; Zhang, C.J. et al. Experimental twin-field quantum key distribution over 1000 km fiber distance. Phys. Rev. Lett.; 2023; 130, 210801. [DOI: https://dx.doi.org/10.1103/PhysRevLett.130.210801]
47. Zeng, P.; Zhou, H.; Wu, W.; Ma, X. Mode-pairing quantum key distribution. Nat. Commun.; 2022; 13, 3903. [DOI: https://dx.doi.org/10.1038/s41467-022-31534-7]
48. Xie, Y.M.; Lu, Y.S.; Weng, C.X.; Cao, X.Y.; Jia, Z.Y.; Bao, Y.; Wang, Y.; Fu, Y.; Yin, H.L.; Chen, Z.B. Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference. PRX Quantum; 2022; 3, 020315. [DOI: https://dx.doi.org/10.1103/PRXQuantum.3.020315]
49. Zhou, L.; Lin, J.; Xie, Y.M.; Lu, Y.S.; Jing, Y.; Yin, H.L.; Yuan, Z. Experimental quantum communication overcomes the rate-loss limit without global phase tracking. Phys. Rev. Lett.; 2023; 130, 250801. [DOI: https://dx.doi.org/10.1103/PhysRevLett.130.250801]
50. Pirandola, S.; Laurenza, R.; Ottaviani, C.; Banchi, L. Fundamental limits of repeaterless quantum communications. Nat. Commun.; 2017; 8, 15043. [DOI: https://dx.doi.org/10.1038/ncomms15043]
51. Bäuml, S.; Das, S.; Wilde, M.M. Fundamental limits on the capacities of bipartite quantum interactions. Phy. Rev. Lett.; 2018; 121, 250504. [DOI: https://dx.doi.org/10.1103/PhysRevLett.121.250504]
52. Das, S.; Bäuml, S.; Winczewski, M.; Horodecki, K. Universal limitations on quantum key distribution over a network. Phy. Rev. X; 2021; 11, 041016. [DOI: https://dx.doi.org/10.1103/PhysRevX.11.041016]
53. Wang, S.; Yin, Z.Q.; He, D.Y.; Chen, W.; Wang, R.Q.; Ye, P.; Zhou, Y.; Fan-Yuan, G.J.; Wang, F.X.; Chen, W. et al. Twin-field quantum key distribution over 830-km fibre. Nat. Photonics; 2022; 16, pp. 154-161. [DOI: https://dx.doi.org/10.1038/s41566-021-00928-2]
54. Thangaraj, A.; Dihidar, S.; Calderbank, A.R.; McLaughlin, S.W.; Merolla, J.-M. Applications of ldpc codes to the wiretap channel. IEEE Trans. Inform. Theory; 2007; 53, pp. 2933-2945. [DOI: https://dx.doi.org/10.1109/TIT.2007.901143]
55. Tyagi, H.; Vardy, A. Universal hashing for information-theoretic security. Proc. IEEE; 2015; 103, pp. 1781-1795. [DOI: https://dx.doi.org/10.1109/JPROC.2015.2462774]
56. Renner, R. Symmetry of large physical systems implies independence of subsystems. Nat. Phys.; 2007; 3, pp. 645-649. [DOI: https://dx.doi.org/10.1038/nphys684]
57. Li, X.-j.; Pan, D.; Long, G.-L.; Hanzo, L. Single-photon-memory measurement-device-independent quantum secure direct communication. arXiv; 2022; arXiv: quant-ph/2212.05661
58. Niu, P. Research on Measurement-Device-Independent Quantum Secure Direct Communication. Ph.D. Dissertation; Tsinghua University: Beijing, China, 2020.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Quantum secure direct communication (QSDC) is a quantum communication paradigm that transmits confidential messages directly using quantum states. Measurement-device-independent (MDI) QSDC protocols can eliminate the security loopholes associated with measurement devices. To enhance the practicality and performance of MDI-QSDC protocols, we propose a one-photon-interference MDI QSDC (OPI-QSDC) protocol which transcends the need for quantum memory, ideal single-photon sources, or entangled light sources. The security of our OPI-QSDC protocol has also been analyzed using quantum wiretap channel theory. Furthermore, our protocol could double the distance of usual prepare-and-measure protocols, since quantum states sending from adjacent nodes are connected with single-photon interference, which demonstrates its potential to extend the communication distance for point-to-point QSDC.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details



1 State Key Laboratory of Low-Dimensional Quantum Physics and Department of Physics, Tsinghua University, Beijing 100084, China;
2 Beijing Academy of Quantum Information Sciences, Beijing 100193, China;
3 State Key Laboratory of Low-Dimensional Quantum Physics and Department of Physics, Tsinghua University, Beijing 100084, China;