Article

Seventh International Conference

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... If the error rate is too high, they abort this QKD protocol. Otherwise, they perform information reconciliation and privacy amplification [36, 37, 38, 39, 40, 41, 42] on the remaining bits to obtain secure final key bits for Alice informing Charlie of the encoding scheme Eq.(5). Using the same method, Bob and Charlie get secret key for Bob sending the encoding scheme Eq.(6) to Charlie. ...
Article
We present a deterministic secure direct communication scheme via entanglement swapping, where a set of ordered maximally entangled three-particle states (GHZ states), initially shared by three spatially separated parties, Alice, Bob and Charlie, functions as a quantum information channel. After ensuring the safety of the quantum channel, Alice and Bob apply a series of local operations on their respective particles according to the tripartite stipulation and the secret message they both want to send to Charlie. By three of Alice, Bob and Charlie's Bell measurement results, Charlie is able to infer the secret messages directly. The secret messages are faithfully transmitted from Alice and Bob to Charlie via initially shared pairs of GHZ states without revealing any information to a potential eavesdropper. Since there is no transmission of the qubits carrying the secret message between any two of them in the public channel, it is completely secure for direct secret communication if a perfect quantum channel is used.
ResearchGate has not been able to resolve any references for this publication.