Quantum secure direct communication with hybrid entanglement

Peng Zhao , Wei Zhong , Ming-Ming Du , Xi-Yun Li , Lan Zhou , Yu-Bo Sheng

Front. Phys. ›› 2024, Vol. 19 ›› Issue (5) : 51201

PDF (5408KB)
Front. Phys. ›› 2024, Vol. 19 ›› Issue (5) : 51201 DOI: 10.1007/s11467-024-1396-5
RESEARCH ARTICLE

Quantum secure direct communication with hybrid entanglement

Author information +
History +
PDF (5408KB)

Abstract

Quantum secure direct communication (QSDC) can transmit secret messages without keys, making it an important branch of quantum communication. We present a hybrid entanglement-based quantum secure direct communication (HE-QSDC) protocol with simple linear optical elements, combining the benefits of both continuous variables (CV) and discrete variables (DV) encoding. We analyze the security and find that the QSDC protocol has a positive security capacity when the bit error rate is less than 0.073. Compared with previous DV QSDC protocols, our protocol has higher communication efficiency due to performing nearly deterministic Bell-state measurement. On the other hand, compared with CV QSDC protocol, this protocol has higher fidelity with large α. Based on these advantages, our protocol may provide an alternative approach to realize secure communication.

Graphical abstract

Keywords

quantum secure direct communication / hybrid entanglement, Bell-state measurement

Cite this article

Download citation ▾
Peng Zhao, Wei Zhong, Ming-Ming Du, Xi-Yun Li, Lan Zhou, Yu-Bo Sheng. Quantum secure direct communication with hybrid entanglement. Front. Phys., 2024, 19(5): 51201 DOI:10.1007/s11467-024-1396-5

登录浏览全文

4963

注册一个新账户 忘记密码

1 Introduction

Quantum communication refers to the realization of information transmission based on the basic principles of quantum mechanics, which has been widely concerned because of its theoretical unconditional security [1, 2]. Quantum key distribution (QKD) provides an unconditionally secure means of distributing secret keys between two spatially separated parties [36]. Quantum secret sharing (QSS) [7, 8] uses quantum channels to share random keys among multiple parties. Both QKD and QSS do not transmit the message directly. Besides QKD and QSS, there is another important quantum communication branch, named quantum secure direct communication (QSDC) [911]. Different from QKD and QSS, QSDC enables secret information to be transmitted directly through a quantum channel without neither key nor ciphertext. Long and Liu [9] introduced the first QSDC protocol. In 2003, the two-step QSDC protocol was proposed [10]. In this protocol, they transmit the Einstein−Podolsky−Rosen (EPR) pairs in two steps with security checking applied in each step to avoid the leakage of information. Recently, QSDC was developed in both theory and experiments. For example, in theory, the measurement-device-independent (MDI) QSDC [12, 13], device-independent (DI) QSDC [1416], one-step QSDC protocols [1719], and some other important QSDC protocols were proposed [2030]. In experiment, in 2016, the first QSDC experiment using single photon was realized [31]. In 2017, with the help of quantum memory (QM), the first entanglement-based QSDC protocol was realized [32]. In the same year, the QSDC experiment using 500 m optical fiber was realized [33]. The QSDC experiment in free-space was reported in 2020 [34]. In 2021, the first QSDC network was realized [35]. In 2022, fiber-based QSDC without active polarization compensation was reported [36]. The distance of QSDC reached 100 km in 2022 [37]. Recently, an interesting QSDC experiment using squeezed state was realized [38].

In quantum communication, photons are frequently used to transmit information due to its rapidity of transmission. Two different ways of encoding, i.e., discrete variable (DV) and continuous variable (CV) are used. In DV regime, for a single photon, the polarization degree of freedom (DOF) is usually used to encode the information for its simple manipulation [3941]. In the CV regime, the carrier of information is the regular component of the light field states (position and momentum in phase space) rather than the DOFs (such as polarization and phase) of the photon. A great number of important works on both DV encoding [4244] and CV encoding [4548] have been reported and they have made considerable progress in recent decades. In QSDC, the QSDC protocols using DV encoding [915, 1720, 24] and CV encoding [2527] are also proposed independently.

However, both DV and CV have their own advantages and disadvantages [49, 50]. For example, in DV encoding, it is difficulty to implement a deterministic two-bit controlled gate operation [51, 52]. Moreover, the Bell-state measurement (BSM) is an indispensable tool in quantum communication and the success probability of BSM is only 50% [53, 54]. On the other hand, the characteristics and advantages of CV entanglement, such as coherent state entanglement [55], lies in its ability to achieve near-deterministic BSM, high-efficiency detections, and unconditional operations [56]. The coherent-state Bell state measurements have been employed in both twin-field QKD (TF-QKD) [57] and device-independent QKD (DI-QKD) [58], which not only enhances the secure transmission distance but also ensures the security of the measurement device independence and device independence. However, achieving high efficiencies and unconditional operations often come at the cost of lower fidelity and this approach generally introduces losses [59].

A novel type of hybrid entanglement coding that combines the advantages of CV and DV has been proposed and realized [6062]. Especially the hybrid entanglement based on coherent-state and polarized photons received the attention of researchers [6365]. Many interesting protocols using hybrid systems have been proposed, such as hybrid quantum repeater [66, 67], hybrid entanglement QKD [6872], hybrid entanglement purification [73], and some other interesting protocols [74, 75].

In this paper, we present the first hybrid entanglement-based QSDC (HE-QSDC) protocol. The hybrid qubit can be described as |0L =|+|α,|1L =||α , where |±=12(|H±|V) and the subscript L represents the logical qubit. Here, | H and |V denote the horizontal and vertical polarization modes of photons, respectively. |α is the coherent state. Compared to existing DV QSDC protocols, our protocol has a higher communication efficiency due to the use of near-deterministic BSM. Additionally, for QSDC protocols that rely on CV entanglement, we have shown that our protocol has a higher fidelity when satisfying the large α required for near-deterministic BSM.

The structure of this paper is organized as follows. In Section 2, we first describe the hybrid qubits and the key element of this protocol, i.e., near-deterministic BSM. In Section 3, we propose the HE-QSDC protocol subsequently. In Section 4, we analyze the security of our HE-QSDC protocol. In Section 5, we analyze the fidelities of hybrid entanglement and CV entanglement in a lossy environment. In Section 6, we perform a discussion and conclusion.

2 Hybrid Bell states measurement

In this section, we briefly introduce the hybrid Bell states measurement (HBSM). The hybrid Bell states can be written as follows:

|Φ±=12(|0L0L ±|1L1L ), |Ψ±=12(| 0L 1L±| 1L 0L) .

In Ref. [51], a method was proposed and implemented to convert between the four hybrid Bell states using the Pauli X and Z operations. This demonstrates that it is possible to transform one Bell states into another using these operations. Before introducing the BSM, it is helpful to briefly review the two existing types of BSMs: the coherent-state BSM and polarized-state BSM. The four entangled coherent Bell states, represented as | ϕ± C=1C±(|α|α±|α |α) and |ψ± C= 1C±(|α|α±|α |α), can be distinguished using a coherent-state BSM, which involves a 50:50 beam splitter (BS) and two photon number parity detectors (PNPDs) [76]. Here, 1C±=1 2±2 e4|α|2 represent the normalization constants. The setup is shown in Fig.1 (M1) [51], with the subscript C denoting the coherent state. After passing through the BS, the four coherent Bell states can be transformed into the states as

|ϕ+ C= 1C+( |α |α+|α|α)B S |ev en | 0,| ϕ C=1 C(|α|α|α|α)B S |od d|0,| ψ+C=1C+( | α | α+ |α|α)BS|0|even , | ψ C=1 C(|α|α | α|α)B S |0|odd.

Here, |even=1 C+(| 2α+ | 2α) with the normalization constant of 1C+ and | odd=1 C(| 2α|2α ) with the normalization constant of 1C contain only even and odd photon number states, respectively. Therefore, the four coherent Bell states can be discriminated by parity measurements of the photons at the output. However, there is a possibility of failure when no photon is detected at both the PNPDs. This may imply that the coherent Bell state is |ϕ+ C or |ψ+ C with an even output of zero.

Fig.1 (M2) shows a feasible approach for implementing a polarized-state BSM, using single photon detectors (SPDs), polarization beam splitters (PBSs), and half wave plates (HWPs). The subscript P indicates the polarized-state. In this protocol, two Bell states | ψ± P=12( |H|V±|V|H) can be identified only when one detector from the upper two and another detector from the lower two register a photon at the same time, with a success probability of 1/2.

The hybrid Bell states, as shown in Eq. (1), can be discriminated near-deterministically by combining linear optics with M1 and M2 [51]. Therefore, we can extend Eq. (1) and express the hybrid Bell states in terms of the standard form as follows:

| Φ ±=12( |0L0L ±|1L1L )= 12(|ϕ+ P| ϕ± C+|ψ+ P|ϕ C), | Ψ±=1 2( | 0L 1L±| 1L 0L)=1 2( | ϕ P|ψ± C | ψ P|ψ C).

Here, | ϕ± P=12( |H|H±|V|V).

Equation (3) shows that each hybrid Bell state can be decomposed into a combination of polarized Bell states and coherent Bell states. As a result, we can determine the BSM outcome of the hybrid entangled states by conducting two independent BSMs: one on the polarization state and the other on the coherent state. Tab.1 provides a detailed breakdown of these two BSM outcomes, allowing us to extract the complete information about the hybrid entangled state.

Based on Tab.1, the discrimination process is highly likely to succeed unless both M1 and M2 fail to perform the BSM simultaneously. The failure probability Fp in this scenario is calculated to be 12e2α2. Hence, it is possible to unambiguously distinguish the four coherent Bell states with a success probability of 112e2α 2. Notably, the success rate increases with the value of parameter α. For instance, a success rate of 99% can be achieved by setting α to 1.4 [51].

3 Hybrid entanglement quantum secure direct communication

As pointed out in Ref. [9], the security of a two-step QSDC protocol relies on the transmission of entangled photons in blocks and the verification of their security at each step. Our proposed HE-QSDC protocol, which utilizes near-deterministic BSM, follows a similar approach to ensure its security. Fig.2 illustrates a schematic diagram of the proposed HE-QSDC protocol, while the specific steps of the protocol are outlined as follows.

Step (1): Prepare sequence. Alice prepares N hybrid entangled photon pairs as |ΦA+=12(|0L C |0L M+| 1L C|1L M). Here, the subscripts C and M mean the qubit in check sequence or message sequence.

Step (2): Transmit sequence. Alice sends a string of qubits, denoted as S C, to Bob. Here we should point out that such transmit requires two different channels, the one is for the single photon and the other is for the coherent state. Bob selects a suitable number of photons both from two channels from SC and performs measurements on them using one of two measurement bases randomly: the rectilinear basis Z comprised of states Z:{| 0L,| 1L}, or the diagonal basis X composed of states X:{12(|0 L+|1 L) ,12( |0 L|1L)}. These two basis have already been defined and used in quantum teleportation in Ref. [51]. After performing the measurements, Bob uses the classical channel to inform Alice which photons he has measured from SC, along with the corresponding information about which measurement bases were used and the results of the measurements.

Step (3): Check security. After receiving Bob’s information about the measurements from Step (2), Alice selects the corresponding photons in the message sequence and measures them using the same measurement basis as Bob. She then compares her measurement results with those reported by Bob, performing an error rate analysis to check for security breaches. If the error rate is below the preset security threshold, it can be assumed that there is no eavesdropper monitoring the quantum channel. Otherwise, the communication is terminated and both parties return to Step (1). In our hybrid encoding protocol, we use logical bit bases instead of physical bit bases for security check, which differs from the previous QSDC protocols. In a noiseless channel, Alice and Bob should obtain identical measurement results in the absence of eavesdropping. Specifically, the entangled state |Φ+ should be uniform under both the Z-basis and X-basis. Therefore, if both parties randomly select the same measurement basis, they will obtain the same measurement result. Any eavesdropping attempt will inevitably impact the entanglement between SC and SM, leading to different measurement results and increased error rates. The transmission of the SC is mainly to detect the transmission security of the entangled system without encoding confidential information.

Step (4): Encode message. Under the condition of ensuring the security transmission of SC, Alice selects one of the four unitary operations (U0= I, U1=σz, U2= σx, U3= σy) correspondingly to encode information on each quantum state in the sequence SM (the remaining photons after discarding the photons used for the first round of security detection in the SM). Here, I, σz, σx and σy are four Pauli operators [see Eq. (4)]. The four unitary operations U0, U1, U2, and U3 can represent the information 00, 01, 10, and 11, respectively. Here

U0=I=| 0L0L|+|1L1L|,U1=σz= | 0L0L||1 L 1 L|,U2=σx= | 1L0L|+|0L1L|,U3=σy= | 1L0L||0 L 1 L|.

The required unitary transformations can be accomplished by utilizing a combination of Pauli X operations and Pauli Z operations. Specifically, we can implement | +| by using a polarizing rotator on a single photon mode, and |α|α by using a π phase shifter on a coherent state mode. An arbitrary Z-rotation can be implemented by applying a phase shift operation on a single photon mode ( {+,|} {+,eiθ|}), without the need for any operation on a coherent state mode. Here θ is the rotation angle [51]. Alice also needs to select some photons and randomly perform one of the four unitary operations to secure the second transmission.

Step (5): Check security. After Step (4), Alice sends SM to Bob. In order to check the transmission security of SM , Alice will tell Bob which hybrid entanglement pairs she has performed security check coding and the corresponding operations she did. Bob judges whether the second round of transmission is secure by estimating the error rate of the channel. In fact, the eavesdropper can only interfere with the transmission but cannot steal information in the second round of transmission, because he can obtain only one logic qubit from the hybrid entanglement.

Step (6): Decode message. Bob decodes the message by using the HBSM on the remaining hybrid entanglement (see Fig.1) and reads out the message directly with Eq. (4) and Tab.1. For example, the result of HBSM is |Ψ+, the secret information is 01.

4 Security analysis of hybrid entanglement QSDC

Inspired by Refs. [77, 78], we will conduct a security analysis and calculate the security capacity of our HE-QSDC protocol in this section. To facilitate subsequent explanations, we will introduce and define some key terms,

|Φ1=| Φ+=12(|0L0L +|1 L 1L) , | Φ2=| Φ = 12(|0L0L |1L1L ), |Φ3 =|Ψ+=12( |0L1L +|1 L 0L) , | Φ4=| Ψ = 12(|0L1L |1L0L ).

When Eve can obtain as much information as possible, we consider a pure state system | ΨABE of ρAB as

| Ψ ABE=i=14λi|Φi| Ei=λ1|Φ1|E1+λ 2|Φ2 |E2+ λ3 | Φ3 | E3+λ4|Φ4|E4.

Here, | Φi mean the Bell states of Alice and Bob and | Ei represent the states of Eve’s auxiliary system which are mutually orthogonal. Here

ρAB=λ1| Φ 1Φ1|+λ 2|Φ2Φ 2|+λ3| Φ 3Φ3|+λ 4|Φ4Φ 4|,

where ρ AB represents Alice and Bob both perform the same transformation chosen randomly from U0, U1,U 2,U3. These operations will eliminate the nondiagonal elements of ρAB in Bell basis. λi are the probability of |Φi. The bit and phase error rate can be expressed as ϵx= λ3+λ4 and ϵz=λ2+λ4, respectively. In this way,

ρABE= | ΨABEΨ ABE |=λ 1|Φ1|E1 E1|Φ1 |+ λ1λ 2|Φ1|E1 E2|Φ2 |+λ 1λ3|Φ1| E1E3|Φ3|+λ1λ4|Φ1| E1E4|Φ4| +λ2λ1 | Φ2 | E2E1|Φ1|+λ2|Φ2| E2E2|Φ2| +λ2λ3 | Φ2 | E2E3|Φ3|+λ2λ4|Φ2| E2E4|Φ4| +λ3λ1 | Φ3 | E3E1|Φ1|+λ3λ2|Φ3| E3E2|Φ2| +λ3 | Φ3 | E3E3|Φ3|+λ3λ4|Φ3| E3E4|Φ4| +λ4λ1 | Φ4 | E4E1|Φ1|+λ4λ2|Φ4| E4E2|Φ2| +λ4λ3 | Φ4 | E4E3|Φ3|+λ4|Φ4| E4E4|Φ4|.

In order to get the maximal information, Eve intercepts all the photons and measures them in Step (5). So we trace out B from ABE, we can get

Tr B( ρABE)= 0B|ρ |0B+1B|ρ|1 B=12(λ 1|0|E1E1 | 0|+λ1 λ2|0| E1E2|0| +λ 1λ3|0|E1 E3|1|λ1λ4 | 0| E1E4|1| +λ 2λ1|0|E2 E1|0|+λ2|0| E2E2|0| +λ 2λ3|0|E2 E3|1|λ2λ4 | 0| E2E4|1| +λ 3λ1|1|E3 E1|0|+λ3 λ2|1| E3E2|0| +λ3|1|E3 E3|1|λ3λ4 | 1| E3E4|1| λ 4λ1|1|E4 E1|0|λ4λ2 | 1| E4E2|0| λ 4λ3|1|E4 E3|1|+λ4|1| E4E4|1|)+ 12(λ1|1| E1E1|1| λ1λ 2|1|E1E2 | 1|+ λ1 λ3|1| E1E3|0|+λ1λ 4|1 | E1 E4|0| λ2 λ1|1| E2E1|1|+λ 2|1|E2E2 | 1| λ2 λ3|1| E2E3|0| λ2λ 4|1|E2E4 | 0|+ λ3 λ1|0| E3E1|1| λ3λ 2|0|E3E2 | 1|+ λ3|0| E3E3|0|+λ3λ 4|0|E3E4 | 0|+ λ4 λ1|0| E4E1|1| λ4λ 2|0|E4E2 | 1|+ λ4 λ3|0| E4E3|0|+λ 4|0|E4E4 | 0|)= 1 2(ρ| ψ1+ρ| ϕ1).

Here, ρ| ψ1 and ρ|ϕ1 are the density matrix of |ψ1 and | ϕ1, respectively. Note that both |0 and |1 represent hybrid qubits |0L and | 1L respectively, which we have defined above. For simplicity, we omit the subscript L here. |ψ1 and | ϕ1 are defined as follows:

| ψ1=|0( λ1| E1+λ2|E2)+ |1( λ3| E3 λ4|E4) ,| ϕ1=|0( λ3| E3+λ4|E4)+ |1( λ1| E1 λ2|E2) .

Notice that in Step (4), Alice has applied four unitary operations U0, U1, U2, and U3 to encode message, which represent the information 00, 01, 10 and 11 respectively. So the four encoding states are defined as

ρAE,00=U0ρAE U0=12(ρ |ψ1+ρ|ϕ1), ρAE,01=U1ρAEU1=12(ρσz| ψ1+ρσ z| ϕ1), ρAE,10=U2ρAE U2=12(ρ σx| ψ1+ρσ x| ϕ1), ρAE,11=U3ρAE U3=12(ρ σxσz|ψ1+ ρσxσ z|ϕ1).

By exploiting Holevo bound in Refs. [77, 79], we can obtain

I(A: E)S( a paρAE,a) 1,

where ρAE,a and pa represent the encoded states and its probability distributions, respectively. Now our main task is to figure out S(apaρ AE,a), which is undoubtedly complicated work. Encouragingly, Jozsa and Schlienz [80] came up with one Gram matrix method for calculating the Von Neumann entropy of apaρ AE,a. From Eq. (11), we can get

| ξ1=I|ψ1=12[ |0( λ1| E1+λ2|E2) +|1( λ3| E3λ 4|E4)],|ξ2= σ z| ψ1=1 2[ | 0(λ1|E1+ λ2 | E2) |1(λ3|E3 λ4 | E4)], | ξ3=σx| ψ1=1 2[ | 1(λ1|E1+ λ2 | E2) +|0(λ3|E3 λ4 | E4)], | ξ4=σxσz|ψ1=12[|1( λ1| E1+λ2|E2) |0( λ3| E3λ 4|E4)],|ξ5= I| ϕ1=1 2[ | 0(λ3|E3+ λ4 | E4) +|1(λ1|E1 λ2 | E2)],

| ξ6=σz| ϕ1=1 2[ | 0(λ3|E3+ λ4 | E4) |1(λ1|E1 λ2 | E2)], | ξ7=σx| ϕ1=1 2[ | 1(λ3|E3+ λ4 | E4) +|0(λ1|E1 λ2 | E2)], | ξ8=σxσz|ϕ1=12[|1( λ3| E3+λ4|E4) |0( λ1| E1λ 2|E2)].

The Gram matrix is defined as follows:

Gi j=pipjξi|ξj,

where Gij represent the elements in row i and column j of the Gram matrix. pi and pj are the probability distribution of four encoding states. Hence we get

G= 18(ABBTC).

Here,

A=( 1a 00 a100 001a00a 1),B=( 00bc00debc00de00),

C=( 1a00a 1000 01 a0 0a1),

with

a=λ1+λ2λ3λ4, b=λ1λ2+λ3λ4, c=λ 1+λ2+λ3λ 4=d ,d =λ1λ2 λ3 +λ4,e =λ1+λ2λ 3+λ4=b.

The eigenvalues of our gram matrix are

1 8( 1+( a+b+d )1+(a +b+d)1 +(a bd)1+ (abd)1 (ab+d)1(ab +d)1(a+b d)1(a+b d)).

After simplification, eight eigenvalues can be obtained as 12λ1, 12λ1, 12λ 2, 12λ2, 12λ3, 12λ 3, 12λ4, 12λ4, respectively. Hence we can obtain

S( apaρAE,a)=S(G)=h( 12λ 1,12λ1 ,12 λ2, 12λ 2,12λ3 ,12 λ3, 12λ 4,12λ4 ,12 λ4) =1+h(λ 3+λ4)+(λ1+λ2)h(λ1 λ1+λ2) +(λ3+λ4)h(λ3 λ3+λ4)1+h(ϵx)+h(ϵz).

When d=ab, the Von Neumann entropy reaches its maximum value 1+h(ϵx)+h(ϵz). Therefore, from Wyner’s wiretap channel theory [81], we can get

CsI(A:B)I(A:E)=2h (e)h(ϵz)h(ϵx ).

When we consider the channel loss, we eventually get

CsQB[2 h(e)] Q E[h( ϵz)+h(ϵx)].

Here, e is the error rate of the main channel between Alice and Bob. h(e) is the Shannon entropy. QB and QE are reception rates of Bob and Eve, respectively. Usually, QE=1.

We present a comparison of the security capacities estimated using Holevo bound and entanglement distillation in Fig.3 [77]. Entanglement distillation is a powerful tool for security analysis that was introduced by Deutsch et al. [82], Lo and Chau [83], Shor and Preskill [84]. As for ideal QKD protocol based on entanglement distillation (ED-QKD), the rate is 1 h(ϵ x) h(ϵ z), which has been proved in Ref. [83]. To make a reasonable comparison, we uniformly model the quantum channel as a depolarizing channel ρpId+ (1p)ρ. Here, ρ, p, I and d refer to density matrix, probability, identity matrix and dimensions of quantum states, respectively. In other words, for a d-dimensional quantum system, the depolarizing channel replaces the quantum system with a completely mixed state Id with probability p and retains the original state with probability 1 p. Therefore, the error rates of rectilinear basis Z and the diagonal basis X in security check are p2, and the depolarizing probability is 2pp 2 after the Bell states pass the depolarizing channel. As the result, the tolerable bit error rate of our protocol is also lower than that of ED-QSDC [77]. From Fig.3, we can see that our HE-QSDC can encode 1.6 bits of information, resulting in a higher security capacity than ED-QKD at low bit error rates. The error rate threshold of ED-QSDC and ED-QKD is approximately 0.11, while our HE-QSDC is 0.073. This is because our main channel capacity continues to decrease as the bit error rate increases.

5 Fidelities of hybrid entanglement and continuous variables entanglement in lossy environments

In this section, we aim to analyze the fidelities of hybrid entanglement and CV entanglement in a lossy environment. We will now calculate the fidelity of the two methods with an open system. In the case of photon loss, the time evolution of the density matrix of a system can be described using the Born−Markov master equation [8587]:

ρ τ= J^ρ+ L^ρ.

Here, τ represents interaction time. J^ρ=γ ia iρai, L^ρ=γ2 iai ai ρ+a i aiρ, where γ, ai, and ai represent decay constant, creation operator and annihilation operator for mode i, respectively. The general solution of Eq. (21) can be described by ρ(τ )=exp[( J^+L^)τ]ρ(0 ) [88]. Here, ρ(0) is the initial density operator. In this way, the hybrid entanglement | Φ+=12(|0L | 0L+| 1L |1L ) which we used can be expressed as Eq. (22) at time τ [87].

ρ 1(τ )=12{[(t2|+ +|+r2|0 0|) | tαt α|] 2+[(t2||+r2|0 0|) | tα tα| ]2 +(t2 e 2|α|2r2|+ ||tα tα|) 2+(t2e2|α | 2r2|+ | |t αtα | ) 2}.

Here, t=eγτ/2, r= 1 e γτ. The normalization time r is expressed using interaction time τ and decoherence rate γ. Afterwards, we calculate the fidelity of our hybrid entanglement with F1=Φ+|ρ1(τ)|Φ+ (see the Appendix for more details) and get

F1=14[2 t4e2(1 t)2|α|2+2 t4e|α|2(4 r2+2(1t)2) ].

If we use only CV entanglement in the form of Eq. (24), we can also calculate the fidelity in a similar manner. Specifically, we can evaluate the fidelity between the original state and the output state by considering the effects of photon loss or other noise on the entangled state

| Φ+ C=1N+( | α | α | α | α+|α|α |α|α).

Here, the term 1N+ represents the normalized coefficient, where N+=2+2e8α2. The reason for using |Φ+ C in Eq. (24) instead of | ϕ+ C in Eq. (2) is to correspond with hybrid entanglement | Φ+=12(|0L | 0L+| 1L |1L ). Similarly, we can describe the density matrix of entangled coherent state in Eq. (24) at time τ as follows:

ρ 2(τ )=1 N+ 2{(|tαt α|) 4+(|tα tα| )4 +e8|α|2r2[( | tα tα|) 4+(|tα tα|) 4]}.

Likewise, we calculate the fidelity of entangled coherent state with F2=CΦ+|ρ2(τ)|Φ+ C (see the Appendix for more details) and obtain

F 2=[ e4(1t ) 2|α|2+e4(1+ t)2|α|2](2e8r2|α|2+2)+ 4e2(1 t)2|α|22(1+t ) 2|α|2( e8r2|α | 2+1).

Through numerical simulation, it can be observed that when α is small, such as α =1, the fidelity of direct transmission using entangled coherent states is better compared to that of hybrid entanglement in Fig.4. However, as α increases, the fidelity of hybrid entanglement gradually surpasses that of entangled coherent states. It is important to note that this difference does not increase with the increase of α. In fact, as α continues to increase, the two curves are approaching each other. This case occurs because as the α increases, the loss also increases, resulting in a rapid decrease in fidelity for both methods in a short period of time.

6 Discussion and conclusion

So far, we outlined the key steps of our protocol and discussed its security. In a practical quantum communication system, both single qubit and coherent state are inevitably affected by noise during the transmission. If a bit-flip error occurs, the initial state |Φ A+ may become a mixed state of the form

ρ=F |Φ A+Φ A+|+(1F)|ΨA+ ΨA+|.

Here, F and 1F represent the probability of | ΦA+ and | ΨA+, respectively. On the other hand, in coherent-state transmission, photon loss is a major issue that affects the transmission. Due to the photon loss, a single photon will be successfully transmitted with the transmission efficiency of η, or dissipated into an environment mode with the probability of 1−η [89, 90]. When we trace over the environment mode, we can see that the photon-loss errors are equivalent to the bit-flip errors in the other basis [91]. Fortunately, entanglement purification of bit-flip errors has been extensively studied for decades [65, 92, 93], and especially the purification of such hybrid entanglement was detailed in Ref. [65]. Moreover, as described in Ref. [73], the photon losses in coherent-state transmission can be incorporated into the mixed state framework with bit-flip error and we can use the same method to purify the photon-loss errors as we do for bit-flip errors.

In QSDC protocols, QM plays an important role [94]. Alice encodes the information after they perform the security check. Therefore, those photons that are not used in security check should be stored in the QM. QM was also exploited to demonstrate QSDC protocol in experiment [32]. In this protocol, we assume that the memory is perfect. Actually, the efficiency and fidelity of QM will also influence the quality of QSDC. Usually, the imperfect part in QM can be regarded as the noise in quantum channel. For example, if the photon is not storied in the QM successfully, it equals to be lost in the quantum channel. In experiment, based on balanced two-channel electromagnetically induced transparency in laser-cooled rubidium atoms, quantum memory for single-photon polarization qubits with an efficiency of > 85% and a fidelity of > 99% was reported [95]. The fidelity of the qubit in QM can also reach more than 99% with a storage bandwidth of 10 MHz [96]. The coherent storage of light in an atomic frequency comb memory over 1 hour [97]. However, high quality QM for quantum repeater is still a big challenge in existing technology.

In conclusion, we presented the first HE-QSDC protocol. We also perform the security analysis, based on the wiretap channel theory and the Gram matrix method, demonstrates the unconditional security of our HE-QSDC protocol. This protocol has two advantages. First, it employs near-deterministic BSM composed of coherent state and polarized mode in linear optics, which makes the protocol has a higher communication efficiency. Second, when compared to the protocol only using CV entanglement, we have shown that our protocol has higher fidelity when satisfying the large α required for near-deterministic BSM. These advantages make our HE-QSDC protocol become an alternative approach to realize secure communication.

References

[1]

V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, M. Peev. The security of practical quantum key distribution. Rev. Mod. Phys., 2009, 81(3): 1301

[2]

F. H. Xu, X. F. Ma, Q. Zhang, H. K. Lo, J. W. Pan. Secure quantum key distribution with realistic devices. Rev. Mod. Phys., 2020, 92(2): 025002

[3]

A. K. Ekert. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett., 1991, 67(6): 661

[4]

X. F. Ma, B. Qi, Y. Zhao, H. K. Lo. Practical decoy state for quantum key distribution. Phys. Rev. A, 2005, 72(1): 012326

[5]

X. Ma, C. H. F. Fung, H. K. Lo. Quantum key distribution with entangled photon sources. Phys. Rev. A, 2007, 76(1): 012307

[6]

X. L. Su. Applying Gaussian quantum discord to quantum key distribution. Chin. Sci. Bull., 2014, 59(11): 1083

[7]

M. Hillery, V. Bužek, A. Berthiaume. Quantum secret sharing. Phys. Rev. A, 1999, 59(3): 1829

[8]

A. Shen, X. Y. Cao, Y. Wang, Y. Fu, J. Gu, W. B. Liu, C. X. Weng, H. L. Yin, Z. B. Chen. Experimental quantum secret sharing based on phase encoding of coherent states. Sci. China Phys. Mech. Astron., 2023, 66(6): 260311

[9]

G. L. Long, X. S. Liu. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A, 2002, 65(3): 032302

[10]

F. G. Deng, G. L. Long, X. S. Liu. Two-step quantum direct communication protocol using the Einstein‒Podolsky‒Rosen pair block. Phys. Rev. A, 2003, 68(4): 042317

[11]

F. G. Deng, G. L. Long. Secure direct communication with a quantum one-time pad. Phys. Rev. A, 2004, 69(5): 052319

[12]

P. H. Niu, Z. R. Zhou, Z. S. Lin, Y. B. Sheng, L. G. Yin, G. L. Long. Measurement-device-independent quantum communication without encryption. Sci. Bull. (Beijing), 2018, 63(20): 1345

[13]

Z. R. Zhou, Y. B. Sheng, P. H. Niu, L. G. Yin, G. L. Long, L. Hanzo. Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron., 2020, 63(3): 230362

[14]

L. Zhou, Y. B. Sheng, G. L. Long. Device-independent quantum secure direct communication against collective attacks. Sci. Bull. (Beijing), 2020, 65(1): 12

[15]

L. Zhou, B. W. Xu, W. Zhong, Y. B. Sheng. Device-independent quantum secure direct communication with single-photon sources. Phys. Rev. Appl., 2023, 19(1): 014036

[16]

H.ZengM. M. DuW.ZhongL.ZhouY.B. Sheng, High-capacity device-independent quantum secure direct communication based on hyper-encoding, Fundament. Res., doi: 10.1016/j.fmre.2023.11.006 (2023)

[17]

Y. B. Sheng, L. Zhou, G. L. Long. One-step quantum secure direct communication. Sci. Bull. (Beijing), 2022, 67(4): 367

[18]

L. Zhou, Y. B. Sheng. One-step device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron., 2022, 65(5): 250311

[19]

J. W. Ying, L. Zhou, W. Zhong, Y. B. Sheng. Measurement-device-independent one-step quantum secure direct communication. Chin. Phys. B, 2022, 31(12): 120303

[20]

X. R. Jin, X. Ji, Y. Q. Zhang, S. Zhang, S. K. Hong, K. H. Yeon, C. I. Um. Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A, 2006, 354(1−2): 67

[21]

Q.ZhangM. M. DuW.ZhongY.B. ShengL.Zhou, Single-photon based three-party quantum secure direct communication with identity authentication, Ann. Phys. (Berlin), doi: 10.1002/andp.202300407 (2023)

[22]

Y. P. Hong, L. Zhou, W. Zhong, Y. B. Sheng. Measurement-device-independent three-party quantum secure direct communication. Quantum Inform. Process., 2023, 22(2): 111

[23]

Y. X. Xiao, L. Zhou, W. Zhong, M. M. Du, Y. B. Sheng. The hyperentanglement-based quantum secure direct communication protocol with single-photon measurement. Quantum Inform. Process., 2023, 22(9): 339

[24]

A. D. Zhu, Y. Xia, Q. B. Fan, S. Zhang. Secure direct communication based on secret transmitting order of particles. Phys. Rev. A, 2006, 73(2): 022338

[25]

Z. W. Cao, L. Wang, K. X. Liang, G. Chai, J. Y. Peng. Continuous-variable quantum secure direct communication based on Gaussian mapping. Phys. Rev. Appl., 2021, 16(2): 024012

[26]

Z. W. Cao, Y. Lu, G. Chai, H. Yu, K. X. Liang, L. Wang. Realization of quantum secure direct communication with continuous variable. Research, 2023, 6: 0193

[27]

S. Srikara, K. Thapliyal, A. Pathak. Continuous variable direct secure quantum communication using Gaussian states. Quantum Inform. Process., 2020, 19(4): 132

[28]

K. X. Liang, Z. W. Cao, X. L. Chen, L. Wang, G. Chai, J. Y. Peng. A quantum secure direct communication scheme based on intermediate-basis. Front. Phys., 2023, 18(5): 51301

[29]

T. Li, G. L. Long. Quantum secure direct communication based on single-photon Bell-state measurement. New J. Phys., 2020, 22(6): 063017

[30]

Z. D. Ye, D. Pan, Z. Sun, C. G. Du, L. G. Yin, G. L. Long. Generic security analysis framework for quantum secure direct communication. Front. Phys., 2021, 16(2): 21503

[31]

J. Y. Hu, B. Yu, M. Y. Jing, L. T. Xiao, S. T. Jia, G. Q. Qin, G. L. Long. Experimental quantum secure direct communication with single photons. Light Sci. Appl., 2016, 5(9): e16144

[32]

W. Zhang, D. S. Ding, Y. B. Sheng, L. Zhou, B. S. Shi, G. C. Guo. Quantum secure direct communication with quantum memory. Phys. Rev. Lett., 2017, 118(22): 220501

[33]

F. Zhu, W. Zhang, Y. B. Sheng, Y. D. Huang. Experimental long-distance quantum secure direct communication. Sci. Bull. (Beijing), 2017, 62(22): 1519

[34]

D. Pan, Z. S. Lin, J. W. Wu, H. R. Zhang, Z. Sun, D. Ruan, L. G. Yin, G. L. Long. Experimental free-space quantum secure direct communication and its security analysis. Photon. Res., 2020, 8(9): 1522

[35]

Z. Qi, Y. Li, Y. W. Huang, J. Feng, Y. L. Zheng, X. F. Chen. A 15-user quantum secure direct communication network. Light Sci. Appl., 2021, 10(1): 183

[36]

X. Liu, D. Luo, G. L. Lin, Z. H. Chen, C. F. Huang, S. Z. Li, C. X. Zhang, Z. R. Zhang, K. J. Wei. Fiber-based quantum secure direct communication without active polarization compensation. Sci. China Phys. Mech. Astron., 2022, 65(12): 120311

[37]

H. Zhang, Z. Sun, R. Qi, L. Yin, G. L. Long, J. Lu. Realization of quantum secure direct communication over 100 km fiber with time-bin and phase quantum states. Light Sci. Appl., 2022, 11(1): 83

[38]

I.PaparelleF. MousaviF.ScazzaA.BassiM.Paris A.Zavatta, Practical quantum secure direct communication with squeezed states, arXiv: 2306.14322 (2023)

[39]

Y. Fu, H. L. Yin, T. Y. Chen, Z. B. Chen. Long-distance measurement-device-independent multi-party quantum communication. Phys. Rev. Lett., 2015, 114(9): 090501

[40]

T. Pramanik, D. H. Lee, Y. W. Cho, H. Lim, S. Han, H. Jung, S. Moon, K. J. Lee, Y. Kim. Equitable multiparty quantum communication without a trusted third party. Phys. Rev. Appl., 2020, 14(6): 064074

[41]

S. M. Lee, S. W. Lee, H. Jeong, H. S. Park. Quantum teleportation of shared quantum secret. Phys. Rev. Lett., 2020, 124(6): 060501

[42]

A. Muller, J. Breguet, N. Gisin. Experimental demonstration of quantum cryptography using polarized photons in optical fiber over more than 1 km. Europhys. Lett., 1993, 23(6): 383

[43]

P. D. Townsend, I. A. Thompson. A quantum key distribution channel based on optical fibre. J. Mod. Opt., 1994, 41(12): 2425

[44]

H. K. Lo, M. Curty, B. Qi. Measurement-device-independent quantum key distribution. Phys. Rev. Lett., 2012, 108(13): 130503

[45]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, P. Grangier. Quantum key distribution using Gaussian-modulated coherent states. Nature, 2003, 421(6920): 238

[46]

J. Lodewyck, M. Bloch, R. García-Patrón, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, P. Grangier. Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A, 2007, 76(4): 042305

[47]

C. Wang, D. Huang, P. Huang, D. Lin, J. Peng, G. Zeng. 25 MHz clock continuous-variable quantum key distribution system over 50 km fiber channel. Sci. Rep., 2015, 5(1): 14607

[48]

Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y. Zhao, B. Xu, S. Yu, H. Guo. Long-distance continuous-variable quantum key distribution over 202.81 km of fiber. Phys. Rev. Lett., 2020, 125(1): 010502

[49]

J. B. Brask, I. Rigas, E. S. Polzik, U. L. Andersen, A. S. Sørensen. Hybrid long-distance entanglement distribution protocol. Phys. Rev. Lett., 2010, 105(16): 160501

[50]

P. van Loock. Optical hybrid approaches to quantum information. Laser Photonics Rev., 2011, 5(2): 167

[51]

S. W. Lee, H. Jeong. Near-deterministic quantum teleportation and resource-efficient quantum computation using linear optics and hybrid qubits. Phys. Rev. A, 2013, 87(2): 022326

[52]

S. Bose, H. Jeong. Quantum teleportation of hybrid qubits and single-photon qubits using Gaussian resources. Phys. Rev. A, 2022, 105(3): 032434

[53]

J. W. Pan, M. Daniell, S. Gasparoni, G. Weihs, A. Zeilinger. Experimental demonstration of four-photon entanglement and high-fidelity teleportation. Phys. Rev. Lett., 2001, 86(20): 4435

[54]

J. Calsamiglia, N. Lütkenhaus. Maximum efficiency of a linear-optical Bell-state analyzer. Appl. Phys. B, 2001, 72(1): 67

[55]

F. Grosshans, P. Grangier. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett., 2002, 88(5): 057902

[56]

A. Ourjoumtsev, H. Jeong, R. Tualle-Brouri, P. Grangier. Generation of optical “Schrödinger cats” from photon number states. Nature, 2007, 448(7155): 784

[57]

B. H. Li, Y. M. Xie, Z. Li, C. X. Weng, C. L. Li, H. L. Yin, Z. B. Chen. Long-distance twin-field quantum key distribution with entangled sources. Opt. Lett., 2021, 46(22): 5529

[58]

Y. M. Xie, B. H. Li, Y. S. Lu, X. Y. Cao, W. B. Liu, H. L. Yin, Z. B. Chen. Overcoming the rate-distance limit of device-independent quantum key distribution. Opt. Lett., 2021, 46(7): 1632

[59]

S. L. Braunstein, P. van Loock. Quantum information with continuous variables. Rev. Mod. Phys., 2005, 77(2): 513

[60]

H. Jeong, A. Zavatta, M. Kang, S. W. Lee, L. S. Costanzo, S. Grandi, T. C. Ralph, M. Bellini. Generation of hybrid entanglement of light. Nat. Photonics, 2014, 8(7): 564

[61]

O. Morin, K. Huang, J. Liu, H. Le Jeannic, C. Fabre, J. Laurat. Remote creation of hybrid entanglement between particle-like and wave-like optical qubits. Nat. Photonics, 2014, 8(7): 570

[62]

H. Kwon, H. Jeong. Generation of hybrid entanglement between a single-photon polarization qubit and a coherent state. Phys. Rev. A, 2015, 91(1): 012340

[63]

J. H. Shapiro. Single-photon Kerr nonlinearities do not help quantum computation. Phys. Rev. A, 2006, 73(6): 062305

[64]

J. H. Shapiro, M. Razavi. Continuous-time cross-phase modulation and quantum computation. New J. Phys., 2007, 9(1): 16

[65]

C. C. Luo, L. Zhou, W. Zhong, Y. B. Sheng. Purification for hybrid logical qubit entanglement. Quantum Inform. Process., 2022, 21(8): 300

[66]

P. van Loock, T. D. Ladd, K. Sanaka, F. Yamaguchi, K. Nemoto, W. J. Munro, Y. Yamamoto. Hybrid quantum repeater using bright coherent light. Phys. Rev. Lett., 2006, 96(24): 240501

[67]

M. Bergmann, P. van Loock. Hybrid quantum repeater for qudits. Phys. Rev. A, 2019, 99(3): 032349

[68]

M. Fujiwara, M. Toyoshima, M. Sasaki, K. Yoshino, Y. Nambu, A. Tomita. Performance of hybrid entanglement photon pair source for quantum key distribution. Appl. Phys. Lett., 2009, 95(26): 261103

[69]

M. Fujiwara, K. Yoshino, Y. Nambu, T. Yamashita, S. Miki, H. Terai, Z. Wang, M. Toyoshima, A. Tomita, M. Sasaki. Modified E91 protocol demonstration with hybrid entanglement photon source. Opt. Express, 2014, 22(11): 13616

[70]

C. X. Zhang, B. H. Guo, G. M. Cheng, J. J. Guo, R. H. Fan. Spin‒orbit hybrid entanglement quantum key distribution scheme. Sci. China Phys. Mech. Astron., 2014, 57(11): 2043

[71]

S. L. Zhang. Improving long-distance distribution of en- tangled coherent state with the method of twin-field quantum key distribution. Opt. Express, 2019, 27(25): 37087

[72]

S.BoseJ. SinghA.CabelloH.Jeong, Long distance measurement-device-independent quantum key distribution using entangled states between continuous and discrete variables, arXiv: 2305.18906 (2023)

[73]

Y. B. Sheng, L. Zhou, G. L. Long. Hybrid entanglement purification for quantum repeaters. Phys. Rev. A, 2013, 88(2): 022302

[74]

H. Jeong, M. S. Kim. Efficient quantum computation using coherent states. Phys. Rev. A, 2002, 65(4): 042305

[75]

D. V. Sychev, A. E. Ulanov, E. S. Tiunov, A. A. Pushkina, A. Kuzhamuratov, V. Novikov, A. I. Lvovsky. Entanglement and teleportation between polarization and wave-like encodings of an optical qubit. Nat. Commun., 2018, 9(1): 3672

[76]

H. Jeong, M. S. Kim, J. Lee. Quantum-information processing for a coherent superposition state via a mixedentangled coherent channel. Phys. Rev. A, 2001, 64(5): 052308

[77]

J. W. Wu, Z. S. Lin, L. G. Yin, G. L. Long. Security of quantum secure direct communication based on Wyner’s wiretap channel theory. Quantum Eng., 2019, 1(4): e26

[78]

R. Y. Qi, Z. Sun, Z. S. Lin, P. H. Niu, W. T. Hao, L. Y. Song, Q. Huang, J. C. Gao, L. G. Yin, G. L. Long. Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl., 2019, 8(1): 22

[79]

A. S. Holevo. Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Peredachi Inf., 1973, 9(3): 177

[80]

R. Jozsa, J. Schlienz. Distinguishability of states and von Neumann entropy. Phys. Rev. A, 2000, 62(1): 012301

[81]

A. D. Wyner. The wire-tap channel. Bell Syst. Tech. J., 1975, 54(8): 1355

[82]

D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, A. Sanpera. Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett., 1996, 77(13): 2818

[83]

H. K. Lo, H. F. Chau. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 1999, 283(5410): 2050

[84]

P. W. Shor, J. Preskill. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett., 2000, 85(2): 441

[85]

W.H. Louisell, Quantum Statistical Properties of Radiation, New York: Wiley, 1973

[86]

H. Kim, J. Park, H. Jeong. Transfer of different types of optical qubits over a lossy environment. Phys. Rev. A, 2014, 89(4): 042303

[87]

H. Kim, S. W. Lee, H. Jeong. Two different types of optical hybrid qubits for teleportation in a lossy environment. Quantum Inform. Process., 2016, 15(11): 4729

[88]

S. J. D. Phoenix. Wave-packet evolution in the damped oscillator. Phys. Rev. A, 1990, 41(9): 5132

[89]

S. J. van Enk, O. Hirota. Entangled coherent states: Teleportation and decoherence. Phys. Rev. A, 2001, 64(2): 022313

[90]

T. C. Ralph, A. Gilchrist, G. J. Milburn, W. J. Munro, S. Glancy. Quantum computation with optical coherent states. Phys. Rev. A, 2003, 68(4): 042319

[91]

P. van Loock, N. Lütkenhaus, W. J. Munro, K. Nemoto. Quantum repeaters using coherent-state communication. Phys. Rev. A, 2008, 78(6): 062319

[92]

C. H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. A. Smolin, W. K. Wootters. Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett., 1996, 76(5): 722

[93]

P. S. Yan, L. Zhou, W. Zhong, Y. B. Sheng. Advances in quantum entanglement purification. Sci. China Phys. Mech. Astron., 2023, 66(5): 250301

[94]

Z. Q. Zhou, C. Liu, C. F. Li, G. C. Guo, D. Oblak, M. Lei, A. Faraon, M. Mazzera, H. de Riedmatten. Photonic integrated quantum memory in rare-earth doped solids. Laser Photonics Rev., 2023, 17(10): 2300257

[95]

Y. F. Wang, J. F. Li, S. C. Zhang, K. Y. Su, Y. R. Zhou, K. Y. Liao, S. W. Du, H. Yan, S. L. Zhu. Efficient quantum memory for single-photon polarization qubits. Nat. Photonics, 2019, 13(5): 346

[96]

T. X. Zhu, C. Liu, M. Jin, M. X. Su, Y. P. Liu, W. J. Li, Y. Ye, Z. Q. Zhou, C. F. Li, G. C. Guo. On-demand integrated quantum memory for polarization qubits. Phys. Rev. Lett., 2022, 128(18): 180501

[97]

Y. Ma, Y. Z. Ma, Z. Q. Zhou, C. F. Li, G. C. Guo. One-hour coherent optical storage in an atomic frequency comb memory. Nat. Commun., 2021, 12(1): 2381

RIGHTS & PERMISSIONS

Higher Education Press

AI Summary AI Mindmap
PDF (5408KB)

1360

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/