1. College of Electronic and Optical Engineering & College of Flexible Electronics (Future Technology), Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2. Institute of Quantum Information and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
3. College of Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
shengyb@njupt.edu.cn
Show less
History+
Received
Accepted
Published
2023-11-29
2024-01-11
2024-10-15
Issue Date
Revised Date
2024-04-01
PDF
(5408KB)
Abstract
Quantum secure direct communication (QSDC) can transmit secret messages without keys, making it an important branch of quantum communication. We present a hybrid entanglement-based quantum secure direct communication (HE-QSDC) protocol with simple linear optical elements, combining the benefits of both continuous variables (CV) and discrete variables (DV) encoding. We analyze the security and find that the QSDC protocol has a positive security capacity when the bit error rate is less than 0.073. Compared with previous DV QSDC protocols, our protocol has higher communication efficiency due to performing nearly deterministic Bell-state measurement. On the other hand, compared with CV QSDC protocol, this protocol has higher fidelity with large . Based on these advantages, our protocol may provide an alternative approach to realize secure communication.
Peng Zhao, Wei Zhong, Ming-Ming Du, Xi-Yun Li, Lan Zhou, Yu-Bo Sheng.
Quantum secure direct communication with hybrid entanglement.
Front. Phys., 2024, 19(5): 51201 DOI:10.1007/s11467-024-1396-5
Quantum communication refers to the realization of information transmission based on the basic principles of quantum mechanics, which has been widely concerned because of its theoretical unconditional security [1, 2]. Quantum key distribution (QKD) provides an unconditionally secure means of distributing secret keys between two spatially separated parties [3–6]. Quantum secret sharing (QSS) [7, 8] uses quantum channels to share random keys among multiple parties. Both QKD and QSS do not transmit the message directly. Besides QKD and QSS, there is another important quantum communication branch, named quantum secure direct communication (QSDC) [9–11]. Different from QKD and QSS, QSDC enables secret information to be transmitted directly through a quantum channel without neither key nor ciphertext. Long and Liu [9] introduced the first QSDC protocol. In 2003, the two-step QSDC protocol was proposed [10]. In this protocol, they transmit the Einstein−Podolsky−Rosen (EPR) pairs in two steps with security checking applied in each step to avoid the leakage of information. Recently, QSDC was developed in both theory and experiments. For example, in theory, the measurement-device-independent (MDI) QSDC [12, 13], device-independent (DI) QSDC [14–16], one-step QSDC protocols [17–19], and some other important QSDC protocols were proposed [20–30]. In experiment, in 2016, the first QSDC experiment using single photon was realized [31]. In 2017, with the help of quantum memory (QM), the first entanglement-based QSDC protocol was realized [32]. In the same year, the QSDC experiment using 500 m optical fiber was realized [33]. The QSDC experiment in free-space was reported in 2020 [34]. In 2021, the first QSDC network was realized [35]. In 2022, fiber-based QSDC without active polarization compensation was reported [36]. The distance of QSDC reached 100 km in 2022 [37]. Recently, an interesting QSDC experiment using squeezed state was realized [38].
In quantum communication, photons are frequently used to transmit information due to its rapidity of transmission. Two different ways of encoding, i.e., discrete variable (DV) and continuous variable (CV) are used. In DV regime, for a single photon, the polarization degree of freedom (DOF) is usually used to encode the information for its simple manipulation [39–41]. In the CV regime, the carrier of information is the regular component of the light field states (position and momentum in phase space) rather than the DOFs (such as polarization and phase) of the photon. A great number of important works on both DV encoding [42–44] and CV encoding [45–48] have been reported and they have made considerable progress in recent decades. In QSDC, the QSDC protocols using DV encoding [9–15, 17–20, 24] and CV encoding [25–27] are also proposed independently.
However, both DV and CV have their own advantages and disadvantages [49, 50]. For example, in DV encoding, it is difficulty to implement a deterministic two-bit controlled gate operation [51, 52]. Moreover, the Bell-state measurement (BSM) is an indispensable tool in quantum communication and the success probability of BSM is only 50% [53, 54]. On the other hand, the characteristics and advantages of CV entanglement, such as coherent state entanglement [55], lies in its ability to achieve near-deterministic BSM, high-efficiency detections, and unconditional operations [56]. The coherent-state Bell state measurements have been employed in both twin-field QKD (TF-QKD) [57] and device-independent QKD (DI-QKD) [58], which not only enhances the secure transmission distance but also ensures the security of the measurement device independence and device independence. However, achieving high efficiencies and unconditional operations often come at the cost of lower fidelity and this approach generally introduces losses [59].
A novel type of hybrid entanglement coding that combines the advantages of CV and DV has been proposed and realized [60–62]. Especially the hybrid entanglement based on coherent-state and polarized photons received the attention of researchers [63–65]. Many interesting protocols using hybrid systems have been proposed, such as hybrid quantum repeater [66, 67], hybrid entanglement QKD [68–72], hybrid entanglement purification [73], and some other interesting protocols [74, 75].
In this paper, we present the first hybrid entanglement-based QSDC (HE-QSDC) protocol. The hybrid qubit can be described as , where and the subscript L represents the logical qubit. Here, and denote the horizontal and vertical polarization modes of photons, respectively. is the coherent state. Compared to existing DV QSDC protocols, our protocol has a higher communication efficiency due to the use of near-deterministic BSM. Additionally, for QSDC protocols that rely on CV entanglement, we have shown that our protocol has a higher fidelity when satisfying the large required for near-deterministic BSM.
The structure of this paper is organized as follows. In Section 2, we first describe the hybrid qubits and the key element of this protocol, i.e., near-deterministic BSM. In Section 3, we propose the HE-QSDC protocol subsequently. In Section 4, we analyze the security of our HE-QSDC protocol. In Section 5, we analyze the fidelities of hybrid entanglement and CV entanglement in a lossy environment. In Section 6, we perform a discussion and conclusion.
2 Hybrid Bell states measurement
In this section, we briefly introduce the hybrid Bell states measurement (HBSM). The hybrid Bell states can be written as follows:
In Ref. [51], a method was proposed and implemented to convert between the four hybrid Bell states using the Pauli X and Z operations. This demonstrates that it is possible to transform one Bell states into another using these operations. Before introducing the BSM, it is helpful to briefly review the two existing types of BSMs: the coherent-state BSM and polarized-state BSM. The four entangled coherent Bell states, represented as and , can be distinguished using a coherent-state BSM, which involves a 50:50 beam splitter (BS) and two photon number parity detectors (PNPDs) [76]. Here, represent the normalization constants. The setup is shown in Fig.1 (M1) [51], with the subscript denoting the coherent state. After passing through the BS, the four coherent Bell states can be transformed into the states as
Here, with the normalization constant of and with the normalization constant of contain only even and odd photon number states, respectively. Therefore, the four coherent Bell states can be discriminated by parity measurements of the photons at the output. However, there is a possibility of failure when no photon is detected at both the PNPDs. This may imply that the coherent Bell state is or with an even output of zero.
Fig.1 (M2) shows a feasible approach for implementing a polarized-state BSM, using single photon detectors (SPDs), polarization beam splitters (PBSs), and half wave plates (HWPs). The subscript indicates the polarized-state. In this protocol, two Bell states can be identified only when one detector from the upper two and another detector from the lower two register a photon at the same time, with a success probability of 1/2.
The hybrid Bell states, as shown in Eq. (1), can be discriminated near-deterministically by combining linear optics with M1 and M2 [51]. Therefore, we can extend Eq. (1) and express the hybrid Bell states in terms of the standard form as follows:
Here, .
Equation (3) shows that each hybrid Bell state can be decomposed into a combination of polarized Bell states and coherent Bell states. As a result, we can determine the BSM outcome of the hybrid entangled states by conducting two independent BSMs: one on the polarization state and the other on the coherent state. Tab.1 provides a detailed breakdown of these two BSM outcomes, allowing us to extract the complete information about the hybrid entangled state.
Based on Tab.1, the discrimination process is highly likely to succeed unless both M1 and M2 fail to perform the BSM simultaneously. The failure probability in this scenario is calculated to be . Hence, it is possible to unambiguously distinguish the four coherent Bell states with a success probability of . Notably, the success rate increases with the value of parameter . For instance, a success rate of 99% can be achieved by setting to 1.4 [51].
3 Hybrid entanglement quantum secure direct communication
As pointed out in Ref. [9], the security of a two-step QSDC protocol relies on the transmission of entangled photons in blocks and the verification of their security at each step. Our proposed HE-QSDC protocol, which utilizes near-deterministic BSM, follows a similar approach to ensure its security. Fig.2 illustrates a schematic diagram of the proposed HE-QSDC protocol, while the specific steps of the protocol are outlined as follows.
Step (1): Prepare sequence. Alice prepares N hybrid entangled photon pairs as . Here, the subscripts and mean the qubit in check sequence or message sequence.
Step (2): Transmit sequence. Alice sends a string of qubits, denoted as , to Bob. Here we should point out that such transmit requires two different channels, the one is for the single photon and the other is for the coherent state. Bob selects a suitable number of photons both from two channels from and performs measurements on them using one of two measurement bases randomly: the rectilinear basis comprised of states , or the diagonal basis composed of states . These two basis have already been defined and used in quantum teleportation in Ref. [51]. After performing the measurements, Bob uses the classical channel to inform Alice which photons he has measured from , along with the corresponding information about which measurement bases were used and the results of the measurements.
Step (3): Check security. After receiving Bob’s information about the measurements from Step (2), Alice selects the corresponding photons in the message sequence and measures them using the same measurement basis as Bob. She then compares her measurement results with those reported by Bob, performing an error rate analysis to check for security breaches. If the error rate is below the preset security threshold, it can be assumed that there is no eavesdropper monitoring the quantum channel. Otherwise, the communication is terminated and both parties return to Step (1). In our hybrid encoding protocol, we use logical bit bases instead of physical bit bases for security check, which differs from the previous QSDC protocols. In a noiseless channel, Alice and Bob should obtain identical measurement results in the absence of eavesdropping. Specifically, the entangled state should be uniform under both the Z-basis and X-basis. Therefore, if both parties randomly select the same measurement basis, they will obtain the same measurement result. Any eavesdropping attempt will inevitably impact the entanglement between and , leading to different measurement results and increased error rates. The transmission of the is mainly to detect the transmission security of the entangled system without encoding confidential information.
Step (4): Encode message. Under the condition of ensuring the security transmission of , Alice selects one of the four unitary operations (, , , ) correspondingly to encode information on each quantum state in the sequence (the remaining photons after discarding the photons used for the first round of security detection in the ). Here, , , and are four Pauli operators [see Eq. (4)]. The four unitary operations , , , and can represent the information 00, 01, 10, and 11, respectively. Here
The required unitary transformations can be accomplished by utilizing a combination of Pauli operations and Pauli operations. Specifically, we can implement by using a polarizing rotator on a single photon mode, and by using a phase shifter on a coherent state mode. An arbitrary Z-rotation can be implemented by applying a phase shift operation on a single photon mode (), without the need for any operation on a coherent state mode. Here is the rotation angle [51]. Alice also needs to select some photons and randomly perform one of the four unitary operations to secure the second transmission.
Step (5): Check security. After Step (4), Alice sends to Bob. In order to check the transmission security of , Alice will tell Bob which hybrid entanglement pairs she has performed security check coding and the corresponding operations she did. Bob judges whether the second round of transmission is secure by estimating the error rate of the channel. In fact, the eavesdropper can only interfere with the transmission but cannot steal information in the second round of transmission, because he can obtain only one logic qubit from the hybrid entanglement.
Step (6): Decode message. Bob decodes the message by using the HBSM on the remaining hybrid entanglement (see Fig.1) and reads out the message directly with Eq. (4) and Tab.1. For example, the result of HBSM is , the secret information is 01.
4 Security analysis of hybrid entanglement QSDC
Inspired by Refs. [77, 78], we will conduct a security analysis and calculate the security capacity of our HE-QSDC protocol in this section. To facilitate subsequent explanations, we will introduce and define some key terms,
When Eve can obtain as much information as possible, we consider a pure state system of as
Here, mean the Bell states of Alice and Bob and represent the states of Eve’s auxiliary system which are mutually orthogonal. Here
where represents Alice and Bob both perform the same transformation chosen randomly from . These operations will eliminate the nondiagonal elements of in Bell basis. are the probability of . The bit and phase error rate can be expressed as and , respectively. In this way,
In order to get the maximal information, Eve intercepts all the photons and measures them in Step (5). So we trace out B from ABE, we can get
Here, and are the density matrix of and , respectively. Note that both and represent hybrid qubits and respectively, which we have defined above. For simplicity, we omit the subscript L here. and are defined as follows:
Notice that in Step (4), Alice has applied four unitary operations , , , and to encode message, which represent the information 00, 01, 10 and 11 respectively. So the four encoding states are defined as
By exploiting Holevo bound in Refs. [77, 79], we can obtain
where and represent the encoded states and its probability distributions, respectively. Now our main task is to figure out , which is undoubtedly complicated work. Encouragingly, Jozsa and Schlienz [80] came up with one Gram matrix method for calculating the Von Neumann entropy of . From Eq. (11), we can get
The Gram matrix is defined as follows:
where represent the elements in row i and column j of the Gram matrix. and are the probability distribution of four encoding states. Hence we get
Here,
with
The eigenvalues of our gram matrix are
After simplification, eight eigenvalues can be obtained as , , , , , , , , respectively. Hence we can obtain
When , the Von Neumann entropy reaches its maximum value . Therefore, from Wyner’s wiretap channel theory [81], we can get
When we consider the channel loss, we eventually get
Here, is the error rate of the main channel between Alice and Bob. is the Shannon entropy. and are reception rates of Bob and Eve, respectively. Usually, =1.
We present a comparison of the security capacities estimated using Holevo bound and entanglement distillation in Fig.3 [77]. Entanglement distillation is a powerful tool for security analysis that was introduced by Deutsch et al. [82], Lo and Chau [83], Shor and Preskill [84]. As for ideal QKD protocol based on entanglement distillation (ED-QKD), the rate is , which has been proved in Ref. [83]. To make a reasonable comparison, we uniformly model the quantum channel as a depolarizing channel . Here, , , and refer to density matrix, probability, identity matrix and dimensions of quantum states, respectively. In other words, for a d-dimensional quantum system, the depolarizing channel replaces the quantum system with a completely mixed state with probability and retains the original state with probability . Therefore, the error rates of rectilinear basis Z and the diagonal basis X in security check are , and the depolarizing probability is after the Bell states pass the depolarizing channel. As the result, the tolerable bit error rate of our protocol is also lower than that of ED-QSDC [77]. From Fig.3, we can see that our HE-QSDC can encode 1.6 bits of information, resulting in a higher security capacity than ED-QKD at low bit error rates. The error rate threshold of ED-QSDC and ED-QKD is approximately 0.11, while our HE-QSDC is 0.073. This is because our main channel capacity continues to decrease as the bit error rate increases.
5 Fidelities of hybrid entanglement and continuous variables entanglement in lossy environments
In this section, we aim to analyze the fidelities of hybrid entanglement and CV entanglement in a lossy environment. We will now calculate the fidelity of the two methods with an open system. In the case of photon loss, the time evolution of the density matrix of a system can be described using the Born−Markov master equation [85–87]:
Here, represents interaction time. , , where , , and represent decay constant, creation operator and annihilation operator for mode , respectively. The general solution of Eq. (21) can be described by [88]. Here, is the initial density operator. In this way, the hybrid entanglement which we used can be expressed as Eq. (22) at time [87].
Here, , . The normalization time is expressed using interaction time and decoherence rate . Afterwards, we calculate the fidelity of our hybrid entanglement with (see the Appendix for more details) and get
If we use only CV entanglement in the form of Eq. (24), we can also calculate the fidelity in a similar manner. Specifically, we can evaluate the fidelity between the original state and the output state by considering the effects of photon loss or other noise on the entangled state
Here, the term represents the normalized coefficient, where . The reason for using in Eq. (24) instead of in Eq. (2) is to correspond with hybrid entanglement . Similarly, we can describe the density matrix of entangled coherent state in Eq. (24) at time as follows:
Likewise, we calculate the fidelity of entangled coherent state with (see the Appendix for more details) and obtain
Through numerical simulation, it can be observed that when is small, such as , the fidelity of direct transmission using entangled coherent states is better compared to that of hybrid entanglement in Fig.4. However, as increases, the fidelity of hybrid entanglement gradually surpasses that of entangled coherent states. It is important to note that this difference does not increase with the increase of . In fact, as continues to increase, the two curves are approaching each other. This case occurs because as the increases, the loss also increases, resulting in a rapid decrease in fidelity for both methods in a short period of time.
6 Discussion and conclusion
So far, we outlined the key steps of our protocol and discussed its security. In a practical quantum communication system, both single qubit and coherent state are inevitably affected by noise during the transmission. If a bit-flip error occurs, the initial state may become a mixed state of the form
Here, and represent the probability of and , respectively. On the other hand, in coherent-state transmission, photon loss is a major issue that affects the transmission. Due to the photon loss, a single photon will be successfully transmitted with the transmission efficiency of , or dissipated into an environment mode with the probability of 1− [89, 90]. When we trace over the environment mode, we can see that the photon-loss errors are equivalent to the bit-flip errors in the other basis [91]. Fortunately, entanglement purification of bit-flip errors has been extensively studied for decades [65, 92, 93], and especially the purification of such hybrid entanglement was detailed in Ref. [65]. Moreover, as described in Ref. [73], the photon losses in coherent-state transmission can be incorporated into the mixed state framework with bit-flip error and we can use the same method to purify the photon-loss errors as we do for bit-flip errors.
In QSDC protocols, QM plays an important role [94]. Alice encodes the information after they perform the security check. Therefore, those photons that are not used in security check should be stored in the QM. QM was also exploited to demonstrate QSDC protocol in experiment [32]. In this protocol, we assume that the memory is perfect. Actually, the efficiency and fidelity of QM will also influence the quality of QSDC. Usually, the imperfect part in QM can be regarded as the noise in quantum channel. For example, if the photon is not storied in the QM successfully, it equals to be lost in the quantum channel. In experiment, based on balanced two-channel electromagnetically induced transparency in laser-cooled rubidium atoms, quantum memory for single-photon polarization qubits with an efficiency of > 85% and a fidelity of > 99% was reported [95]. The fidelity of the qubit in QM can also reach more than 99% with a storage bandwidth of 10 MHz [96]. The coherent storage of light in an atomic frequency comb memory over 1 hour [97]. However, high quality QM for quantum repeater is still a big challenge in existing technology.
In conclusion, we presented the first HE-QSDC protocol. We also perform the security analysis, based on the wiretap channel theory and the Gram matrix method, demonstrates the unconditional security of our HE-QSDC protocol. This protocol has two advantages. First, it employs near-deterministic BSM composed of coherent state and polarized mode in linear optics, which makes the protocol has a higher communication efficiency. Second, when compared to the protocol only using CV entanglement, we have shown that our protocol has higher fidelity when satisfying the large required for near-deterministic BSM. These advantages make our HE-QSDC protocol become an alternative approach to realize secure communication.
V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, M. Peev. The security of practical quantum key distribution. Rev. Mod. Phys., 2009, 81(3): 1301
[2]
F. H. Xu, X. F. Ma, Q. Zhang, H. K. Lo, J. W. Pan. Secure quantum key distribution with realistic devices. Rev. Mod. Phys., 2020, 92(2): 025002
[3]
A. K. Ekert. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett., 1991, 67(6): 661
[4]
X. F. Ma, B. Qi, Y. Zhao, H. K. Lo. Practical decoy state for quantum key distribution. Phys. Rev. A, 2005, 72(1): 012326
[5]
X. Ma, C. H. F. Fung, H. K. Lo. Quantum key distribution with entangled photon sources. Phys. Rev. A, 2007, 76(1): 012307
[6]
X. L. Su. Applying Gaussian quantum discord to quantum key distribution. Chin. Sci. Bull., 2014, 59(11): 1083
[7]
M. Hillery, V. Bužek, A. Berthiaume. Quantum secret sharing. Phys. Rev. A, 1999, 59(3): 1829
[8]
A. Shen, X. Y. Cao, Y. Wang, Y. Fu, J. Gu, W. B. Liu, C. X. Weng, H. L. Yin, Z. B. Chen. Experimental quantum secret sharing based on phase encoding of coherent states. Sci. China Phys. Mech. Astron., 2023, 66(6): 260311
[9]
G. L. Long, X. S. Liu. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A, 2002, 65(3): 032302
[10]
F. G. Deng, G. L. Long, X. S. Liu. Two-step quantum direct communication protocol using the Einstein‒Podolsky‒Rosen pair block. Phys. Rev. A, 2003, 68(4): 042317
[11]
F. G. Deng, G. L. Long. Secure direct communication with a quantum one-time pad. Phys. Rev. A, 2004, 69(5): 052319
[12]
P. H. Niu, Z. R. Zhou, Z. S. Lin, Y. B. Sheng, L. G. Yin, G. L. Long. Measurement-device-independent quantum communication without encryption. Sci. Bull. (Beijing), 2018, 63(20): 1345
[13]
Z. R. Zhou, Y. B. Sheng, P. H. Niu, L. G. Yin, G. L. Long, L. Hanzo. Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron., 2020, 63(3): 230362
[14]
L. Zhou, Y. B. Sheng, G. L. Long. Device-independent quantum secure direct communication against collective attacks. Sci. Bull. (Beijing), 2020, 65(1): 12
[15]
L. Zhou, B. W. Xu, W. Zhong, Y. B. Sheng. Device-independent quantum secure direct communication with single-photon sources. Phys. Rev. Appl., 2023, 19(1): 014036
[16]
H.ZengM.M. DuW.ZhongL.ZhouY.B. Sheng, High-capacity device-independent quantum secure direct communication based on hyper-encoding, Fundament. Res., doi: 10.1016/j.fmre.2023.11.006 (2023)
[17]
Y. B. Sheng, L. Zhou, G. L. Long. One-step quantum secure direct communication. Sci. Bull. (Beijing), 2022, 67(4): 367
[18]
L. Zhou, Y. B. Sheng. One-step device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron., 2022, 65(5): 250311
[19]
J. W. Ying, L. Zhou, W. Zhong, Y. B. Sheng. Measurement-device-independent one-step quantum secure direct communication. Chin. Phys. B, 2022, 31(12): 120303
[20]
X. R. Jin, X. Ji, Y. Q. Zhang, S. Zhang, S. K. Hong, K. H. Yeon, C. I. Um. Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A, 2006, 354(1−2): 67
[21]
Q.ZhangM.M. DuW.ZhongY.B. ShengL.Zhou, Single-photon based three-party quantum secure direct communication with identity authentication, Ann. Phys. (Berlin), doi: 10.1002/andp.202300407 (2023)
[22]
Y. P. Hong, L. Zhou, W. Zhong, Y. B. Sheng. Measurement-device-independent three-party quantum secure direct communication. Quantum Inform. Process., 2023, 22(2): 111
[23]
Y. X. Xiao, L. Zhou, W. Zhong, M. M. Du, Y. B. Sheng. The hyperentanglement-based quantum secure direct communication protocol with single-photon measurement. Quantum Inform. Process., 2023, 22(9): 339
[24]
A. D. Zhu, Y. Xia, Q. B. Fan, S. Zhang. Secure direct communication based on secret transmitting order of particles. Phys. Rev. A, 2006, 73(2): 022338
[25]
Z. W. Cao, L. Wang, K. X. Liang, G. Chai, J. Y. Peng. Continuous-variable quantum secure direct communication based on Gaussian mapping. Phys. Rev. Appl., 2021, 16(2): 024012
[26]
Z. W. Cao, Y. Lu, G. Chai, H. Yu, K. X. Liang, L. Wang. Realization of quantum secure direct communication with continuous variable. Research, 2023, 6: 0193
[27]
S. Srikara, K. Thapliyal, A. Pathak. Continuous variable direct secure quantum communication using Gaussian states. Quantum Inform. Process., 2020, 19(4): 132
[28]
K. X. Liang, Z. W. Cao, X. L. Chen, L. Wang, G. Chai, J. Y. Peng. A quantum secure direct communication scheme based on intermediate-basis. Front. Phys., 2023, 18(5): 51301
[29]
T. Li, G. L. Long. Quantum secure direct communication based on single-photon Bell-state measurement. New J. Phys., 2020, 22(6): 063017
[30]
Z. D. Ye, D. Pan, Z. Sun, C. G. Du, L. G. Yin, G. L. Long. Generic security analysis framework for quantum secure direct communication. Front. Phys., 2021, 16(2): 21503
[31]
J. Y. Hu, B. Yu, M. Y. Jing, L. T. Xiao, S. T. Jia, G. Q. Qin, G. L. Long. Experimental quantum secure direct communication with single photons. Light Sci. Appl., 2016, 5(9): e16144
[32]
W. Zhang, D. S. Ding, Y. B. Sheng, L. Zhou, B. S. Shi, G. C. Guo. Quantum secure direct communication with quantum memory. Phys. Rev. Lett., 2017, 118(22): 220501
[33]
F. Zhu, W. Zhang, Y. B. Sheng, Y. D. Huang. Experimental long-distance quantum secure direct communication. Sci. Bull. (Beijing), 2017, 62(22): 1519
[34]
D. Pan, Z. S. Lin, J. W. Wu, H. R. Zhang, Z. Sun, D. Ruan, L. G. Yin, G. L. Long. Experimental free-space quantum secure direct communication and its security analysis. Photon. Res., 2020, 8(9): 1522
[35]
Z. Qi, Y. Li, Y. W. Huang, J. Feng, Y. L. Zheng, X. F. Chen. A 15-user quantum secure direct communication network. Light Sci. Appl., 2021, 10(1): 183
[36]
X. Liu, D. Luo, G. L. Lin, Z. H. Chen, C. F. Huang, S. Z. Li, C. X. Zhang, Z. R. Zhang, K. J. Wei. Fiber-based quantum secure direct communication without active polarization compensation. Sci. China Phys. Mech. Astron., 2022, 65(12): 120311
[37]
H. Zhang, Z. Sun, R. Qi, L. Yin, G. L. Long, J. Lu. Realization of quantum secure direct communication over 100 km fiber with time-bin and phase quantum states. Light Sci. Appl., 2022, 11(1): 83
[38]
I.PaparelleF.MousaviF.ScazzaA.BassiM.ParisA.Zavatta, Practical quantum secure direct communication with squeezed states, arXiv: 2306.14322 (2023)
[39]
Y. Fu, H. L. Yin, T. Y. Chen, Z. B. Chen. Long-distance measurement-device-independent multi-party quantum communication. Phys. Rev. Lett., 2015, 114(9): 090501
[40]
T. Pramanik, D. H. Lee, Y. W. Cho, H. Lim, S. Han, H. Jung, S. Moon, K. J. Lee, Y. Kim. Equitable multiparty quantum communication without a trusted third party. Phys. Rev. Appl., 2020, 14(6): 064074
[41]
S. M. Lee, S. W. Lee, H. Jeong, H. S. Park. Quantum teleportation of shared quantum secret. Phys. Rev. Lett., 2020, 124(6): 060501
[42]
A. Muller, J. Breguet, N. Gisin. Experimental demonstration of quantum cryptography using polarized photons in optical fiber over more than 1 km. Europhys. Lett., 1993, 23(6): 383
[43]
P. D. Townsend, I. A. Thompson. A quantum key distribution channel based on optical fibre. J. Mod. Opt., 1994, 41(12): 2425
[44]
H. K. Lo, M. Curty, B. Qi. Measurement-device-independent quantum key distribution. Phys. Rev. Lett., 2012, 108(13): 130503
[45]
F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, P. Grangier. Quantum key distribution using Gaussian-modulated coherent states. Nature, 2003, 421(6920): 238
[46]
J. Lodewyck, M. Bloch, R. García-Patrón, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, P. Grangier. Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A, 2007, 76(4): 042305
[47]
C. Wang, D. Huang, P. Huang, D. Lin, J. Peng, G. Zeng. 25 MHz clock continuous-variable quantum key distribution system over 50 km fiber channel. Sci. Rep., 2015, 5(1): 14607
[48]
Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y. Zhao, B. Xu, S. Yu, H. Guo. Long-distance continuous-variable quantum key distribution over 202.81 km of fiber. Phys. Rev. Lett., 2020, 125(1): 010502
[49]
J. B. Brask, I. Rigas, E. S. Polzik, U. L. Andersen, A. S. Sørensen. Hybrid long-distance entanglement distribution protocol. Phys. Rev. Lett., 2010, 105(16): 160501
[50]
P. van Loock. Optical hybrid approaches to quantum information. Laser Photonics Rev., 2011, 5(2): 167
[51]
S. W. Lee, H. Jeong. Near-deterministic quantum teleportation and resource-efficient quantum computation using linear optics and hybrid qubits. Phys. Rev. A, 2013, 87(2): 022326
[52]
S. Bose, H. Jeong. Quantum teleportation of hybrid qubits and single-photon qubits using Gaussian resources. Phys. Rev. A, 2022, 105(3): 032434
[53]
J. W. Pan, M. Daniell, S. Gasparoni, G. Weihs, A. Zeilinger. Experimental demonstration of four-photon entanglement and high-fidelity teleportation. Phys. Rev. Lett., 2001, 86(20): 4435
[54]
J. Calsamiglia, N. Lütkenhaus. Maximum efficiency of a linear-optical Bell-state analyzer. Appl. Phys. B, 2001, 72(1): 67
[55]
F. Grosshans, P. Grangier. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett., 2002, 88(5): 057902
[56]
A. Ourjoumtsev, H. Jeong, R. Tualle-Brouri, P. Grangier. Generation of optical “Schrödinger cats” from photon number states. Nature, 2007, 448(7155): 784
[57]
B. H. Li, Y. M. Xie, Z. Li, C. X. Weng, C. L. Li, H. L. Yin, Z. B. Chen. Long-distance twin-field quantum key distribution with entangled sources. Opt. Lett., 2021, 46(22): 5529
[58]
Y. M. Xie, B. H. Li, Y. S. Lu, X. Y. Cao, W. B. Liu, H. L. Yin, Z. B. Chen. Overcoming the rate-distance limit of device-independent quantum key distribution. Opt. Lett., 2021, 46(7): 1632
[59]
S. L. Braunstein, P. van Loock. Quantum information with continuous variables. Rev. Mod. Phys., 2005, 77(2): 513
[60]
H. Jeong, A. Zavatta, M. Kang, S. W. Lee, L. S. Costanzo, S. Grandi, T. C. Ralph, M. Bellini. Generation of hybrid entanglement of light. Nat. Photonics, 2014, 8(7): 564
[61]
O. Morin, K. Huang, J. Liu, H. Le Jeannic, C. Fabre, J. Laurat. Remote creation of hybrid entanglement between particle-like and wave-like optical qubits. Nat. Photonics, 2014, 8(7): 570
[62]
H. Kwon, H. Jeong. Generation of hybrid entanglement between a single-photon polarization qubit and a coherent state. Phys. Rev. A, 2015, 91(1): 012340
[63]
J. H. Shapiro. Single-photon Kerr nonlinearities do not help quantum computation. Phys. Rev. A, 2006, 73(6): 062305
[64]
J. H. Shapiro, M. Razavi. Continuous-time cross-phase modulation and quantum computation. New J. Phys., 2007, 9(1): 16
[65]
C. C. Luo, L. Zhou, W. Zhong, Y. B. Sheng. Purification for hybrid logical qubit entanglement. Quantum Inform. Process., 2022, 21(8): 300
[66]
P. van Loock, T. D. Ladd, K. Sanaka, F. Yamaguchi, K. Nemoto, W. J. Munro, Y. Yamamoto. Hybrid quantum repeater using bright coherent light. Phys. Rev. Lett., 2006, 96(24): 240501
[67]
M. Bergmann, P. van Loock. Hybrid quantum repeater for qudits. Phys. Rev. A, 2019, 99(3): 032349
[68]
M. Fujiwara, M. Toyoshima, M. Sasaki, K. Yoshino, Y. Nambu, A. Tomita. Performance of hybrid entanglement photon pair source for quantum key distribution. Appl. Phys. Lett., 2009, 95(26): 261103
[69]
M. Fujiwara, K. Yoshino, Y. Nambu, T. Yamashita, S. Miki, H. Terai, Z. Wang, M. Toyoshima, A. Tomita, M. Sasaki. Modified E91 protocol demonstration with hybrid entanglement photon source. Opt. Express, 2014, 22(11): 13616
[70]
C. X. Zhang, B. H. Guo, G. M. Cheng, J. J. Guo, R. H. Fan. Spin‒orbit hybrid entanglement quantum key distribution scheme. Sci. China Phys. Mech. Astron., 2014, 57(11): 2043
[71]
S. L. Zhang. Improving long-distance distribution of en- tangled coherent state with the method of twin-field quantum key distribution. Opt. Express, 2019, 27(25): 37087
[72]
S.BoseJ.SinghA.CabelloH.Jeong, Long distance measurement-device-independent quantum key distribution using entangled states between continuous and discrete variables, arXiv: 2305.18906 (2023)
[73]
Y. B. Sheng, L. Zhou, G. L. Long. Hybrid entanglement purification for quantum repeaters. Phys. Rev. A, 2013, 88(2): 022302
[74]
H. Jeong, M. S. Kim. Efficient quantum computation using coherent states. Phys. Rev. A, 2002, 65(4): 042305
[75]
D. V. Sychev, A. E. Ulanov, E. S. Tiunov, A. A. Pushkina, A. Kuzhamuratov, V. Novikov, A. I. Lvovsky. Entanglement and teleportation between polarization and wave-like encodings of an optical qubit. Nat. Commun., 2018, 9(1): 3672
[76]
H. Jeong, M. S. Kim, J. Lee. Quantum-information processing for a coherent superposition state via a mixedentangled coherent channel. Phys. Rev. A, 2001, 64(5): 052308
[77]
J. W. Wu, Z. S. Lin, L. G. Yin, G. L. Long. Security of quantum secure direct communication based on Wyner’s wiretap channel theory. Quantum Eng., 2019, 1(4): e26
[78]
R. Y. Qi, Z. Sun, Z. S. Lin, P. H. Niu, W. T. Hao, L. Y. Song, Q. Huang, J. C. Gao, L. G. Yin, G. L. Long. Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl., 2019, 8(1): 22
[79]
A. S. Holevo. Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Peredachi Inf., 1973, 9(3): 177
[80]
R. Jozsa, J. Schlienz. Distinguishability of states and von Neumann entropy. Phys. Rev. A, 2000, 62(1): 012301
[81]
A. D. Wyner. The wire-tap channel. Bell Syst. Tech. J., 1975, 54(8): 1355
[82]
D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, A. Sanpera. Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett., 1996, 77(13): 2818
[83]
H. K. Lo, H. F. Chau. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 1999, 283(5410): 2050
[84]
P. W. Shor, J. Preskill. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett., 2000, 85(2): 441
[85]
W.H. Louisell, Quantum Statistical Properties of Radiation, New York: Wiley, 1973
[86]
H. Kim, J. Park, H. Jeong. Transfer of different types of optical qubits over a lossy environment. Phys. Rev. A, 2014, 89(4): 042303
[87]
H. Kim, S. W. Lee, H. Jeong. Two different types of optical hybrid qubits for teleportation in a lossy environment. Quantum Inform. Process., 2016, 15(11): 4729
[88]
S. J. D. Phoenix. Wave-packet evolution in the damped oscillator. Phys. Rev. A, 1990, 41(9): 5132
[89]
S. J. van Enk, O. Hirota. Entangled coherent states: Teleportation and decoherence. Phys. Rev. A, 2001, 64(2): 022313
[90]
T. C. Ralph, A. Gilchrist, G. J. Milburn, W. J. Munro, S. Glancy. Quantum computation with optical coherent states. Phys. Rev. A, 2003, 68(4): 042319
[91]
P. van Loock, N. Lütkenhaus, W. J. Munro, K. Nemoto. Quantum repeaters using coherent-state communication. Phys. Rev. A, 2008, 78(6): 062319
[92]
C. H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. A. Smolin, W. K. Wootters. Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett., 1996, 76(5): 722
[93]
P. S. Yan, L. Zhou, W. Zhong, Y. B. Sheng. Advances in quantum entanglement purification. Sci. China Phys. Mech. Astron., 2023, 66(5): 250301
[94]
Z. Q. Zhou, C. Liu, C. F. Li, G. C. Guo, D. Oblak, M. Lei, A. Faraon, M. Mazzera, H. de Riedmatten. Photonic integrated quantum memory in rare-earth doped solids. Laser Photonics Rev., 2023, 17(10): 2300257
[95]
Y. F. Wang, J. F. Li, S. C. Zhang, K. Y. Su, Y. R. Zhou, K. Y. Liao, S. W. Du, H. Yan, S. L. Zhu. Efficient quantum memory for single-photon polarization qubits. Nat. Photonics, 2019, 13(5): 346
[96]
T. X. Zhu, C. Liu, M. Jin, M. X. Su, Y. P. Liu, W. J. Li, Y. Ye, Z. Q. Zhou, C. F. Li, G. C. Guo. On-demand integrated quantum memory for polarization qubits. Phys. Rev. Lett., 2022, 128(18): 180501
[97]
Y. Ma, Y. Z. Ma, Z. Q. Zhou, C. F. Li, G. C. Guo. One-hour coherent optical storage in an atomic frequency comb memory. Nat. Commun., 2021, 12(1): 2381
RIGHTS & PERMISSIONS
Higher Education Press
AI Summary 中Eng×
Note: Please be aware that the following content is generated by artificial intelligence. This website is not responsible for any consequences arising from the use of this content.