International Journal of Theoretical Physics

, Volume 53, Issue 11, pp 3829–3837 | Cite as

Single-Photon Secure Quantum Dialogue Protocol Without Information Leakage

  • Nan-Run Zhou
  • Tian-Xiang Hua
  • Gui-Tong Wu
  • Chao-Sheng He
  • Ye Zhang


Combining the idea of ping-pong protocol with Controlled-NOT operation, we propose a secure quantum dialogue protocol based on single-photonss. Bob obtains the information of the encrypted quantum state by performing Controlled-NOT operation on the auxiliary particle and the encrypted single-photonss. Unlike the previous quantum dialogue protocols based on single-photonss, the proposed protocol not only overcomes information leakage but also possesses an acceptable efficiency.


Quantum dialogue Single-photon preparation Unitary transformation Controlled-NOT operation 



This work is supported by the National Natural Science Foundation of China (grant no. 10647133), the Natural Science Foundation of Jiangxi Province, China (grant no. 20122BAB201031), the Foundation for Young Scientists of Jiangxi Province (Jinggang Star) (grant no. 20122BCB23002), the Research Foundation of the Education Department of Jiangxi Province (grant nos. GJJ14138 and GJJ13057), the Open Project of Key Laboratory of Photoeletronics & Telecommunication of Jiangxi Province (grant no. 2013003), and the Innovation Project of Jiangxi Graduate Education (grant no. YC2012-S009).


  1. 1.
    Beige, A., Englert, B. G., Kurtsiefer, C., et al.: Secure communication with single-photons two-qubit states. J. Phys. A-Math. Gen. 35(28), 407–413 (2002)MathSciNetCrossRefADSGoogle Scholar
  2. 2.
    Bostrom, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 1879021–4 (2002)CrossRefGoogle Scholar
  3. 3.
    Deng, F G., Long, G L. , Liu, X. S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 423171–6 (2003)Google Scholar
  4. 4.
    Zhou, NR., Huang, P., Liu, Y., et al.: Information-theory analysis for a two-step quantum secure direct communication protocol. Acta Sin. Quantum Opt. 14(4), 388–393 (2008)Google Scholar
  5. 5.
    Yi, X J., Nie, Y. Y., Zhou, N. R.: Secure direct communication based on non-orthogonal entangled pairs and local measurement. Int. J. Theor. Phys. 47(12), 3401–3407 (2008)CrossRefMATHGoogle Scholar
  6. 6.
    Yi, X. J., Nie, Y. Y., Zhou, N. R., et al.: Quantum secure direct communication using entangled photon pairs and local measurement. Commun. Theor. Phys. 50(1), 81–84 (2008)MathSciNetCrossRefADSGoogle Scholar
  7. 7.
    Li, Y., Zeng, G. H., Yao, W. L., et al.: Efficient quantum secure communication scheme with one-time pad. Opt. Rev. 16(3), 229–232 (2009)CrossRefGoogle Scholar
  8. 8.
    Chong, S. K., Hwang T.: The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairs. Opt. Commun. 284(1), 515–518 (2011)CrossRefADSGoogle Scholar
  9. 9.
    Yang, C. W., Tsai, C. W., Hwang, T.: Fault tolerant two-step quantum secure direct communication protocol against collective noises. Sci. Chin. Phys. Mechanics & Astronomy 54(3), 496–501 (2011)CrossRefADSGoogle Scholar
  10. 10.
    Gu, B., Zhang, C. Y., Cheng, G. S.: Robust quantum secure direct communication with a quantum one-time pad over a collective-noise channel. Sci. Chin. Phys. Mechanics & Astronomy 54(5), 942–947 (2011)CrossRefADSGoogle Scholar
  11. 11.
    Huang, W., Wen, Q. Y., Jia, H. Y.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 21(10), 100–308 (2012)Google Scholar
  12. 12.
    Nguyen, B. A.: Quantum dialogue. Phys. Lett. A 328(1), 6–10 (2004)MathSciNetCrossRefMATHADSGoogle Scholar
  13. 13.
    Ji, X., Zhang, S.: Secure quantum dialogue based on single-photons. Chin. Phys. 15(7), 1418–1420 (2006)CrossRefADSGoogle Scholar
  14. 14.
    Yang, Y. G., Wen, Q. Y.: Quasi-secure quantum dialogue using single photons. Sci. China Ser. G-Physics Mechanics & Astronomy 50(5), 558–562 (2007)CrossRefADSGoogle Scholar
  15. 15.
    Ji, Xin., Jin, X. R., Zhang, Y. Q., et al.: Quantum dialogue by using single photons. Acta Sin. Quantum Opt. 14(3), 273–276 (2008)Google Scholar
  16. 16.
    Shi, G. F., Xi, X. Q., Hu, M. L., Yue, R. H.: Quantum secure dialogue by using single photons. Opt. Commun. 283(9), 1984–1986 (2010)CrossRefADSGoogle Scholar
  17. 17.
    Gao, F., Guo, F. Z., Wen, Q. Y., et al.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China G-Physics Mechanics & Astronomy 51(5), 559–566 (2008)CrossRefADSGoogle Scholar
  18. 18.
    Zhou, N. R., Wu, G. T., Gong, L. H., et al.: Secure quantum dialogue protocol based on W states without information leakage. Int. J. Theor. Phys. 52(9), 3201–3211 (2013)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Shen, D S, Ma, W P, Yin, X R: Quantum dialogue with authentication based on Bell states. Int. J. Theor. Phys. 52(6), 1825–1835 (2013)MathSciNetCrossRefMATHGoogle Scholar
  20. 20.
    Yang, C. W., Hwang, T.: Quantum dialogue protocols immune to collective noise. Quantum Inf. Process 12(6), 2131–2142 (2013)MathSciNetCrossRefMATHADSGoogle Scholar
  21. 21.
    Shukla, C., Kothari, V., Banerjee, A., et al.: On the group-theoretic structure of a class of quantum dialogue protocols. Phys. Lett. A 377(7), 518–527 (2013)MathSciNetCrossRefADSGoogle Scholar
  22. 22.
    Gao, G: Two quantum dialogue protocols without information leakage. Opt. Commun. 283(10), 2283–2293 (2010)CrossRefADSGoogle Scholar
  23. 23.
    Shi, G. F.: Bidirectional quantum secure communication scheme based on Bell states and auxiliary particles. Opt. Commun. 283(24), 5275–5278 (2010)CrossRefADSGoogle Scholar
  24. 24.
    Gao, G., Fang, M., Wang, Y.: A ping-pong quantum dialogue scheme using genuine four-particle entangled states. Int. J. Theor. Phys. 50(10), 3089–3095 (2011)MathSciNetCrossRefMATHGoogle Scholar
  25. 25.
    Ye, T. Y., Jiang, L. Z.: Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state. Phys. Scr. 89(1), 015–103 (2014)CrossRefGoogle Scholar
  26. 26.
    Wang, H., Zhang, Y. Q., Hu, Y. P.: Efficient quantum dialogue by using the two-qutrit entangled states without information leakage. Int. J. Theor. Phys. 52(6), 1745–1750 (2013)MathSciNetCrossRefGoogle Scholar
  27. 27.
    Wang, H., Zhang, Y. Q., Hu, Y. P., et al.: Two quantum dialogue schemes based on Bell states and two-qutrit entangled states without information leakage. J. Natl. Univ. Def. Technol. 34(2), 10–13 (2012)MathSciNetGoogle Scholar
  28. 28.
    Li, C. Y., Zhou, H. Y., Wang, Y.: Secure quantum key distribution network with Bell states and local unitary operations. Chin. Phys. Lett. 22(5), 1049–1052 (2005)MathSciNetCrossRefADSGoogle Scholar
  29. 29.
    Cai, Q. Y., Li, B. W.: Deterministic secure without using entanglement. Chin. Phys. Lett. 21(4), 601–603 (2004)CrossRefADSGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Nan-Run Zhou
    • 1
    • 2
  • Tian-Xiang Hua
    • 1
  • Gui-Tong Wu
    • 1
  • Chao-Sheng He
    • 3
  • Ye Zhang
    • 1
  1. 1.Department of Electronic Information EngineeringNanchang UniversityNanchangChina
  2. 2.Key Laboratory of Photoeletronics & Telecommunication of Jiangxi ProvinceNanchangChina
  3. 3.Section of Management Teaching and ResearchNanchang Military AcademyNanchangChina

Personalised recommendations