Abstract
Due to the discovery of Shor’s algorithm1, many classical crypto-systems based on the hardness of solving discrete log and factoring problem are theoretically broken in the presence of quantum computers. This means that some of the classical secret communication protocols are no longer secure and hence motivate us to find other secure crypto-systems. In this paper, we present a new quantum communication protocol which allows two parties, Alice and Bob, to exchange classical messages securely. Eavesdroppers are not able to decrypt the secret messages and will be detected if they do exist. Unlike classical crypto-systems, the security of this protocol is not based on the hardness of any unproven mathematic or algorithmic problem. Instead, it is based on the laws of nature.
Chapter PDF
Similar content being viewed by others
Reference
P. Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceeding of the 35th Annual IEEE Symposium on the Foundations of Computer Science, 124–134(1994).
R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. (2) 21, pp. 120–126(1978).
W. Diffie, and M. E. Hellman, Multiuser Cryptogrphic Techniques, Proceeding of AFIPS National Computer Conference, 644–654 (1976).
C. Bennett, and G. Brassard, Quantum Cryptography: Public Key Distribution and Coin Tossing, Proceedings of IEEE International Conference on Computers Systems and Signal Processing, 175–179 (1984).
A. K. Ekert., Quantum Cryptography based on Bell’s theorem, Phys. Rev. Lett 67(6), 661–663(1991).
C. Bennett, Quantum Cryptography: Uncertainty in the Service of Privacy, Science 257, 752–3 (1992).
K. Bostrom, and T. Felbinger, Deterministic Secure Direct Communication using Entanglement, Phys Rev Lett. 2002 Oct 28;89(18): 187902.
Qing-Yu Cai, Deterministic Secure Direct Communication using Ping-Pong Protocol without Public Channel, http://xxx.lanl.gov/abs/quantph/0301048.
Qing-Yu Cai, Deterministic secure communication protocol without using entanglement, Chin. Phys. Lett, 21(4),601 (2004).
Z. Zhao, T. Yang, Z.-B. Chen, J.-F. Du, and J.-W. Pan, Deterministic and highly efficient quantum cryptography with entangled photon pairs, Phys. Rev. Lett., http://xxx.lanl.gov/abs/quant-ph/0211098.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Tsai, IM., Yu, CM., Tu, WT., Kuo, SY. (2005). A Secure Quantum Communication Protocol Using Insecure Public Channels. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_8
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)