| Literature DB >> 26577473 |
Ahmed Farouk1,2, Magdy Zakaria2, Adel Megahed3, Fatma A Omara4.
Abstract
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.Entities:
Year: 2015 PMID: 26577473 PMCID: PMC4649760 DOI: 10.1038/srep16080
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Correlation between Received Classical Value and its Corresponding Unitary, GHZ Transformations and Quantum Bit Transformation Correlation during the Communication Process between Two Disjoint Users with Partial Cooperation of Quantum Server.
| Value | First Bit | Second Bit | GHZ Transformation | |
|---|---|---|---|---|
| 0 | 0 | 0 | ||
| 1 | 0 | 1 | ||
| 2 | 1 | 0 | ||
| 3 | 1 | 1 |
Correlation between Received Classical Value and its Corresponding Unitary, GHZ Transformations and Quantum Bit Transformation Correlation during the Communication Process between Two Disjoint Users with Full Cooperation of Quantum Server.
| Value | First Bit | Second Bit | GHZ Transformation | |
|---|---|---|---|---|
| 0 | 0 | 0 | ||
| 1 | 0 | 1 | ||
| 2 | 1 | 0 | ||
| 3 | 1 | 1 |
Correlation between Received Classical Value and its Corresponding Unitary, GHZ Transformations and Quantum Bit Transformation Correlation during the Communication Process among Three Disjoint Users with Partial Cooperation of Quantum Server.
| Value | GHZ Transformation | ||||
|---|---|---|---|---|---|
| 0 | 0 | 0 | 0 | ||
| 1 | 0 | 0 | 1 | ||
| 2 | 0 | 1 | 0 | ||
| 3 | 0 | 1 | 1 | ||
| 4 | 1 | 0 | 0 | ||
| 5 | 1 | 0 | 1 | ||
| 6 | 1 | 1 | 0 | ||
| 7 | 1 | 1 | 1 | ||
Correlation between Received Classical Value and its Corresponding Unitary, GHZ Transformations and Quantum Bit Transformation Correlation during the Communication Process among Three Disjoint Users with Full Cooperation of Quantum Server.
| Value | GHZ Transformation | ||||
|---|---|---|---|---|---|
| 0 | 0 | 0 | 0 | ||
| 1 | 0 | 0 | 1 | ||
| 2 | 0 | 1 | 0 | ||
| 3 | 0 | 1 | 1 | ||
| 4 | 1 | 0 | 0 | ||
| 5 | 1 | 0 | 1 | ||
| 6 | 1 | 1 | 0 | ||
| 7 | 1 | 1 | 1 | ||
Figure 1Generation of GHZ States based on Einstein Podolsky-Rosen (EPR) “drawn by A.F”.
Correlation between Quantum Server Publication, Receiver Measurement, Sender (s) Operation(s) and Sent Bits during partial cooperation process between Two Disjoint Users.
| 00 | |||
| 01 | |||
| 10 | |||
| 11 | |||
| 00 | |||
| 01 | |||
| 10 | |||
| 11 |
(C, D) shows an illustrative example for transmitting a message 100111 from u to u with partial and full support of quantum server respectively.
Correlation between Quantum Server Publication, Receiver Measurement, Sender (s) Operation(s) and Sent Bits during partial cooperation process among Three Disjoint Users.
| Quantum ServerPublication | SentBits | SentBits | Message Sent | |||
|---|---|---|---|---|---|---|
| 00 | 0 | 000 | ||||
| 00 | 1 | 001 | ||||
| 01 | 0 | 010 | ||||
| 01 | 1 | 011 | ||||
| 10 | 0 | 100 | ||||
| 10 | 1 | 101 | ||||
| 11 | 0 | 110 | ||||
| 11 | 1 | 111 | ||||
| 00 | 0 | 000 | ||||
| 00 | 1 | 001 | ||||
| 01 | 0 | 010 | ||||
| 01 | 1 | 011 | ||||
| 10 | 0 | 100 | ||||
| 10 | 1 | 101 | ||||
| 11 | 0 | 110 | ||||
| 11 | 1 | 111 |
An illustrative example for transmitting a message 100111 from u to u with partial support of quantum server.
| 10 | 01 | 11 | |
| + | + | − | |
| 10 | 01 | 11 |
An illustrative example for transmitting a message 100111 from u to u with full support of quantum server.
| 10 | 01 | 11 | |
| + | + | − | |
| 10 | 01 | 11 |
Figure 2Two- Way Channel Substitution Fraudulent Attack Security Analysis.
(A) The correlation between the joint information and the minimum discovering probability Total. (B) Correlation between Maximized Total Estimation Probability and the minimum discovering probability Total. (C) Relation between , N = [2, 4, 8, 16] and Total = [0, 12.5, 25, 50]%. (D) Relation between and N while = [12.5, 25, 37.5, 50]% and . (E) As Fig. 2D while . (F) Combined Fig. 2C,D while = [62.5, 75, 87.5]%. “drawn by A.F”.
Figure 3Combined Fig. 2C–F “drawn by A.F”.
Figure 4(A) Generalization of Communication Process between N Disjoint Users with Partial Cooperation of Quantum Server (B) with Full Cooperation of Quantum Server “drawn by A.F”.