A scheme for quantum communication using EPR pairs and local measurement Feng-Li Yan 1,2, Ting Gao 1,3,4 1 CCAST (World Laboratory), P.O. Box 8730, Beijing 100080, China 2 College of Physics, Hebei Normal University, Shijiazhuang 050016, China 3 College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050016, China 4 Department of Mathematics, Capital Normal University, Beijing 100037, China We present a scheme for quantum communication, where a set of EPR pairs, initially shared by thesenderAliceandthereceiverBob,functionsasaquantumchannel. Afterinsuringthesafety of thequantumchannel,AliceapplieslocalmeasurementonherparticlesoftheEPRpairsandinforms Bob the encoding classical information publicly. According to Alice’s classical information and his measurementoutcomesontheEPRpairsBobcaninferthesecretmessagesdirectly. Inthisscheme, 5 totransmitonebitsecretmessage,thesenderAliceonlyneedstosendonebitclassical information 0 tothereceiverBob. Wealsoshowthatthisschemeiscompletelysecureifperfect quantumchannel 0 is used. 2 PACSnumbers: 03.67.Dd,03.67.Hk n a J I. INTRODUCTION with a quantum one-time-pad[25]. However,in allthese 2 secure direct communication schemes it is necessary to 1 Cryptographyistheartofenablingtwopartiestocom- send the qubits with secret messages in the public chan- 1 nel. Therefore a potential eavesdropper,Eve, can attack municateinprivate. Itplaysanincreasingimportantrole v thequbitsintransmission. Inordertopreventthequbits inthewholeworld. Beforetransmittingtheirsecretmes- 5 transmittedinthepublicchannel,wesuggestedascheme sages the two distant parties must distribute secret key 5 for secure direct communicationbetween Alice and Bob, 0 first. As it is unsafe to distribute secret key through a using EPR pairs and teleportation [26], and two quan- 1 classical channel, people have paid a lot of attention to tumsecuredirectcommunicationprotocols,one byEPR 0 quantum key distribution, the most advanced applica- 5 tion of the principles of quantum mechanics such as the pairsandentanglementswapping[27]andtheotherwith 0 GHZ states and entanglement swapping [28]. Gao et al. uncertainty principle and quantum correlations. Quan- / provided two schemes for controlled and secure direct h tum key distribution or quantum cryptography provides communication using three-particle entangled state and p a secure way for two remote parties, say Alice and Bob, - to create a randomly binary string that can be used as teleportation [29, 30]. Since there is not a transmission t of the qubits carrying the secret messages between two n a secret key with which they can communicate securely a communication parties in the public channel, they are usingVernamone-timepadcrypto-system. In1984,Ben- u secure for direct secret communication if perfect quan- nettandBrassardpresentedthefirstquantumcryptogra- q tum channel is used. In the protocol of Ref. [26], for : phy,BB84protocol[1]. Ekertproposedanotherquantum v transmitting one bit secret message, Alice have to send key distribution scheme depending on the correlation of i two bits classical information to Bob, because the Bell X Einstein-Podolsky-Rosen(EPR) pair, the maximally en- measurement would produce four random outcomes, so tangledstateoftwoparticlesin1991[2]. AfterwardBen- r it would waste the classical information resource. a nett also put forward a quantum cryptography scheme In this paper, we would like to improve the quantum known as B92 protocol [3]. Up to now, there have al- communication scheme stated in Ref. [26] and give a readybeenalotofworksinquantumkeydistributionon simpler but more economical one. In the new quantum both theoretical and experimental aspects [4 - 18]. communication scheme Alice only requires to send one Recently, novel quantum secure direct communication bit classical information to Bob for her to transmit one protocols were proposed by Shimizu and Imoto [19, 20] bit secret message. and Beige et al. [21]. In these protocols, the two parties communicate important messages directly without first establishinga sharedsecretkeyto encryptthem andthe messagesaredeterministicallysentthroughthequantum II. SCHEME FOR QUANTUM channel, but can only be decoded after a final transmis- COMMUNICATION sion of classical information. A direct communication scheme, the ”ping pong protocol” which is insecure if We suppose that the two communicationparties Alice it is operated in a noisy quantum channel, as indicated and Bob share a set of EPR pairs, the maximally entan- by W´ojcik [22], was put forward by Bostr¨om and Fel- gled pair in the Bell state binger [23]. More recently Deng et al. gave a two-step quantum direct communication scheme using EPR pair 1 Φ+ = (00 + 11 ). (1) block [24] and a secure direct communication protocol | iAB √2 | iAB | iAB 2 As a matter of fact, there are many different ways for in preparing EPR pair, and makes the quantum channel Alice and Bob to obtain these EPR pairs. For instance, in the following entangled state AlicemakesthepairsfirstthensendshalfofeachtoBob. Or a sever could prepare the pairs and then send half of 1 Ψ = (000 + 111 ), (2) ABE ABE ABE eachtoAliceandBob. Inordertomakesureofthepurity | i √2 | i | i of EPR pairs, Alice and Bob must do some tests. They can use the schemes testing the security of EPR pairs thensheisinthesamepositionwiththelegitimateparty (quantum channel) in Refs.[2, 4, 13, 24, 26]. Passing the Bob. But this case can be ruled out after Alice and Bob test insures that they continue to hold sufficiently pure, checktheEPRpairsbymeansoftheirlocalmeasurement entangled quantum states. However, if tampering has inthebasis 0 , 1 orbasis 1 (0 + 1 ), 1 (0 1 ) {| i | i} {√2 | i | i √2 | i−| i } occurred, they discard these EPR pairs and construct randomly and comparing their measurement results as new EPR pairs again. stated in Ref. [26]. If Eve uses so called entanglement In virtue of these pure EPR pairs, Alice and Bob can pairmethodtoobtaininformation,shewillalsobefound start their quantum communication. Suppose that Al- byAliceandBob’stest,whichwasshowninRef. [26]. So ice wishes to communicate to Bob. First Alice makes inanycase,aslongasaneavesdropperexists,shewillbe the local measurement on her particle A in the basis foundandwecanrealizesecurequantumcommunication. 0 A, 1 A . Alice and Bob agreeonthat if Alice’s mea- III. SUMMARY {| i | i } surement outcome is the same with the secret message to be transmitted, then Alice sends classicalinformation We give a scheme for quantum communication. The 0 to Bob, otherwise she sends classical information 1 to communication is based on EPR pairs functioning as Bob. Forexample,ifAlicewantstosendBobsecretmes- quantum channel and local measurement. After insur- sage 0100100 and Alice’s measurement outcomes on the ing the safety of the quantum channel, Alice and Bob sevenEPRpairsarethestates 0 , 1 , 1 , 0 , 0 , 0 , 1 , | i | i | i | i | i | i | i apply local measurement on the EPR pairs and Alice thenAlicetransferstheclassicalinformation0010101via broadcasts encoding classical information publicly. Ac- classical public channel to Bob. Bob applies local mea- cording to the broadcast classical information and his surement on his qubits B of the EPR pairs in the ba- measurement outcomes on the EPR pairs Bob can infer sis 0 , 1 . Clearly, he must obtain the same re- {| iB | iB} the secret messages directly. On one hand, transmitting sults 0 , 1 , 1 , 0 , 0 , 0 , 1 asAlice. Accordingtohis | i | i | i | i | i | i | i one bit secret message only needs transmitting one bit measurementresults and the classicalinformation he re- classical information, on the other hand, there is not a ceived, Bob can infer the secret message 0100100 that transmission of the qubit which carries the secret mes- Alice wants to transmit to him. sage between Alice and Bob, neither the communication It is clear that in our scheme the classicalinformation can be interrupted by Eve, nor the secret information resourceis savedonsince one bit classicalinformation is is leaked to Eve. Therefore our new protocol has high only wanted to transmit one bit secret message. capacity and defends signal against interference. Evidently, the security of this protocol is only deter- mined by the quantum channel. In fact a perfect quan- tum channel can be achieved by using the schemes test- Acknowledgments ing the security of EPR pairs. Therefore this scheme for quantumcommunicationusingEPRpairsandlocalmea- surementis absolutely reliable,deterministic andsecure. This work was supported by Hebei Natural Science As mentionedinRef. [26],Evecanobtaininformation FoundationofChina under GrantNo: A2004000141and if the quantum channel is not the perfect EPR pairs. Key Natural Science Foundation of Hebei Normal Uni- For example if Eve couples EPR pair with her probe versity. [1] C.H.BennettandG.Brassard,Proc.IEEEInt.Conf.on A 51, 1863 (1995). Computers, Systems and Signal Processing, Bangalore, [8] M. Koashi and N. Imoto, Phys. Rev. Lett. 79, 2383 India,(IEEE, NewYork, 1984), pp.175-179. (1997). [2] A.K. Ekert,Phys. Rev.Lett. 67, 661 (1991). [9] D. Bruß, Phys. Rev.Lett. 81, 3018 (1998). [3] C. H. Bennett,Phys. Rev.Lett. 68, 3121 (1992). [10] W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A [4] C. H. Bennett, G. Brassard, and N. D. Mermin, Phys. 244, 489 (1998). Rev.Lett. 68, 557 (1992). [11] A. Cabello, Phys.Rev.Lett. 85, 5635 (2000). [5] C. H. Bennett and S. J. Wiesner, Phys. Rev. Lett. 69, [12] A. Cabello, Phys.Rev.A 61, 052312 (2000). 2881 (1992). [13] G. L. Long and X. S. Liu, Phys. Rev. A 65, 032302 [6] L.GoldenbergandL.Vaidman,Phys.Rev.Lett.75,1239 (2002). (1995). [14] P.Xue,C.F.Li,andG.C.Guo,Phys.Rev.A65,022317 [7] B. Huttner,N.Imoto, N. Gisin, and T. Mor, Phys.Rev. (2002). 3 [15] S.J.D.Phoenix,S.M.Barnett,P.D.Townsend,andK. 042317 (2003). J. Blow, J. Modern Optics42, 1155 (1995). [25] F. G. Deng and G. L. Long, Phys. Rev. A 69, 052319 [16] D.Song, Phys. Rev.A 69, 034301 (2004). (2004). [17] X.B. Wang,Phys. Rev.Lett. 92, 077902 (2004). [26] F. L. Yan and X. Q. Zhang, Euro. Phys. J. B 41, 75 [18] M. Hillery, V. Buˇzek, and A. Berthiaume, Phys. Rev. A (2004). 59, 1829 (1999). [27] T. Gao, F. L. Yan, and Z. X. Wang, arXiv: [19] K.Shimizu and N. Imoto, Phys.Rev. A 60, 157 (1999). quant-ph/0406082 [20] K. Shimizu and N. Imoto, Phys. Rev. A 62, 054303 [28] T. Gao, F. L. Yan, and Z. X. Wang, Nuovo Cimento B (2000). 119, 313 (2004). [21] A.Beige et al, Acta Phys.Pol. A 101, 357 (2002). [29] T. Gao, Z. Naturforsch 59a, 597 (2004). [22] A.W´ojcik, Phys.Rev. Lett. 90, 157901 (2003). [30] T. Gao, F. L. Yan, and Z. X. Wang, arXiv: [23] K. Bostr¨om and T. Felbinger, Phys. Rev. Lett. 89, quant-ph/0403155 187902 (2002). [24] F.G.Deng,G.L.Long,andX.S.Liu,Phys.Rev.A68,