Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32727
Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova


In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: Quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 883


[1] G. Long, F. Deng, C. Wang, X. Li, K. Wen, and W. Wang, Quantum secure direct communication and deterministic secure quantum communication, Front. Phys., 2, 25, Springer, 2007.
[2] C. H. Bennett and S. J. Wiesner, Communication via One- and Two-Particle Operators on Einstein-Podolsky-Rosen States, Phys. Rev. Lett., 69, 2881, American Physical Society, 1992.
[3] F. G. Deng, G. L. Long, and X. S. Liu, Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block, Phys. Rev. A, 68, 042317, American Physical Society, 2003.
[4] C. Wang, F. Deng, Y. Li, X. Liu, and G. Long, Quantum secure direct communication with high-dimension quantum superdense coding, Phys. Rev. A, 71, 044305, American Physical Society, 2005.
[5] F. G. Deng and G. L. Long, Secure direct communication with a quantum one-time pad, Phys. Rev. A, 69, 052319, American Physical Society, 2004.
[6] A. Banerjee and A. Pathak, Maximally efficient protocols for direct secure quantum communication, Phys. Lett. A, 376, 2944, Elsevier, 2012.
[7] C. W. Tsai, C. R. Hsieh, and T. Hwang, Dense coding using cluster states and its application on deterministic secure quantum communication, Eur. Phys. J. D, 61, 783, Springer, 2011.
[8] D. oy, S. Surendran, and M. Sabir, Efficient Deterministic Secure Quantum Communication protocols using multipartite entangled states, Quantum Inf Process, 16, 157, Springer, 2017.
[9] F. Yan and X. Zhang, A scheme for secure direct communication using EPR pairs and teleportation, Euro. Phys. J. B, 41, 7578, Springer, 2004.
[10] A. Cabello, Quantum Key Distribution in the Holevo Limit, Phys. Rev. Lett., 85, 5635, American Physical Society, 2000.
[11] Z. Cao, D. Song, J. Peng, C. He, and J. Feng, High Security Quantum Secure Direct Communication Protocol Based on Three - particle GHZ States, Proceedings of the 17th IEEE International Conference on Nanotechnology, USA, pp. 40-43, 25-28 July 2017.