• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States

    2019-03-18 08:15:46GangXuKeXiaoZongpengLiXinXinNiuandMichaelRyan
    Computers Materials&Continua 2019年3期

    Gang Xu ,Ke Xiao ,Zongpeng Li,Xin-Xin Niu and Michael Ryan

    Abstract:In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack and disentanglement attack.Then,by changing the party of the preparation of cluster states and using unitary operations,we present an improved protocol which can avoid these two kinds of attacks.Moreover,the protocol is proposed using the three-qubit partially entangled set of states.It is more efficient by only using three particles rather than four or even more to transmit one bit secret information.Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource,it makes this protocol more convenient from an applied point of view.

    Keywords:Controlled secure direct communication,cluster state,three-qubit partially entangled state,entanglement swapping.

    1 Introduction

    Since the Bennett and Brassard’s original article [Bennett and Brassard (1984)] was published,quantum key distribution (QKD) has an approach using quantum mechanics[Jiang,Jiang and Ling (2014)] principles for the participants of communication to share a private key with unconditional security.

    With the development of quantum cryptography [Wei,Chen,Niu et al.(2015)] and network communication,security of communication is widely concerned [Chen,Tang,Xu et al.(2018); Chen,Sun,Xu et al.(2017); Xu,Chen,Li et al.(2015); Xu,Chen,Dou et al.(2015); Xu,Chen,Dou et al.(2016)].Different from QKD,quantum secure direct communication (QSDC) is another field of quantum cryptography.In 2002,Bostr? m and Felbinger presented a ping-pong QSDC protocol using Einstein-Podolsky-Rosen (EPR)state [Bostr? m and Felbinger (2002)].After that,a series of QSDC protocols [Deng and Long (2004); Wang,Deng,Li et al.(2005); Wang,Fang and Tane (2006); Cao,Yang and Wen (2010)] have been proposed.

    Recently,the controlled quantum secure direct communication (CQSDC),a new kind of QSDC,has been proposed and has attracted much attention [Chen,Wang,Du et al.(2008); Chen,Wen,Guo et al.(2008); Gao,Yan and Wang (2005); Xia and Song (2007);Wang,Zhang and Tang (2006); Xia,Song and Song (2008); Zhang,Zhan and Zhang(2009); Chang,Lin,Zeng et al.(2012); Hassanpour and Houshmand (2015); Fang(2014)].In CQSDC scheme,the receiver cannot get any secret information without the controller’s admission.Besides that,if the number of controllers,senders or receivers is more than one,the protocol could also be deemed as a network protocol [Lu,Wang and Wang (2012); Lv and Wang (2017); Pang,Liu,Zhou et al.(2017); Li,Wang,Li et al.(2018); Li,Chen,Sun et al.(2016)].By using partially entangled GHZ state,Chen et al.[Chen,Wang,Du et al.(2008)] proposed a CQSDC protocol,whose aim is to share the private quantum entanglement keys to encrypt and decrypt the secret information.Using W state,Chen et al.[Chen,Wen,Guo et al.(2008)] proposed a novel CQSDC protocol in which entanglement swapping is utilized and the quantum circuit of it is also put forward.However,W state is difficult to prepare under the conditions of the experiment for multiqubit states.Chang et al.[Chang,Lin and Zeng (2012)] proposed a CQSDC protocol using single photons to carry dealer’s information.And they declared that if any eavesdropper wants to steal dealer’s information,the lawful participants will discover it and abort their transmission.Hassanpour et al.[Hassanpour and Houshmand (2015)]proposed a CQSDC protocol based on GHZ-like state.In their scheme,the receiver can obtain two-secret bits using entanglement swapping,which guarantees the security of the process.Fang [Fang (2014)] proposed a CQSDC protocol based on EPR pair entanglement swapping to complete the communication,five-particle cluster state is utilized in this protocol to achieve eavesdropping detection which makes the detection probability more than 88%.

    A secure CQSDC protocol must meet two needs.First,an outside eavesdropper cannot obtain any information about the transmitted state.Second,if the controller(s) doesn’t permit,the receiver cannot obtain the secret information.In 2009,Zhang et al.[Zhang,Zhan and Zhang (2009)] designed a CQSDC protocol (the ZZZ protocol) with four particle cluster states using swapping quantum entanglement and local unitary operations.However,Yang et al.[Yang,Chai,Teng et al.(2011)] shown that the dishonest party Bob can give a special attack strategy.By using fake entangled particles,Bob can obtain Alice’s secret information without the permission of the controller.Besides that,they gave a further improvement to resist their proposed attack.Then,Qin [Qin (2012)]analyzes the ZZZ protocol and found another special attack,disentanglement attack.Using this attack,the control function of Charlie in the ZZZ protocol [Zhang,Zhan and Zhang (2009)] can be eliminated by the receiver Bob without the knowledge of Charlie.In addition,this new attack is also valid for the improved scheme in Yang et al.’s protocol [Yang,Chai,Teng et al.(2011)].However,Qin did not propose a further improved protocol.In conclusion,no effective protocol is proposed at last.

    According to the above three papers,we further analyze the reasons why the ZZZ protocol cannot resist fake entangled particles attack and disentanglement attack.At last,we find out two reasons.On one hand,Bob prepares the four particle cluster states and he is the last one to measure his own particles in the detection of eavesdropping.Under this circumstance,he can prepare any state (fake entangled particles) which can be used to deceive Charlie,the controller,without being detected.On the other hand,he owns half particles of the four particle cluster states.And one of his two particles is equal to Alice’s particle and another is equal to Charlie’s.Then,Bob can measure the particle which is equal to Charlie’s and get rid of the control of Charlie (disentanglement attack).

    Considering these weaknesses,we investigate whether it is possible to make it secure by letting Charlie prepare the four particle cluster states and Alice be the last one to measure her particles.However,if we only change these of the protocol,it is still insecure under disentanglement attack.Thus,we can let Charlie perform some operations on the cluster states as secret information which is only known by him,and then Bob cannot use disentanglement attack to make Charlie out of the control of the communication.In summary,we propose a novel protocol with two versions of improvement in which the communication is secure under the above two attacks as well as some other attacks.What’s more,without the permission of the controller,the secret information cannot be recovered by the receiver or any other.

    Furthermore,based on three-qubit partially entangled set of states,we also investigate a new CQSDC protocol which has many distinct advantages compared with many previous protocols.First,our protocol uses less quantum resources to transmit the same information.In other words,the protocol [Chen,Wang,Du et al.(2008)] transmits one bit by using six particles,but in our protocol,one bit is transmitted only by using three particles.Second,our three-qubit partially entangled set of state is much easier to prepare than GHZ state in Wang et al.’s protocol [Wang,Zhang and Tang (2006)],W state [Xia,Song and Song (2008)] and four particle cluster state [Zhang,Zhan and Zhang (2009)].Third,our protocol uses less effective measurements than the ZZZ protocol.In some sense,our protocol has a lower cost than the ZZZ protocol.

    The rest of this paper is organized as follows.In Section 2,two new improved protocols are proposed.Then we analyze that our new improved protocol is secure under fake entangled particles attack and disentanglement attack.In Section 3,we give a new CQSDC protocol.Finally,the paper is ended up with a conclusion in Section 4.

    2 The new improved CQSDC protocol

    In this section,we propose a new improved CQSDC protocol which is secure under the fake entangled particles attack and disentanglement attack.In our improved protocol,it is Charlie rather than Bob who prepares four particle cluster states.In fact,Bob wants to remove Charlie’s control and obtain Alice’s secret freely.Yang et al.[Yang,Chai,Teng et al.(2011)] presented a fake entangled particles attack on the ZZZ protocol,in which Bob prepares two Bell states rather than a four-qubit cluster state.Then,Bob can obtain Alice’s secret information freely without Charlie’s control.And they also gave an improvement to resist their fake entangled particles attack.

    However,Qin [Qin (2012)] analyzed further and discovered another special attack,disentanglement attack.Using this attack,the control function of Charlie in the ZZZ protocol can be eliminated by the receiver Bob without the knowledge of Charlie.Moreover,this new attack is also valid for the improved scheme [Yang,Chai,Teng et al.(2011)].But to our disappointment,Qin did not give a further improvement.Therefore,in the next part,we will give two new improvements to the ZZZ protocol.

    2.1 Improvement for the ZZZ protocol

    2.1.1 The first improvement

    In this part,we will propose our first improvement of the ZZZ protocol.And we give a detailed description of our new improved protocol as follows.(S1) Charlie preparesN+mfour-qubit states inThen he performs one of four kinds of operationsU1,U2,U3,U4on particlestnandkn,each with the probability of 1/4,whereU1=I?I,U2=I?σx,U3=σx?IandU4=σx?σx.

    Therefore,he gets the following states

    Charlie takes the particleshnfrom each state to form an ordered particle sequence[h1,h2,...,hN+m],and names it as theHsequence.Similarly,the remaining particles constituteTsequence [t1,t2,...,tN+m],Ksequence [k1,k2,...,kN+m]andCsequence[c1,c2,...,cN+m].

    (S2) Charlie prepares three checking sequences,DH,DTandDKfor the analysis of the eavesdropping.These sequences are large enough.Let the number of particles in them bel.They are randomly chosen fromThen,Charlie minglesDHwithHsequence to getH′sequence,DTwithTsequence to getT′sequence andDKwithKsequence to getK′sequence.And he also makes a record of the insertion positions and the measurement basis of the checking particles.Finally,Charlie sendsH′sequence to Alice,T′,K′sequence to Bob and holdsCsequence.

    (S3) Charlie confirms that Alice and Bob have received the travelling particles.Then,Charlie let Alice and Bob measure checking particles inH′,T′andK′,respectively.After that,he tells Alice and Bob the positions and the corresponding basis ofDH,DTandDK.

    Alice and Bob measure their checking sequences with the corresponding basis announced by Charlie.Alice and Bob tell their measurement results to Charlie.Then,Charlie can determine the existence of the eavesdropping in the communication in accordance with Alice’s and Bob’s measurement results.If the error rate of the eavesdropping checking is higher than a set threshold,Charlie will restart the protocol.If not,they will carry out the next step.

    (S4) Also,Alice and Bob need to check whether the state is four particle cluster state or not.Alice randomly selectsmparticles from herHsequence and performs randomly one of the two unitary operationsU1′=IandU2′ =iσyon each selected particle.Then she asks Charlie randomly to measure his corresponding particles using one of two measurement basesandThen Charlie informs his measuring results of Alice and Bob.Additionally,he must inform Bob of what operations he has performed on Bob’s corresponding particles.According to Charlie’s public information,Bob can first do the same operations {U1,U2,U3,U4}on his particles and then take the Bell measurement orZ-basis on the corresponding particles and inform Alice of his measurement results.According to the measurement results of Bob and Charlie,Alice measures her particles and can determine whether the state is four particle cluster state or not.

    In fact,after Alice’sU1′orU2′operation and Bob’s one of four operations,the state(i=1,2,3,4)will change into

    If the error rate is higher than a set threshold,Alice can conclude that the states are not four-qubit cluster states and give up the communication.

    (S5) Suppose Alice wants to transmit secret information to Bob.After confirming the security checking,Alice takesMhset by way of two particles as encoding-decoding groups.Group 1 includes particlesh1andh2,group 2 includes particlesh3andh4etc.Afterward,Alice announces the encoding-decoding groups in theMhset.

    (S6) After that Alice’s announcement,Bob and Charlie form ordered encoding-decoding groups which consist of the corresponding particles inMt,Mkset andMcset,severally.

    (S7) Alice requires Charlie to perform a Hadamard operation on eachcnin order inMcset,and then Eqs.(1)-(4) will be transformed into the states

    And then,Charlie measures particlecnlike the ZZZ protocol.

    (S8) Charlie informs Bob of his measurement results and his operations on each particle in (S1).According to Charlie’s information,Bob performs the same operations on the particles in his hand,the rest steps are the same as the steps (S7-S9) of the ZZZ protocol.

    2.1.2 The second improvement

    Our second improvement of the ZZZ protocol is similar with the first improvement.And we give a detailed description of our second improved protocol as follows.

    (S1’) Charlie preparesN+mfour-qubit states inThen he performs one of four kinds of operationsU1,U2,U3,U4on particlestnandkn,each with the probability of 1/4,whereU1=I?σz,U2=I?iσy,U3=σx?IandU4=σx?σx.

    Therefore,he gets the following states

    Charlie takes the particleshnfrom each state to form an ordered particle sequence[h1,h2,...,hN+m],and names it as theHsequence.Similarly,the remaining particles composeTsequence [t1,t2,...,tN+m],Ksequence [k1,k2,...,kN+m]andCsequence [c1,c2,...,cN+m].

    (S2’)-(S6’) are the same as the steps (S2-S6) of the first improvement.

    (S7’) Alice requires Charlie to perform a Hadamard operation on eachcnin order inMcset,and then Eqs.(11)-(14) will be turned into

    And then,Charlie measures particlecnlike the ZZZ protocol and tells Alice and Bob his measurement results.

    (S8’) Alice and Bob utilize the local operationUnm(n,m=0,1)to encode secret information.Here,U00=I,U01=σx,U10=-iσyandU11=σz.For convenience,let two cbit strings 00,01,10 and 11 correspond to them,severally.Alice uses local operationUnmto encode two-bit on the encoding-decoding groups inMcset.Later,

    Alice measures all the encoding-decoding groups with Bell bases and announces measurement results and the order of the encoding-decoding groups.

    (S9’) Bob makes the Bell measurements on their corresponding particles inMtandMkset,separately.As shown in Tab.1,Bob can obtain Alice’s secret information when he receives Charlie’s and Alice’s measurement results.For example,suppose that Charlie’s state is | Ψ2〉2and his measurement results are | 0〉c1and | 0〉c2,then | Ψ2〉1and | Ψ2〉2will be collapsed into

    If Alice performs aU00operation on one particle of group 1,the state composed of particles (h1t1k1;h2t2k2)is

    But there is one more point that we need to notice,that is,the Eq.(12) of the ZZZ protocol is written wrong,and it should be written as follows.

    Table1:Alice’s and Bob’s measurement results according to the unitary operation Unm and the initial states

    2.3 Security analysis

    Mathematics provides some important tools [Dong,Zhang,Zhang et al.(2014)] to analyze and solve practical problems.The security of our protocol could be proved in theory and by mathematics.In this section,we will show that our protocol is secure under fake entangled particles attack and disentanglement attack which the original ZZZ protocol cannot resist.

    Case1:The fake entangled particles attack.In our new proposed CQSDC protocol,it is Charlie rather than Bob who prepares the four particle cluster state,so it is impossible for Bob to prepare two Bell states in Yang et al.’s protocol [Yang,Chai,Teng et al.(2011)] to deliver fake entangled particles attack on Charlie.That is to say,Bob cannot prepare fake entangled particles to deceive Charlie with the attempt of getting rid of control of Charlie.However,chances are that Charlie may prepare two entangled states instead of four particle cluster state to obtain Alice secret information.In this condition,Charlie sends one entangled state to Bob and shares one entangled state with Alice.But in the check of four particle cluster state,Alice and Bob can conclude that error rate is higher than a set threshold.For Charlie does not know Alice’s operations,he can guess wrong with the possibility of 1/2.And there aremCluster states,therefore he has the possibility of to guess all right,which is impossible whenmis large enough.

    Case2:The disentanglement attack.As Qin [Qin (2012)] has pointed out,if Bob wants to get rid of Charlie’s control,he can measure every particle inKsequence usingbasis.However,in our protocol,Charlie performs four kinds of unitary operations.In our first improvement,if Bob measuresKsequence,then he will not know what the state collapses into.If the state isit can be rewritten as follows.

    When Bob’s measurement outcome isthe cluster state after the measurement immediately collapses into

    Otherwise,the state collapses intoAnd if the state isthe result will be different from the stateWhen Bob’s measurement result isthe state collapses intoOtherwise,the state will collapse intoAnd the rest stateswe can see details in Tab.2.

    Table2:Correlations among Bob’s measurement results on K sequence,the states after Charlie’s operations and the collapsed states

    It is apparent that Bob cannot know what the state will collapse into after his measurement onKsequence.Therefore,he cannot get rid of Charlie’s control.In the second improvement,the four states can be rewritten as follows.

    And we can see,if Bob measures particleknbefore Charlie’s measurement,he cannot know what the state will collapse into.So,he can’t get rid of Charlie’s control.

    Case3:The out of control attack.Another attack strategy is that when the controller Charlie sendsHsequence to Alice,Bob intercepts it and then sends Alice another particle sequence which prepared by himself in order to get out of Charlie’s control.But in our protocol,Charlie inserts decoy particles randomly inHsequence in (S3),because Bob doesn’t know the exact position and the original state of the decoy particles,he cannot prepare the right fake sequence,so our protocol can resist this kind of attack.

    3 A New CQSDC protocol by using three-qubit partially entangled set of states

    Without respect to the security of the ZZZ protocol,there still exist another two disadvantages in it.First,it is not easy to obtain a four-particle cluster state in real experimental setups.Second,the efficiency of the protocol is not high,because it uses four particles to transmit one bit secret information.

    In this section,we will propose a new protocol by using the three-qubit partially entangled set of states.It is shown that our protocol can resist fake entangled particles attack and disentanglement attack.Moreover,our protocol uses three particles to transmit one bit secret information and three-qubit partially entangled states are also much easier to prepare.

    This section is organized as follows.Subsection 3.1 is a detailed description of our new protocol.And in Subsection 3.2,we give the security analysis of our new proposed CQSDC protocol.

    3.1 The process of new CQSDC protocol

    In 2013,Kumar et al.[Kumar,Adhikari,Banerjee et al.(2013)] pointed out that they can prepare three-qubit partially entangled set of states from the generalized GHZ states.In the beginning,we prepare GHZ states.

    A Hadamard operation is applied on the third-qubit of the GHZ state,and we will get the following state

    And we perform a CNOT operation on particles 2 and 3.Here,particle 3 is the control one and particle 2 is the target one.Finally,we obtain our communication channel

    Next,we depict our protocol in detail as follows.

    (S1) Charlie preparesN+mthree-qubit partially entangled states.

    Here,n∈ { 1,N+m},cn,anandbndenote the three particles of the partially entangled state.

    Charlie takes the particlescnfrom each state to form an ordered particle sequence[c1,c2,...,cN+m],and names it as theCsequence.Similarly,the remaining particles make upAsequence [a1,a2,...,aN+m]andBsequence [b1,b2,...,bN+m].(S2) Charlie prepares two checking sequences,DAandDBfor the analysis of the eavesdropping.These sequences are large enough.Let the number of particles in them bel.They are randomly chosen fromThen,Charlie minglesDAwithAsequence to getA′sequence andDBwithBsequence to getB′sequence.And he also makes a record of the insertion positions and the measurement basis of the checking particles.Finally Charlie sendsA′sequence to Alice,B′sequence to Bob and holdsCsequence.

    (S3) Alice and Bob confirm that they have received the travelling particles.Then,Charlie let Alice and Bob measure checking particles inA′andB′.He tells the positions and the corresponding basis ofDAto Alice andDBto Bob,respectively.

    Then,Alice and Bob measure their checking sequences with the corresponding basis announced by Charlie.After that,Alice and Bob notify Charlie of their measurement results.After that,Charlie can determine the existence of the eavesdropping in the communication according to Alice’s and Bob’s measurement results.If the error rate of is higher than a set threshold,Charlie will restart the protocol.Otherwise,they(S4) Alice and Bob check whether the state is the three-qubit partially entangled states or not.Alice asks Charlie to measure his particles usingZ-basis,and then he publishes his measurement results.Then Alice and Bob randomly choosempositions and measure their corresponding particles.That is,Bob measures his particles in using one of two set of measurement basisThen he informs his measurement basis and corresponding measurement results of Alice.According to Bob’s announcement,Alice chooses the same measurement basis and measures her particles.Then she can determine whether they have shared the three-qubit partially entangled states.Here,we must note that if Charlie only prepares Bell states and does not prepare the three-qubit partially entangled states,can our protocol work? The answer is yes.Because Charlie still controls the protocol.If he does not publish his classical bits,then Alice and Bob do not know what states they share.

    (S5) We suppose Alice wants to send some messages to Bob.In the (S4),if Charlie obtains the result0c,particles (an,bn)will collapse into

    Otherwise,particles (an,bn)will collapse into

    (S6) Alice and Bob use the local operationUnm(n,m=0,1)to encode secret information.Here,U00=I,U01=σx,U10=-iσy,andU11=σz.let two cbit strings 00,01,10 and 11 correspond to them,severally.

    Alice sets two particles as an encoding-decoding group,such as particlesa1anda2as group 1,particlesa3anda4as group 2,etc.,and Bob sets his encoding-decoding group too.

    Alice performs the operationUnmon the encoding-decoding groups to encode her two-bit secret information.Then,she uses Bell bases to measure all the encoding-decoding groups and announces her measurement results and the group’s order.(S7) Bob measures his encoding-decoding groups using Bell basis too.Subsequently,he can get Alice’s secret information after he knows Alice’s and Charlie’s measurement results.For example,we assume Charlie’s measurement results arethen Alice’s and Bob’s particles collapse into the state

    If Alice performsU00on one particle of group 1,then the state composed particles(a1b1;a2b2)is

    If Alice’s result of a Bell state measurement isit’s easy to conclude that Bob’s measurement result isThus,Bob can obtain that Alice performs a00Uoperation on one particle of group 1 and,therefore,extract the bits (00),and he can read the two-bit secret information.

    3.2 Security analysis

    In this section,we show our protocol is secure under some possible types of attacks as follows.

    Case1:The intercept-and-resend attack.In our protocol,the eavesdropper doesn’t know the exact position and the original state of the decoy particles,(e.g.,since these particles are randomly inserted in the transmitted sequences (for instance,H'sequence,T'sequence,K'sequence).Therefore,if the eavesdropper try to measure and resend the particles,the probability to be detected will be 1-(3/4)l.Here,ldenotes the number of decoy particles.Iflis large enough,the eavesdropping detection probability 1-(3/4)lis approximately 1.

    Case2:The entangle-and-measure attack.An eavesdropper Eve may try to obtain the secret information between Alice and Bob.However,he does not know the positions and the states of the checking particles in the intercepted Charlie’s sequenceH′.For instance,Eve prepares some ancillary particlesand entangles these ancillary particles with theH'sequence via a unitary operation.

    Case3:The fake entangled particles attack.Because we only use three-particle states as a communication channel and the controller Charlie prepares states,Bob cannot prepare two entangled states instead of the three-qubit partially entangled set of states.However,chances are that Charlie may prepare other states instead of three-qubit partially entangled state to obtain Alice secret information.Under this condition,Charlie may send one particle to Bob and shares one entangled state with Alice.But in the check of the three-qubit partially entangled state,Alice and Bob can conclude that error rate is higher than a set threshold.Charlie does not know Alice’s operations,so he can guess wrong with the possibility of 1/2.And there arementangled states,therefore he has the possibility of (1/2)mto guess all right,which is impossible whenmis large enough.Thus,fake entangled particles attack cannot work.

    Case4:The disentanglement attack.Each of the three parties (Alice,Bob and Charlie)only has one particle of the three-qubit partially entangled state,so Bob cannot measure his particles to get rid of the control of Charlie,which means,using disentanglement attack is not effective.For example,we assume Charlie prepares three-qubit partially entangled state in (13).

    After Bob measures his particles,if his measurement result isparticles (cn,an)will collapse into the state

    If his measurement results isparticleswill collapse into the state

    We can conclude that Bob’s particles are no longer entangled with Alice’s,and he cannot get any secret information from Alice.Thus,disentanglement attack is not effective in this condition.

    Case5:The modification attack.In this attack,the eavesdropper Eve may try to perform malicious modify operations on the particles which Charlie wants to send Alice or Bob.However,Charlie doesn’t know the positions of the decoy particles,so the modify operations will lead to the wrong measurement results of checking particles.

    4 Conclusion

    In this paper,we have analyzed the reasons why the ZZZ protocol is insecure under fake entangled particles attack and disentanglement attack.Firstly,it is the secret receiver Bob who prepares the four particles cluster state.So he can prepare other states which are beneficial to him.Moreover,he is the last one to measure his particles.Then,he can perfectly deceive the controller,Charlie,by preparing two fake entangled particles without being detected.Secondly,Bob has half particles of the states and one of his two particles is equivalent to Alice’s,another is equivalent to Charlie’s.So it is easy for Bob to measure his particle which is equivalent to Charlie’s to get rid of Charlie’s control.In essence,this happens because Charlie’s control information is not enough and Bob has too much power.Therefore,by making Bob powerless and Charlie have more control information,we have proposed a new improved secure protocol.In our new protocol,we have two versions of improvement,and both of them can prevent the two attack strategies we have mentioned above.

    Besides,we have proposed a novel secure protocol using a more useful and practical state,the three-qubit partially entangled set of state.In our protocol,on one hand,it is impossible for Bob to carry out fake entangled particles attack,for he is not the one who prepares the three-qubit partially entangled set of states,and it is also impossible for Charlie to deliver fake entangled particles attack,for he will be detected by Alice and Bob in the detection of three-qubit partially entangled states.On the other hand,it is difficult for Bob to carry out disentanglement attack too.Because he has only one particle of the state,he cannot measure his particle to make Charlie out of control of their communication.We also analyze some other possible attacks and find out these attacks do not work.And also,we have pointed out that our protocol is easier and more secure to prepare the resource states.Moreover,efficiency in transmitting of secret information via a particle is higher than Chen et al.’s protocol [Chen,Wang,Du et al.(2008)].In addition,our protocol needs less measurement resource,which makes this protocol more convenient from an applied point of view.

    Acknowledgement:Project supported by NSFC (Grant Nos.61671087,61272514,61170272,61003287,61571335,61628209),the Fok Ying Tong Education Foundation(Grant No.131067),the National Key R&D Program of China under Grant 2017YFB0802300,the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2018BDKFJJ016) and Hubei Science Foundation (2016CFA030,2017AAA125).

    久久97久久精品| 亚洲av.av天堂| 色94色欧美一区二区| 女人久久www免费人成看片| 亚洲欧美成人精品一区二区| 在线观看人妻少妇| 国产一区有黄有色的免费视频| 国产在线一区二区三区精| 国产精品蜜桃在线观看| 晚上一个人看的免费电影| 国产一级毛片在线| 婷婷色av中文字幕| 欧美日韩亚洲高清精品| 婷婷成人精品国产| 欧美3d第一页| 麻豆精品久久久久久蜜桃| 人妻系列 视频| 一边摸一边做爽爽视频免费| 亚洲精品第二区| 欧美3d第一页| 成人二区视频| 美女视频免费永久观看网站| 欧美成人精品欧美一级黄| 久热久热在线精品观看| 飞空精品影院首页| 晚上一个人看的免费电影| 女的被弄到高潮叫床怎么办| 国产欧美日韩一区二区三区在线| 成人二区视频| 久久久久久人妻| 久久精品国产a三级三级三级| 亚洲国产成人一精品久久久| 如何舔出高潮| 欧美成人精品欧美一级黄| 妹子高潮喷水视频| 久热久热在线精品观看| 国产无遮挡羞羞视频在线观看| 久久久久国产精品人妻一区二区| www日本在线高清视频| 精品第一国产精品| 国国产精品蜜臀av免费| √禁漫天堂资源中文www| 国产亚洲午夜精品一区二区久久| 少妇的丰满在线观看| 少妇的丰满在线观看| 观看av在线不卡| 99热国产这里只有精品6| 久久久久久人妻| 亚洲国产精品国产精品| 99热全是精品| 老司机亚洲免费影院| 久久99热这里只频精品6学生| 中国国产av一级| 国产精品欧美亚洲77777| 国产片内射在线| 亚洲欧洲日产国产| 一级毛片电影观看| 在线观看美女被高潮喷水网站| 高清不卡的av网站| 丰满少妇做爰视频| 五月天丁香电影| 国产片特级美女逼逼视频| 国产片特级美女逼逼视频| 97人妻天天添夜夜摸| 免费黄色在线免费观看| 9热在线视频观看99| 97精品久久久久久久久久精品| 亚洲精品第二区| 亚洲少妇的诱惑av| 精品一区二区三卡| 少妇精品久久久久久久| 精品一品国产午夜福利视频| 天天影视国产精品| 两个人免费观看高清视频| 少妇的逼水好多| 成人午夜精彩视频在线观看| 人人妻人人爽人人添夜夜欢视频| 不卡视频在线观看欧美| av有码第一页| 国产成人精品在线电影| 亚洲成人av在线免费| 亚洲一码二码三码区别大吗| 91国产中文字幕| 午夜av观看不卡| 一区二区av电影网| 一级毛片 在线播放| 欧美国产精品一级二级三级| av国产精品久久久久影院| 国产免费一区二区三区四区乱码| 日日爽夜夜爽网站| 国精品久久久久久国模美| 国产成人免费无遮挡视频| 成人无遮挡网站| 国产精品一区www在线观看| 日韩一区二区三区影片| 久久人人97超碰香蕉20202| 丁香六月天网| 午夜福利,免费看| 成人亚洲欧美一区二区av| 2022亚洲国产成人精品| 欧美精品一区二区免费开放| 99热网站在线观看| 大片电影免费在线观看免费| 观看美女的网站| videossex国产| 侵犯人妻中文字幕一二三四区| 国产亚洲一区二区精品| 日韩制服丝袜自拍偷拍| 亚洲美女搞黄在线观看| 国产又爽黄色视频| 国产一区二区三区综合在线观看 | 国产激情久久老熟女| 校园人妻丝袜中文字幕| 国产在视频线精品| 久久久精品区二区三区| 国产精品久久久av美女十八| 国产在线视频一区二区| 满18在线观看网站| 国产欧美日韩综合在线一区二区| 久久人人爽人人爽人人片va| 免费大片18禁| 春色校园在线视频观看| 婷婷成人精品国产| 久久精品国产鲁丝片午夜精品| 日韩电影二区| 国产在线免费精品| 成人免费观看视频高清| 午夜日本视频在线| 国产极品粉嫩免费观看在线| 精品久久国产蜜桃| 91精品国产国语对白视频| 亚洲精品第二区| tube8黄色片| 亚洲,欧美,日韩| 国产免费福利视频在线观看| freevideosex欧美| 亚洲av.av天堂| 欧美性感艳星| 在线 av 中文字幕| 丝袜在线中文字幕| 亚洲精品久久成人aⅴ小说| 黑丝袜美女国产一区| 国产黄频视频在线观看| 日日撸夜夜添| 在线观看国产h片| 欧美日韩国产mv在线观看视频| 中文乱码字字幕精品一区二区三区| 韩国高清视频一区二区三区| 亚洲精品一区蜜桃| a级片在线免费高清观看视频| 国产av码专区亚洲av| 国产一区二区在线观看日韩| √禁漫天堂资源中文www| 大片免费播放器 马上看| 侵犯人妻中文字幕一二三四区| 成人毛片a级毛片在线播放| 中文字幕人妻熟女乱码| 精品久久国产蜜桃| 又黄又粗又硬又大视频| 国产精品蜜桃在线观看| 国产毛片在线视频| 国产女主播在线喷水免费视频网站| 极品人妻少妇av视频| 精品少妇久久久久久888优播| 国产无遮挡羞羞视频在线观看| 国产又色又爽无遮挡免| 中文字幕另类日韩欧美亚洲嫩草| 一级毛片电影观看| 久久久久久久国产电影| 不卡视频在线观看欧美| 黄色一级大片看看| 99热这里只有是精品在线观看| 久久人人97超碰香蕉20202| 青春草视频在线免费观看| 十八禁网站网址无遮挡| 国产av精品麻豆| 日韩伦理黄色片| 亚洲情色 制服丝袜| 久久久久国产精品人妻一区二区| 欧美97在线视频| 制服丝袜香蕉在线| 中国三级夫妇交换| 黄色毛片三级朝国网站| 超碰97精品在线观看| 色5月婷婷丁香| 亚洲精品,欧美精品| av天堂久久9| 韩国av在线不卡| 亚洲精品一二三| 亚洲精品,欧美精品| 激情五月婷婷亚洲| 99热全是精品| 一级毛片黄色毛片免费观看视频| 免费大片18禁| 夜夜爽夜夜爽视频| 最黄视频免费看| 成年人午夜在线观看视频| 不卡视频在线观看欧美| 亚洲内射少妇av| 亚洲国产欧美日韩在线播放| 久久99一区二区三区| 日韩成人av中文字幕在线观看| av在线app专区| freevideosex欧美| 夜夜骑夜夜射夜夜干| 国产毛片在线视频| 国产男人的电影天堂91| 国产精品蜜桃在线观看| 久久久久久久久久久久大奶| 午夜福利视频精品| 国产成人午夜福利电影在线观看| 七月丁香在线播放| 黄网站色视频无遮挡免费观看| 亚洲人成77777在线视频| 欧美国产精品一级二级三级| 精品人妻一区二区三区麻豆| 国产 一区精品| 久久久久网色| 国产精品.久久久| 欧美另类一区| 国产色爽女视频免费观看| 国产极品天堂在线| 国语对白做爰xxxⅹ性视频网站| 宅男免费午夜| 成人国产av品久久久| 视频区图区小说| 九色亚洲精品在线播放| 夫妻性生交免费视频一级片| 亚洲内射少妇av| 国产精品久久久久久精品电影小说| 丝袜喷水一区| 高清视频免费观看一区二区| 亚洲精品一区蜜桃| 免费观看在线日韩| 国产精品秋霞免费鲁丝片| 亚洲高清免费不卡视频| av线在线观看网站| 欧美日韩一区二区视频在线观看视频在线| 爱豆传媒免费全集在线观看| a级毛片黄视频| 赤兔流量卡办理| 日本av免费视频播放| 91精品伊人久久大香线蕉| 欧美成人午夜免费资源| 亚洲成人av在线免费| 七月丁香在线播放| 亚洲高清免费不卡视频| 中文字幕免费在线视频6| 亚洲国产精品999| 免费人妻精品一区二区三区视频| 在线观看国产h片| 欧美亚洲日本最大视频资源| 久久鲁丝午夜福利片| 亚洲美女视频黄频| 一本大道久久a久久精品| 国产免费又黄又爽又色| 午夜福利网站1000一区二区三区| 亚洲欧洲日产国产| 99热这里只有是精品在线观看| 亚洲成av片中文字幕在线观看 | 97超碰精品成人国产| 午夜av观看不卡| 毛片一级片免费看久久久久| 国产又爽黄色视频| 久久免费观看电影| 国产成人av激情在线播放| 精品一区二区三卡| 成人国语在线视频| 精品99又大又爽又粗少妇毛片| 亚洲一区二区三区欧美精品| 免费日韩欧美在线观看| 五月开心婷婷网| 制服人妻中文乱码| 久热这里只有精品99| 成人国产av品久久久| 亚洲国产最新在线播放| 国产在线免费精品| 久久久久久久精品精品| 久久毛片免费看一区二区三区| 十分钟在线观看高清视频www| 成人二区视频| 久久99精品国语久久久| 丝袜脚勾引网站| 国产高清不卡午夜福利| 在线观看免费高清a一片| 国产不卡av网站在线观看| 亚洲成国产人片在线观看| 亚洲精品国产av蜜桃| 这个男人来自地球电影免费观看 | 国产一区二区在线观看日韩| 国产无遮挡羞羞视频在线观看| 寂寞人妻少妇视频99o| 精品第一国产精品| 精品亚洲乱码少妇综合久久| 成人免费观看视频高清| 国产一区二区在线观看av| 国产亚洲午夜精品一区二区久久| 精品一区二区三区视频在线| 欧美日本中文国产一区发布| 爱豆传媒免费全集在线观看| 亚洲人与动物交配视频| 99国产精品免费福利视频| 草草在线视频免费看| 欧美 亚洲 国产 日韩一| 欧美变态另类bdsm刘玥| 黄片无遮挡物在线观看| 卡戴珊不雅视频在线播放| 国产免费又黄又爽又色| av在线观看视频网站免费| 丝袜美足系列| 男人添女人高潮全过程视频| 欧美亚洲 丝袜 人妻 在线| 高清不卡的av网站| 欧美精品高潮呻吟av久久| 国产精品国产三级专区第一集| 国产1区2区3区精品| 在线观看一区二区三区激情| 蜜臀久久99精品久久宅男| 美女内射精品一级片tv| av视频免费观看在线观看| 最黄视频免费看| 热99国产精品久久久久久7| 在线精品无人区一区二区三| 国产精品一区二区在线不卡| 久久毛片免费看一区二区三区| 一级片'在线观看视频| 久久精品国产鲁丝片午夜精品| 少妇被粗大猛烈的视频| 国产精品久久久久久久久免| 波多野结衣一区麻豆| 天堂俺去俺来也www色官网| 22中文网久久字幕| 97人妻天天添夜夜摸| 国产成人精品无人区| 亚洲,一卡二卡三卡| 国产高清三级在线| 永久免费av网站大全| 国国产精品蜜臀av免费| 性色av一级| 亚洲av电影在线进入| 最近最新中文字幕免费大全7| 少妇人妻精品综合一区二区| 五月开心婷婷网| 九色成人免费人妻av| 香蕉精品网在线| 日本黄大片高清| 伦理电影免费视频| 男人舔女人的私密视频| 精品福利永久在线观看| av在线播放精品| 日本91视频免费播放| 国产精品成人在线| 成年人午夜在线观看视频| 久久国产精品大桥未久av| 99久久中文字幕三级久久日本| 久久久久久久国产电影| 久久这里只有精品19| 久久久久久人妻| 久久久久精品久久久久真实原创| 狠狠精品人妻久久久久久综合| 黄片无遮挡物在线观看| 欧美成人精品欧美一级黄| 午夜av观看不卡| 亚洲精品中文字幕在线视频| 亚洲天堂av无毛| 国产精品久久久久久久久免| 最新中文字幕久久久久| 日韩制服丝袜自拍偷拍| 精品一区二区三区四区五区乱码 | 亚洲欧美中文字幕日韩二区| 国产在线免费精品| 一边亲一边摸免费视频| 飞空精品影院首页| 成年美女黄网站色视频大全免费| 最近中文字幕高清免费大全6| 又黄又爽又刺激的免费视频.| 国产精品成人在线| 国产精品久久久久成人av| 久久鲁丝午夜福利片| 一级a做视频免费观看| 亚洲精品成人av观看孕妇| 日韩欧美精品免费久久| 伊人久久国产一区二区| 久久久亚洲精品成人影院| 在线观看免费高清a一片| 美女中出高潮动态图| 国产 一区精品| 午夜老司机福利剧场| 十八禁高潮呻吟视频| 亚洲欧美一区二区三区黑人 | 亚洲欧美成人综合另类久久久| 中文字幕精品免费在线观看视频 | 黄片播放在线免费| 高清毛片免费看| 边亲边吃奶的免费视频| 嫩草影院入口| 免费看不卡的av| 各种免费的搞黄视频| 在线亚洲精品国产二区图片欧美| 日韩av在线免费看完整版不卡| 51国产日韩欧美| 婷婷色麻豆天堂久久| 国产亚洲一区二区精品| 波多野结衣一区麻豆| 国产欧美日韩一区二区三区在线| 日日撸夜夜添| 国产日韩欧美亚洲二区| 免费久久久久久久精品成人欧美视频 | 黑人欧美特级aaaaaa片| 国产精品麻豆人妻色哟哟久久| 最黄视频免费看| a级毛片黄视频| 国产男女超爽视频在线观看| 天堂8中文在线网| 久久婷婷青草| 日本vs欧美在线观看视频| 热re99久久精品国产66热6| 国产精品 国内视频| 在线免费观看不下载黄p国产| 免费人妻精品一区二区三区视频| 纯流量卡能插随身wifi吗| 菩萨蛮人人尽说江南好唐韦庄| 免费黄频网站在线观看国产| 午夜久久久在线观看| 亚洲精华国产精华液的使用体验| av在线播放精品| 亚洲av电影在线进入| 久久国内精品自在自线图片| 日韩av在线免费看完整版不卡| 韩国高清视频一区二区三区| 视频区图区小说| 久久久国产欧美日韩av| 黑人猛操日本美女一级片| 午夜福利,免费看| 免费观看无遮挡的男女| 狠狠婷婷综合久久久久久88av| 亚洲欧美中文字幕日韩二区| 黄片无遮挡物在线观看| 国产在线一区二区三区精| 精品久久蜜臀av无| 亚洲欧美成人精品一区二区| 久久国产亚洲av麻豆专区| 人体艺术视频欧美日本| 水蜜桃什么品种好| 黄片无遮挡物在线观看| 亚洲国产精品国产精品| 有码 亚洲区| 丝袜喷水一区| www.色视频.com| 三上悠亚av全集在线观看| 街头女战士在线观看网站| av女优亚洲男人天堂| 亚洲人成网站在线观看播放| 国产一区二区在线观看av| 欧美 日韩 精品 国产| 国产精品一国产av| 极品少妇高潮喷水抽搐| 欧美国产精品一级二级三级| 国产一区二区三区综合在线观看 | 人成视频在线观看免费观看| 国产精品久久久久久av不卡| 亚洲性久久影院| 美女福利国产在线| 狠狠婷婷综合久久久久久88av| 一区二区三区乱码不卡18| 国产男女超爽视频在线观看| 亚洲高清免费不卡视频| 亚洲中文av在线| 天美传媒精品一区二区| 亚洲欧美成人精品一区二区| 中文字幕最新亚洲高清| 在线观看免费视频网站a站| 免费不卡的大黄色大毛片视频在线观看| 国产亚洲精品第一综合不卡 | 欧美人与善性xxx| 好男人视频免费观看在线| 国产成人精品无人区| 久久久精品区二区三区| 美女国产视频在线观看| 亚洲丝袜综合中文字幕| 五月玫瑰六月丁香| 欧美97在线视频| 久久久久视频综合| 久久久久久久亚洲中文字幕| 国产精品秋霞免费鲁丝片| 老熟女久久久| 男女边吃奶边做爰视频| 免费大片黄手机在线观看| 99久久精品国产国产毛片| 男女边摸边吃奶| 亚洲精品国产av蜜桃| 777米奇影视久久| 亚洲国产精品999| 好男人视频免费观看在线| 美女大奶头黄色视频| 久热久热在线精品观看| 大码成人一级视频| 99re6热这里在线精品视频| videossex国产| a级毛片在线看网站| 中文字幕亚洲精品专区| 自拍欧美九色日韩亚洲蝌蚪91| 久久av网站| 日韩欧美精品免费久久| 汤姆久久久久久久影院中文字幕| 国产在线一区二区三区精| 国产亚洲午夜精品一区二区久久| 国产在线免费精品| 久久久久精品性色| av福利片在线| 成年女人在线观看亚洲视频| 校园人妻丝袜中文字幕| 亚洲欧美一区二区三区黑人 | 亚洲在久久综合| 春色校园在线视频观看| 黄片无遮挡物在线观看| 国产一区有黄有色的免费视频| 丰满迷人的少妇在线观看| 国产精品一区二区在线观看99| 水蜜桃什么品种好| 亚洲欧美成人综合另类久久久| h视频一区二区三区| 久久99热这里只频精品6学生| av.在线天堂| 国产69精品久久久久777片| 99久久中文字幕三级久久日本| 日韩在线高清观看一区二区三区| 99久久综合免费| 亚洲精品乱码久久久久久按摩| 女人被躁到高潮嗷嗷叫费观| 一级毛片 在线播放| 欧美97在线视频| www.熟女人妻精品国产 | 制服人妻中文乱码| 欧美激情 高清一区二区三区| 国产片内射在线| 人妻一区二区av| 在线观看国产h片| 尾随美女入室| 久久久久久久精品精品| 黄色一级大片看看| 国产精品久久久久久av不卡| 黑丝袜美女国产一区| 夜夜骑夜夜射夜夜干| 高清黄色对白视频在线免费看| 九色亚洲精品在线播放| 国产精品无大码| 亚洲国产毛片av蜜桃av| 亚洲精品久久午夜乱码| 制服丝袜香蕉在线| 女人被躁到高潮嗷嗷叫费观| 午夜久久久在线观看| 成人免费观看视频高清| a级毛片黄视频| 视频在线观看一区二区三区| 国产精品一二三区在线看| 亚洲天堂av无毛| 高清毛片免费看| 爱豆传媒免费全集在线观看| 欧美97在线视频| 免费观看性生交大片5| 亚洲精品aⅴ在线观看| 三上悠亚av全集在线观看| 桃花免费在线播放| 久久狼人影院| 丰满迷人的少妇在线观看| 久久鲁丝午夜福利片| 99九九在线精品视频| 大香蕉久久成人网| 久久国产精品男人的天堂亚洲 | 欧美xxⅹ黑人| 纯流量卡能插随身wifi吗| 一级毛片电影观看| 国产av码专区亚洲av| 婷婷色av中文字幕| 国产精品免费大片| 亚洲人成77777在线视频| 建设人人有责人人尽责人人享有的| 亚洲精品乱久久久久久| 看免费成人av毛片| 久久久久国产精品人妻一区二区| 一级毛片 在线播放| 久久精品国产亚洲av涩爱| 丝袜脚勾引网站| 少妇人妻久久综合中文| 亚洲性久久影院| 亚洲国产色片| 亚洲欧洲国产日韩| 日韩成人伦理影院| 老司机影院成人| 草草在线视频免费看| 国产伦理片在线播放av一区| 女性被躁到高潮视频| 少妇人妻 视频| 久久av网站| av女优亚洲男人天堂| 亚洲伊人久久精品综合| h视频一区二区三区| 午夜免费鲁丝| 中文字幕另类日韩欧美亚洲嫩草| 日韩 亚洲 欧美在线| 蜜臀久久99精品久久宅男| 久久久久久人妻| 少妇的丰满在线观看| 十八禁网站网址无遮挡| 国产黄色视频一区二区在线观看| 我的女老师完整版在线观看| 久久久久国产网址| 久久人人爽人人片av| 日韩中文字幕视频在线看片| 日韩熟女老妇一区二区性免费视频| 在线免费观看不下载黄p国产| 国产一区亚洲一区在线观看| 久久久国产精品麻豆| 妹子高潮喷水视频|