SCIENCE CHINA Information Sciences, Volume 61 , Issue 2 : 022502(2018) https://doi.org/10.1007/s11432-017-9180-2

Mutual authenticated quantum no-key encryption scheme over private quantum channel

Li YANG 1,2,3,*, Chenmiao WU 1,2,3, Huiqin XIE 1,2,3
More info
  • ReceivedJun 13, 2017
  • AcceptedJul 16, 2017
  • PublishedDec 27, 2017



This work was supported by National Natural Science Foundation of China (Grant No. 61672517), National Cryptography Development Fund (Grant No. MMJJ20170108), National Key Research and Development Program of China (Grant No. 2017YFB0802502), and Fundamental Theory and Cutting Edge Technology Research Program of Institute of Information Engineering, CAS (Grant No. Y7Z0301103).


[1] Menezes G J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton: Crc Press, 1997. Google Scholar

[2] Yang L, Wu L A. Transmit classical and quantum information secretly. 2002,. arXiv Google Scholar

[3] Yang L, Wu L A, Liu S H. Quantum three-pass cryptography protocol. In: Proceedings of SPIE 2002 Quantum Optics in Computing and Communications, SPIE, 2009. 4917: 107--112. Google Scholar

[4] Kanamori Y, Yoo S M, Mohammad A S. A quantum no-key protocol for secure data communication. In: Proceedings of Proc 43rd Annual Southeast Regional Conference. New York: ACM Press, 2005. 2: 92--93. Google Scholar

[5] Kak S. A three stage quantum cryptography protocol. Found Phys Lett, 2006, 19: 293--296. Google Scholar

[6] Kye W H, Kim C M, Kim M S, et al. Quantum key distribution with blind polarization bases. Phys Rev Lett, 2005, 95: 040501. Google Scholar

[7] Yang L. Quantum no-key protocol for direct and secure transmission of quantum and classical messages. 2003,. arXiv Google Scholar

[8] Wu Y, Yang L. Practical quantum no-key protocol with identification. In: Proceedings of the 5th International Conference on Information Assurance and Security, Xian, 2009. 540--543. Google Scholar

[9] Yang L. Quantum no-key protocol for secure communication of classical message. 2013,. arXiv Google Scholar

[10] Boykin P, Roychowdhury V. Optimal encryption of quantum bits. Phys Rev A, 2003, 67: 042317. Google Scholar

[11] Ambainis A, Mosca M, Tapp A, et al. Private quantum channels. In: Proceedings of the 41st Annual Symposium on Foundations of Computer Science. Redondo Beach: IEEE Computer Society Press, 2000. 547--553. Google Scholar

[12] Nayak A, Sen P. Invertible quantum operations and perfect encryption of quantum states. Quantum Inf Comput 2007, 7: 103--110. Google Scholar

[13] Wu C, Yang L. Qubit-wise teleportation and its application in public-key secret communication. Sci China Inf Sci, 2017, 60: 032501. Google Scholar

[14] Bennett C H, Brassard G, Breidbart S. Quantum cryptography II: how to re-use a one-time pad safely even if P= NP. Natural Comput, 2014, 13: 453--458. Google Scholar


Contact and support