1 Introduction

Quantum communication technology is mainly divided into two parts, the Quantum Key Distribution (QKD) [15] and quantum direct communication, which is the main research content of the quantum information with the best application prospect.

With the rapid development and maturity of quantum technology, QKD plays an important role in the development of quantum cryptography. It is an important research part of quantum cryptography. QKD makes the communication between the two sides share a series of security random key through the quantum method. In theory, QKD and one-time pad (OTP) [6] are combined to achieve the unconditional security of cryptosystem.

Making use of quantum physical properties to keep the information secret, is the first proposed by S. Wiesner of the University of Columbia in 1969, but this idea was not accepted by people at that time. Ten years later, Bennett of IBM company and Brassard [7] of Montreal University reconsidered this issue, proposed the concept of quantum cryptography and given the first quantum key distribution protocol-BB84 protocol on the basis of S. Wiesner’thoughts. After this, there are more protocols: E91, B92, GV95, continuous variable, Decoy state, etc. Quantum direct communication includes Determination Secure Quantum Communication (DSQC) [811] and Quantum Secure Direct Communication (QSDC) [1215].QSDC is a new way of communication which is different from QKD. In QSDC, the secret messages are transmitted in the quantum channel directly without being leaked. In DSQC, the communication between the two sides needs the classic information as an auxiliary in the communication process.

Identity authentication to prevent the middle attack is a difficult task in quantum communication. The use of a message authentication code can ensure that the source of the classic information is reliable and not to be tampered with. Combined with One-Time Pad (OTP), it is a secure message authentication scheme. Block transmission of quantum data are used to improve the security of information transmission [16].

In this paper, deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. Extended GHZ-W states are used as decoy photons [1720], and the eavesdropping detection rate reaches 81%. Both parties, that is, Alice and Bob share ID in advance. Then the positions of decoy photons in the information sequence are encoded with the identity string of Alice and Bob which are known by themselves only. Bob sends the information sequence mixed with decoy photons to Alice, Alice extracts decoy photons and makes measurements. In this process, Alice not only determines whether eavesdroppers exist, but also verifies the legality of Bob. State |φ 〉 is used as the carrier. One photon of |φ 〉 state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. The eavesdropping detection based on extended GHZ-W state and the secret positions and bases determined by the secret ID ensures the security of the protocol. N

2 Description of Protocol

Now let’s start an explicit description of the extended GHZ-W state protocol which is called GWPP. Suppose that the sender Alice wants to transmit his secret message to the legitimate receiver Bob. There is a series of N-bit sting ID shared by Alice and Bob representing their identities beforehand. Of course, Alice’s secret message is composed of a series of classical 0 or 1 numbers which is called M.

(S1):

Bob prepares N ordered Bell states |φ 〉 and N/4 extended GHZ-W state |ψ〉1234.

$$\left|\varphi^{-} \right\rangle=\frac{1}{\sqrt 2}(\left|00 \right\rangle-\left| 11\right\rangle)_{12}=\frac{1}{\sqrt 2}(\left|+- \right\rangle + \left\langle-+ \right|)_{12} $$
$$\left|\psi \right\rangle_{1234} ={\frac{1}{\sqrt 3}}(\left|0000 \right\rangle +\left|1100 \right\rangle +\left|1111 \right\rangle )_{1234} $$

The ordered N |φ 〉 states are marked as {[P 1(1), P 1(2)], [P 2(1), P 2(2)], …, [P N(1), P N(2)]} , where the subscript represents the order of each state in the sequence and the number 1, 2 in brackets indicate the two particles of each state. Bob extracts the first particle from each Bell state, and these articles form an ordered sequence {P 1(1), P 2(1), …, P N(1)} , called S A sequence (the travel qubits). Then the remaining particles compose S B sequence {P 1(2), P 2(2), …, P N(2)}(the home qubits). The N/4 ordered extended GHZ-W state |〉1234 are denoted as { GW 1(1), GW 1(2), GW 1(3), GW 1(4), GW 2(1), GW 2(2), GW 2(3), GW 2(4), …, GW N(1), GW N(2), GW N(3), GW N(4)} , marked as S Tsequence, which will be used as decoy sequence.

(S2):

Bob inserts the decoy sequence S T into the sequence S Aaccording to ID, forming a new sequence S A‘. For example, Bob inserts the ith photon of S T behind the ith photon of S A if the ith bit of ID is 0; Bob inserts the ith photon of S T before the ith photon of S A if the ith bit of ID is 1. Only Alice and Bob know the positions of these decoy photons. Then Bob sends S A‘ to Alice.

(S3):

Alice filters out the invisible photons with a different wave-length by using special filter. Then Alice uses the photon number splitter (PNS) or beam splitters to check the received photons. This has been described in [21].

(S4):

Alice extracts the decoy photons from S A‘ which sending from Bob according to ID and performs extended GHZ-W state measurement on the extracted sequence S T. Ideally, every measurement result should be in the extended GHZ-W state. Of course, there are some errors in the actual situation. Alice believes Bob is legal and there is no eavesdropping if the error rate is low enough. At this time, the communication continues. Otherwise, the communication is interrupted. On the assumption that N is the number of photons in S A, K is the number of |〉1234states in S T. Obviously, K is no less than N/4 if all photons are dispersed in S A.

(S5):

Alice measures the remaining photons of S A‘, that is, S A with basis B z= { |0〉,|1〉} or B x= { |+〉,|−〉}in order according to ID. Alice measures the corresponding photon of S A with B z basis if the bit of ID is 0; Otherwise, Alice uses B x basis. Alice obtains a series of classical number C A in order after measuring photons in S A with B z basis or B x basis. For example, Alice marks the bit of C A as 0 if the measurement result is |0〉 or |+〉; Otherwise Alice marks the bit of C A as 1. Then Alice publishes which photons she does not receive.

(S6):

Bob discards the corresponding photons in S B after he knows which photons of S A are not received by Alice. For example, Bob discards the corresponding photon P x(2) in S Bif photon P x(1) in S A is not received by Alice. Therefore, photons in S B will be always one-to-one matching with photons in S A.

(S7):

Suppose that the length of C A is L. Alice uses L as the unit length to divide the secret message M into several parts. Each part is marked as M i (i= 1,2, …), which includes L bits classical secret information. Alice encrypts the secret message M 1 with C A bit by bit using XOR operation and gets C 1 .That is, C 1 = M 1 XOR C A. Alice publishes C 1.

(S8):

Bob also measures the remaining photons in S B in the same way as Alice. Bob can also form a series of classical number C B in order. However, the rule is different from that of C A. Bob marks the bit of C B as 0 if the measurement result is |0〉 or |−〉; Otherwise Bob marks the bit of C B as 1. Bob decrypts C 1 with C B bit by bit using XOR operation and gets M 1. That is, M 1 = C 1 XOR C B.

(S9):

Bob stores the secret message M 1.

(S10):

Alice and Bob continue the next transmission until all the secret messages are finished.

3 An Example of the Protocol

Suppose that the secret message M = 1011010100110101 and ID = 01001010.

(S1):

Bob prepares n (n ≥8) |φ 〉 states and n/4 extended GHZ-W state |ψ1234. The ordered n |φ 〉 states are marked as {[P 1(1), P 1(2)], [P 2(1), P 2(2)], …, [P n(1), P n(2)]}. Bob divides the |φ 〉 state sequence into two groups: S A { P 1(1), P 2(1), …, P n(1)}and S B{P 1(2), P 2(2), …, P n(2)}. The extended GHZ-W state sequence is marked as S T.

(S2):

Bob inserts S Tinto S A according to ID, which forms S A‘.Bob sends S A‘to Alice.

(S3):

Alice filters out the invisible photons and checks the received photons by using (PNS) or beam splitters.

(S4):

Alice extracts S T from S A‘ according to ID and performs extended GHZ-W state measurement on S T. Alice considers Bob as legitimate user and there is no eavesdropping if the error rate is low enough.

(S5):

Alice measures the remaining photons of S A‘, that is, S A with basis B z= { |0〉,|1〉} or B x= { |+〉,|−〉 } in order according to ID. The rule is that Alice measures the corresponding photon of S A with B z basis if the bit of ID is 0; Otherwise, Alice uses B x basis. By using this rule the bases Alice chooses should be B z B x B z B z B x B z B x B z.Suppose that the measurement result is |1〉 |−〉 |0〉 |1〉 |+〉 |1〉 |+〉 |0〉, the corresponding photons in S B will collapse to |1〉 |+〉 |0〉 |1〉 |−〉 |1〉 |−〉 |0〉. Alice marks the bit of C A as 0 if the measurement result is |0〉 or |+〉; Otherwise Alice marks the bit of C A as 1 according to the rule. So C A should be 11010100. Alice publishes which photons she does not receive.

(S6):

Bob discards the corresponding photons in S B for the photons in S A not received by Alice. So, photons in S B will be always one-to-one matching with photons in S A.

(S7):

Suppose that the length of C A is eight. Alice divides the secret message M into two parts (M 1= 10110101 and M 2= 00110101). Alice encrypts M 1 with C A bit by bit using XOR operation and gets C 1 (C 1 = M 1 XOR C A= 01100001). Alice publishes C 1.

(S8):

Bob also measures the remaining photons in S B in the same way as Alice. The measurement result should be |1〉 |+〉 |0〉 |1〉 |−〉 |1〉 |−〉 |0〉.Bob marks the bit of C B as 0 if the measurement result is |0〉 or |−〉; Otherwise Bob marks the bit of C B as 1, so C B should be 11010100. Bob decrypts C 1 with C B bit by bit using XOR operation and gets M 1(M 1 = C 1 XOR C B= 10110101).

(S9):

Bob stores the secret message M 1.

(S10):

Alice and Bob continue the next transmission until all the secret messages are finished.

4 Security Analysis

The security of the protocol is guaranteed by the identity string ID and the eavesdropping detection strategy based on extended GHZ-W state. The protocol will not be threatened by man-in-the-middle attack, because identity authentication is implemented based on the identity string. Now, let us analyze the eavesdropping detection rate of the protocol.

In the original “ping-pong” protocol [2225], the author calculated the maximal amount of the information I(d l O ) that Eve can eavesdrop and the probability d l O that Eve is detected. And the function I(d l O )) is provided. When p 0= p 1= 0.5, I(d l O )=−d l O l o g 2 d l O −(1−d l O )log2(1−d l O ). The above method can be used to compare the eavesdropping detection rate between the two protocols.

In the protocol, the extended GHZ-W state is used as decoy photons to detect eavesdropping. Eve cannot distinguish decoy photons from information photons, because the positions of decoy photons are secret. So what he can do is only performing the same attack operation on all photons.

The attack operation on the composed system that Eve performs is marked as\(\hat {{\mathrm {E}}}\). After performing the attack operation\(\hat {{\mathrm {E}}}\), the state |0〉 become \(\left |\varphi _{0}^{\prime } \right \rangle =\hat {{\mathrm {E}}} \otimes \left |0x \right \rangle =a\left |0x_{0} \right \rangle + \beta \left |1x_{1} \right \rangle \) and the state |1〉 become \(\left |\varphi _{1}^{\prime } \right \rangle =\hat {{\mathrm {E}}} \otimes \left |1x \right \rangle =m \left |0y_{0} \right \rangle + n\left |1y_{1} \right \rangle \) , Where |x i 〉 and |y i〉 are the pure ancillary states determined by \(\hat {{\mathrm {E}}}\) uniquely, and |α|2+|β|2=1, |m|2+|n|2=1.

Attacked by Eve, the state of composed system changes to

$$\left|\psi \right\rangle_{Eve} =E\otimes E\otimes E\otimes E[\frac{1}{\sqrt 3 }(\left|0x0x0x0x \right\rangle +\left|1x1x0x0x \right\rangle +\left|1x1x1x1x \right\rangle )] $$
$${\begin{array}{l} =\frac{1}{\sqrt 3 }[(\alpha \left|0x_{0} \right\rangle + \beta\left|1x_{1} \right\rangle)\otimes (\alpha\left|0x_{0} \right\rangle +\beta\left|1x_{1} \right\rangle) \otimes\alpha (\left|0x_{0} \right\rangle + \beta\left|1x_{1}\right\rangle) \otimes (\alpha \left|0x_{0} \right\rangle +\beta \left|1x_{1} \right\rangle) \\ +(m\left|0y_{0} \right\rangle + n \left|1y_{1} \right\rangle )\otimes (m \left|0y_{0} \right\rangle +n\left|1y_{1} \right\rangle) \otimes (\alpha\left|0x_{0} \right\rangle +\beta \left|1x_{1} \right\rangle) \otimes (\alpha \left|0x_{0} \right\rangle + \beta\left|1x_{1} \right\rangle) \\ +(m\left|0y_{0} \right\rangle + n \left|1y_{1} \right\rangle )\otimes(m \left|0y_{0} \right\rangle +n\left|1y_{1} \right\rangle) \otimes(m\left|0y_{0} \right\rangle +n \left|1y_{1} \right\rangle) \otimes (m \left|0y_{0} \right\rangle + n\left|1y_{1} \right\rangle)] \\ =\frac{1}{\sqrt{3}}(\alpha^{4}\left|0x_{0}0x_{0}0x_{0}0x_{0}\right\rangle+\alpha^{3}\beta\left|0x_{0}0x_{0}0x_{0}1x_{1}\right\rangle + \alpha^{3}\beta\left|0x_{0}0x_{0}1x_{1}0x_{0}\right\rangle + \alpha^{2}\beta^{2} \left|0x_{0}0x_{0}1x_{1}1x_{1} \right\rangle\\ +\alpha^{3}\beta \left|0x_{0}1x_{1}0x_{0}0x_{0}\right\rangle + \alpha^{2}\beta^{2} \left|0x_{0}1x_{1}0x_{0}1x_{1} \right\rangle + \alpha^{2}\beta^{2} \left|0x_{0}1x_{1}1x_{1}0x_{0} \right\rangle + \alpha\beta^{3}\left|0x_{0}1x_{1}1x_{1}1x_{1}\right\rangle\\ +\alpha^{3}\beta \left|1x_{1}0x_{0}0x_{0}0x_{0}\right\rangle + \alpha^{2}\beta^{2} \left|1x_{1}0x_{0}0x_{0}1x_{1} \right\rangle + \alpha^{2}\beta^{2} \left|1x_{1}0x_{0}1x_{1}0x_{0} \right\rangle + \alpha\beta^{3}\left|1x_{1}0x_{0}1x_{1}1x_{1}\right\rangle\\ + \alpha^{2}\beta^{2} \left|1x_{1}1x_{01}0x_{0}0x_{0}\right\rangle +\alpha\beta^{3} \left|1x_{1}1x_{1}0x_{0}1x_{1}\right\rangle + \alpha\beta^{3} \left|1x_{1}1x_{1}1x_{1}0x_{0}\right\rangle + \beta^{4}\left|1x_{1}1x_{1}1x_{1}1x_{1}\right\rangle\\ + m^{2} \alpha^{2}\left|0y_{0}0y_{0}0x_{0}0x_{0}\right\rangle + m^{2}\alpha\beta \left|0y_{0}0y_{0}0x_{0}1x_{1}\right\rangle + m^{2}\alpha\beta \left|0y_{0}0y_{0}1x_{1}0x_{0}\right\rangle + m^{2}\beta^{2}\left|0y_{0}0y_{0}1x_{1}1x_{1}\right\rangle\\ + mn\alpha^{2}\left|0y_{0}1y_{1}0x_{0}0x_{0}\right\rangle + mn\alpha\beta\left|0y_{0}1y_{1}0x_{0}1x_{1}\right\rangle + mn\alpha\beta\left|0y_{0}1y_{1}1x_{1}0x_{0}\right\rangle + mn\beta^{2}\left|0y_{0}1y_{1}1x_{1}1x_{1}\right\rangle\\ + mn\alpha^{2}\left|1y_{1}0y_{0}0x_{0}0x_{0}\right\rangle + mn\alpha\beta\left|1y_{1}0y_{0}0x_{0}1x_{1}\right\rangle + mn\alpha\beta\left|1y_{1}0y_{0}1x_{1}0x_{0}\right\rangle + mn\beta^{2}\left|1y_{1}0y_{0}1x_{1}1x_{1}\right\rangle\\ + n^{2}\alpha^{2}\left|1y_{1}1y_{1}0x_{0}0x_{0}\right\rangle + n^{2}\alpha\beta\left|1y_{1}1y_{1}0x_{0}1x_{1}\right\rangle + n^{2}\alpha\beta\left|1y_{1}1y_{1}1x_{1}0x_{0}\right\rangle + n^{2}\beta^{2}\left|1y_{1}1y_{1}1x_{1}1x_{1}\right\rangle\\ + m^{4}\left|0y_{0}0y_{0}0y_{0}0y_{0}\right\rangle +m^{3}n\left|0y_{0}0y_{0}0y_{0}1y_{1}\right\rangle + m^{3}n\left|0y_{0}0y_{0}1y_{1}0y_{0}\right\rangle + m^{2}n^{2}\left|0y_{0}0y_{0}1y_{1}1y_{1}\right\rangle\\ + m^{3}n\left|0y_{0}1y_{1}0y_{0}0y_{0}\right\rangle + m^{2}n^{2}\left|0y_{0}1y_{1}0y_{0}1y_{1}\right\rangle + m^{2}n^{2}\left|0y_{0}1y_{1}1y_{1}0y_{0}\right\rangle + mn^{3}\left|0y_{0}1y_{1}1y_{1}1y_{1}\right\rangle\\ + m^{3}n\left|1y_{1}0y_{0}0y_{0}0y_{0}\right\rangle + m^{2}n^{2}\left|1y_{1}0y_{0}0y_{0}1y_{1}\right\rangle + m^{2}n^{2}\left|1y_{1}0y_{0}1y_{1}0y_{0}\right\rangle + mn^{3}\left|1y_{1}0y_{0}1y_{1}1y_{1}\right\rangle\\ + m^{2}n^{2}\left|1y_{1}1y_{1}0y_{0}0y_{0}\right\rangle + mn^{3}\left|1y_{1}1y_{1}0y_{0}1y_{1}\right\rangle + mn^{3}\left|1y_{1}1y_{1}1y_{1}0y_{0}\right\rangle + n^{4}\left|1y_{1}1y_{1}1y_{1}1y_{1}\right\rangle) \end{array}} $$

Alice extracts S T and performs extended GHZ-W state measurement on S T after she receives S A’(mixture of S A and S T). If the probability p(|ψ〉) that Alice gets correct measurement results is considered as the probability without eavesdroppers, p(|ψ〉) can be calculated as

$$p(\left|\psi \right\rangle )=\frac{1}{3}(\vert \alpha^{4}\vert^{2}+\vert \alpha^{2}\beta^{2}\vert^{2}+\vert \beta^{4}\vert^{2}+\vert m^{2}\alpha^{2}\vert^{2}+\vert n^{2}\alpha^{2}\vert^{2}+\vert n^{2}\beta^{2}\vert^{2}+\vert m^{4}\vert^{2}+\vert m^{2}n^{2}\vert^{2}+\vert n^{4}\vert^{2}) $$

Suppose |α|2 = a,|β|2 = b,|m|2 = s,|n|2 = t, where a, b, s and t are positive real numbers, and a+ b= s+ t= 1. Then

$$p(\left|\psi \right\rangle)=\frac{1}{3}(3a^{4}-6a^{3}+8a^{2}-4a+3a^{2}t^{2}-2a^{2}t-2at^{2}+3t^{4}-6t^{3}+8t^{2}-4t+2) $$

So the lower bound of the detection rate is

$$d_{low} =1-p(\left|\psi \right\rangle )=1-\frac{1}{3}(3a^{4}-6a^{3}+8a^{2}-4a+3a^{2}t^{2}-2a^{2}t-2at^{2}+3t^{4}-6t^{3}+8t^{2}-4t+2) $$

Now, let us analyze how much information Eve can gain maximally. First, Alice takes measurement on the photon in her hand and supposing that the quantum state of the photon is |〉. Then the state of the system composed of Bob’ photon is

\(\left |\psi ^{\prime } \right \rangle =\hat {{\mathrm {E}}} \left |O,E \right \rangle =\hat {{\mathrm {E}}} \left |O\right \rangle \left |E \right \rangle =\alpha \left |O \right \rangle \left |\varepsilon _{00} \right \rangle + \beta \left |1 \right \rangle \left |\varepsilon _{01} \right \rangle =\alpha \left |0,\varepsilon _{00} \right \rangle +\beta \left |1,\varepsilon _{01} \right \rangle .\) The probability that Eve can be detected is ρ =|α|2|0,ε 00〉〈0,ε 00|+|β|2|1,ε 00〉〈1,ε 00|+|β|2|1,ε 01〉〉1,ε 01| + α β |0,ε 00〉〈1,ε 01| + α β|1,ε 01〉〈0,ε 00|.

After encoding of the unitary operations U 0, U 1, U 2and U 3with the probabilities p 0, p 1, p 2 and p 3,respectively, the state reads

$${\begin{array}{l} \rho "=\left( p_{0\text{}} +p_{3} \right)\text{\thinspace }\vert \alpha \vert^{2}\left|0,\varepsilon_{00} \right\rangle \left\rangle 0,\varepsilon_{00}\right| +\left( p_{0\text{}} +p_{3} \right)\text{\thinspace }\vert \beta \vert^{2}\left|1,\varepsilon_{0} \right\rangle \left\rangle 1,\varepsilon_{01}\right|\\ +\left( p_{0\text{}} +p_{3} \right)\alpha\beta^{\ast}\left|0,\varepsilon_{00} \right\rangle \left\langle 1,\varepsilon_{01} \right| +\left( p_{0\text{}} +p_{3} \right)\alpha^{\ast}\beta \left|1,\varepsilon_{01} \right\rangle \left\langle 0,\varepsilon_{00} \right| \\ +\left( p_{1\text{}} +p_{2} \right)\text{\thinspace }\vert \alpha \vert^{2}\left|1,\varepsilon_{01} \right\rangle \left\rangle 1,\varepsilon_{01}\right| +\left( p_{1\text{}} +p_{2} \right)\text{\thinspace }\vert \beta \vert^{2}\left|0,\varepsilon_{00} \right\rangle \left\rangle 0,\varepsilon_{00}\right|\\ +\left( p_{1\text{}} +p_{2} \right)\alpha\beta^{\ast}\left|1,\varepsilon_{01} \right\rangle \left\langle 0,\varepsilon_{00} \right| +\left( p_{1\text{}} +p_{2} \right)\alpha^{\ast}\beta \left|0,\varepsilon_{00} \right\rangle \left\langle 1,\varepsilon_{01} \right| \\ \end{array}} $$

which can be rewritten in the orthogonal basis {|0,ε 00〉,|1,ε 01〉,|1,ε 00〉,|0,ε 01〉},,

\(\rho "=\left ({{\begin {array}{*{20}c} {\left ({\text {}p_{0} +p_{3} } \right )\text {}\left | \alpha \right |^{2}} \hfill & {\left ({p_{0} -p_{3} } \right )\text {\thinspace }\alpha \beta ^{\ast }} \hfill & 0 \hfill & 0 \hfill \\ {\left ({\text {}p_{0} -p_{3} } \right )\text {}\alpha ^{\ast }\beta } \hfill & {\left ({\text {\thinspace }p_{0} +p_{3} } \right )\text {}\left | \beta \right |^{2}} \hfill & 0 \hfill & 0 \hfill \\ 0 \hfill & 0 \hfill & {\left ({\text {\thinspace }p_{1} +p_{2} } \right )\text {}\left | \alpha \right |^{2}} \hfill & {\left ({\text {\thinspace }p_{1} -p_{2} } \right )\text {}\alpha \beta ^{\ast }} \hfill \\ 0 \hfill & 0 \hfill & {\left ({\text {\thinspace }p_{1} -p_{2} } \right )\text {}\alpha ^{\ast }\beta } \hfill & {\left ({\text {\thinspace }p_{1} +p_{2} } \right )\text {}\left | \beta \right |^{2}} \hfill \\ \end {array} }} \right )\) with p 0 + p 1 + p 2 + p 3=1.

The information I 0 that Eve can get is equal to the Von Neumann entropy\(I_{0} =\sum \limits _{i=0}^{3} {-\lambda i} \log 2\lambda i\), where λ i(i= 0,1,2,3) are the eigenvalues of ρ , which are

$$ \lambda 0,1=\frac{1}{2}\left( {p_{0} +p_{3} } \right)\pm \frac{1}{2}\sqrt {\left( {\text{}p_{0} +p_{3} } \right)^{2}-16p_{0} p_{3} \vert \alpha \vert^{2}\vert \beta \vert^{2}}\\ =\frac{1}{2}\left( {p_{0} +p_{3} } \right)\pm \frac{1}{2}\sqrt {\left( {\text{}p_{0} +p_{3} } \right)^{2}-16p_{0} p_{3} (d-d^{2})} $$
(1)
$$ \lambda 2,3=\frac{1}{2}\left( {\text{}p_{1} +p_{2} } \right)\pm \frac{1}{2}\sqrt {\left( {\text{}p_{1} +p_{2} } \right)^{2}-16p_{1} p_{2} \vert \alpha \vert^{2}\vert \beta \vert^{2}}\\ =\frac{1}{2}\left( {p_{1} +p_{2} } \right)\pm \frac{1}{2}\sqrt {\left( {\text{}p_{1} +p_{2} } \right)^{2}-16p_{1} p_{2} (d-d^{2})} $$
(2)

In the case of p 0= p 1= p 2= p 3= 0.25, where Alice encodes exactly 2 bits, expressions (1)-(2) simplify to λ 0=0.5d,λ 1=0.5(1−d),λ 2=0.5d,λ 3=0.5(1−d). Interestingly, the maximal information that Eve can get is equal to the Shannon entropy of a binary channel

$$I_{0} =-\frac{1}{2}d\log_{2} (\frac{1}{2}d)-(\frac{1}{2}-\frac{1}{2}d)\log_{2} (\frac{1}{2}-\frac{1}{2}d)-\frac{1}{2}d\log_{2} (\frac{1}{2}d)-(\frac{1}{2}-\frac{1}{2}d)\log_{2} (\frac{1}{2}-\frac{1}{2}d). $$

Then assume that Bob sends |〉 rather than |〉. The above security analysis can be done in full analogy, resulting in the same crucial relations. The maximum amount of information is equal to the Shannon entropy of a binary channel

$$I_{1} =-\frac{1}{2}d\log_{2} (\frac{1}{2}d)-(\frac{1}{2}-\frac{1}{2}d)\log_{2} (\frac{1}{2}-\frac{1}{2}d)-\frac{1}{2}d\log_{2} (\frac{1}{2}d)-(\frac{1}{2}-\frac{1}{2}d)\log_{2} (\frac{1}{2}-\frac{1}{2}d). $$

So the maximal amount of information that Eve can obtain is

$$I=0.5(I_{0} +I_{1} )=1-d\log_{2} d-(1-d)\log_{2} (1-d) $$

After some simple mathematical calculations, when a =t, get

$$d_{low} =\frac{1}{3}-3a^{4}+\frac{16}{3}a^{3}-\frac{16}{3}a^{2}+\frac{8}{3}a, $$

and the maximum I is

I(d l o w )=1 + H(a) where H(x)=−xlog2x−(1−x)log2(1−x).

If Eve wants to gain the full information (I= 2), the eavesdropping detection rate is d l o w (I=2)=0.81. However, in OPP, d l O (I=1)=0.5. In order to compare the two functions, Fig. 1 is given.

Fig. 1
figure 1

The comparison of the two detection results. The dotted line expresses the function I(d l O ) in OPP and the solid line expresses the function I(d l o w )in this protocol

As shown in Fig. 1, if Eve wants to gain the full information, he must face a larger detection rate in GWPP than OPP. This also indicates that GWPP is more secure than OPP.

Considering the probability of the control mode is c, the probability of the message mode is 1−c. If Eve wants to eavesdrop on an information transmission without being detected, the probability of the event is

$$\begin{array}{c} s\left( {c,d} \right)=\left( {1-c} \right)+c\left( {1-d} \right)\left( {1-c} \right)+c^{2}\left( {1-d} \right)^{2}\left( {1-c} \right)+... \\ =\frac{1-c}{1-c(1-d)} \\ \end{array} $$

Then the probability of successful eavesdropping I = n I(d) bits is s(I,c,d) = s(c,d)I/I(d). Therefore

$$s\left( {I,c,d} \right)=\left( {\frac{1-c}{1-c(1-d)}} \right)^{I/I(d)} $$

When I tends to infinity, s tends to 0. That is to say, the protocol is asymptotically secure. For example, select c= 0.5. In Figs. 2 and 3 we have plotted the probability of successful eavesdropping as a function of the information gain I, for c= 0.5 and for different detection probabilities d which Eve can choose. Variable a has two values

Fig. 2
figure 2

The probability of successful eavesdropping as a function of the maximal eavesdropped information, plotted for different detection probabilities d when a= 0.8292

Fig. 3
figure 3

The probability of successful eavesdropping as a function of the maximal eavesdropped information, plotted for different detection probabilities d when a= 0.0722

Note that for d<0.5, Eve only gets one part of the massage and does not know which part he has got. So, this protocol is proved secure.

5 Conclusion

In summary, the protocol based on extended GHZ-W state is secure in theory. Compared with the existing schemes, the protocol has the following differences:

(1) By using extended GHZ-W state as decoy photons, the eavesdropping detection rate reaches 81%, which is higher than OPP.

(2) By using identity authentication, Man-in-the-middle attack can be resisted in the protocol.

(3) For one classical bit, one carrier qubit is transmitted only once. This protocol decreases not only the transmission of carrier qubits but also the number of decoy qubits compared with two-step protocol.

(4) Although the secret message is divides into several parts to transmit, the identity string of Alice and Bob can be reused.