oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Eavesdropping on the "ping-pong" quantum communication protocol  [PDF]
Antoni Wojcik
Physics , 2002, DOI: 10.1103/PhysRevLett.90.157901
Abstract: The proposed eavesdropping scheme reveals that the quantum communication protocol recently presented by Bostrom and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)] is not secure as far as quantum channel losses are taken into account.
A simple eavesdropping strategy of BB84 protocol  [PDF]
Guihua Zeng
Physics , 1998,
Abstract: A simplified eavesdropping-strategy for BB84 protocol in quantum cryptography (refer to quant-ph/9812022) is proposed. This scheme implements by the `indirect copying' technology. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.
Eavesdropping on the Bostroem-Filbinger Communication Protocol in Noisy Quantum Channel  [PDF]
Qing-yu Cai
Physics , 2004,
Abstract: We show an eavesdropping scheme on Bostr\UNICODE{0xf6}m-Felbinger communication protocol (called ping-pong protocol) [Phys. Rev. Lett. 89, 187902 (2002)] in an ideal quantum channel. A measurement attack can be perfectly used to eavesdrop Alice's information instead of a most general quantum operation attack. In a noisy quantum channel, the direct communication is forbidden. We present a quantum key distribution protocol based on the ping-pong protocol, which can be used in a low noisy quantum channel. And we give a weak upper bound on the bit-error ratio that the detection probability $d$ should be lower than 0.11, which is a requirement criterion when we utilize the ping-pong protocol in a real communication.
Eavesdropping on the `ping-pong'' quantum communication protocol freely in a noise channel
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel

Deng Fu-Guo,Li Xi-Han,Li Chun-Yan,Zhou Ping,Zhou Hong-Yu,
邓富国
,李熙涵,李春燕,周萍,周宏余

中国物理 B , 2007,
Abstract: We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostr\"{o} m and Felbinger Phys. Rev. Lett. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol.
Eavesdropping on the "Ping-Pong" Quantum Communication Protocol Freely in a Noise Channel  [PDF]
Fu-Guo Deng,Xi-Han Li,Chun-Yan Li,Ping Zhou,Hong-Yu Zhou
Physics , 2005, DOI: 10.1088/1009-1963/16/2/001
Abstract: We introduce an attack scheme for eavesdropping the ping-pong quantum communication protocol proposed by Bostr$\ddot{o}$m and Felbinger [Phys. Rev. Lett. \textbf{89}, 187902 (2002)] freely in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in a same state, and measures the photons return with the measuring basis with which Eve prepares the fake signal except for one photon. This attack increase neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol.
Secure Direct Communication based on Ping-pong Protocol  [PDF]
Arti Chamoli,C. M. Bhandari
Physics , 2007,
Abstract: Communication security with quantum key distribution has been one of the important features of quantum information theory. A novel concept of secured direct communication has been the next step forward without the need to establish any shared secret key. The present paper is based on the ping-pong protocol with three particle GHZ state as the initial state where the receiver can simultaneously receive information from two parties. Possible eavesdropping on the travelling particle has been examined.
Entanglement swapping secures multiparty quantum communication  [PDF]
Juhui Lee,Soojoon Lee,Jaewan Kim,Sung Dahm Oh
Physics , 2003, DOI: 10.1103/PhysRevA.70.032305
Abstract: Extending the eavesdropping strategy devised by Zhang, Li and Guo [Phys. Rev. A 63, 036301 (2001)], we show that the multiparty quantum communication protocol based on entanglement swapping, which was proposed by Cabello [quant-ph/0009025], is not secure. We modify the protocol so that entanglement swapping can secure multiparty quantum communication, such as multiparty quantum key distribution and quantum secret sharing of classical information, and show that the modified protocol is secure against the Zhang-Li-Guo's strategy for eavesdropping as well as the basic intercept-resend attack.
A New Quantum Secure Direct Communication Protocol Using Decoherence-Free Subspace
GE Hua,LIU Wen-Yu,
葛华
,刘文予

中国物理快报 , 2007,
Abstract: A new quantum secure direct communication (QSDC) protocol is proposed byusing decoherence free subspace (DFS) to avoid insecurity of the presentQSDC protocols in a quantum noise channel. This protocol makes it easily for Bob and Alice to find eavesdropping in channel because the collective dephasing noise disappears in DFS. The probability of successful attack by Eve in this protocol is smaller than in BB84 protocol. Thus this protocol realizes secure QSDC and is feasible with present-day technology.
Deterministic Secure Direct Bidirectional Communication Protocol  [PDF]
Zhanjun Zhang
Physics , 2004,
Abstract: In this letter a deterministic secure direct bidirectional communication protocol is proposed by using the quantum entanglement and local unitary operations on one photon of the Einstein-Podolsky-Rosen (EPR) photon pair.
Eavesdropping in Semiquantum Key Distribution Protocol  [PDF]
Arpita Maitra,Goutam Paul
Computer Science , 2012, DOI: 10.1016/j.ipl.2013.03.008
Abstract: In semiquantum key-distribution (Boyer et al.) Alice has the same capability as in BB84 protocol, but Bob can measure and prepare qubits only in $\{|0\rangle, |1\rangle\}$ basis and reflect any other qubit. We study an eavesdropping strategy on this scheme that listens to the channel in both the directions. With the same level of disturbance induced in the channel, Eve can extract more information using our two-way strategy than what can be obtained by the direct application of one-way eavesdropping in BB84.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.