oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Eavesdropping on the "Ping-Pong" Quantum Communication Protocol Freely in a Noise Channel  [PDF]
Fu-Guo Deng,Xi-Han Li,Chun-Yan Li,Ping Zhou,Hong-Yu Zhou
Physics , 2005, DOI: 10.1088/1009-1963/16/2/001
Abstract: We introduce an attack scheme for eavesdropping the ping-pong quantum communication protocol proposed by Bostr$\ddot{o}$m and Felbinger [Phys. Rev. Lett. \textbf{89}, 187902 (2002)] freely in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in a same state, and measures the photons return with the measuring basis with which Eve prepares the fake signal except for one photon. This attack increase neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol.
Secure Direct Communication based on Ping-pong Protocol  [PDF]
Arti Chamoli,C. M. Bhandari
Physics , 2007,
Abstract: Communication security with quantum key distribution has been one of the important features of quantum information theory. A novel concept of secured direct communication has been the next step forward without the need to establish any shared secret key. The present paper is based on the ping-pong protocol with three particle GHZ state as the initial state where the receiver can simultaneously receive information from two parties. Possible eavesdropping on the travelling particle has been examined.
Eavesdropping on the "ping-pong" quantum communication protocol  [PDF]
Antoni Wojcik
Physics , 2002, DOI: 10.1103/PhysRevLett.90.157901
Abstract: The proposed eavesdropping scheme reveals that the quantum communication protocol recently presented by Bostrom and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)] is not secure as far as quantum channel losses are taken into account.
The security proof of the ping-pong protocol is wrong  [PDF]
Zhan-jun Zhang
Physics , 2006,
Abstract: The security proof of the ping-pong protocol is wrong.
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel  [PDF]
Qing-yu Cai
Physics , 2003,
Abstract: Based on an EPR pair of qubits and allowing asymptotically secure key distribution, a secure communication protocol is presented. Bob sends either of the EPR pair qubits to Alice. Alice receives the travel qubit. Then she can encode classical information by local unitary operations on this travel qubit. Alice send the qubit back to Bob. Bob can get Alice's information by measurement on the two photons in Bell operator basis. If Eve in line, she has no access to Bob's home qubit. All her operations are restricted to the travel qubit. In order to find out which opeartion Alice performs, Eve's operation must include measurements. The EPR pair qubits are destroyed. Bob's measurement on the two photons in Bell operator basis can help him to judge whether Eve exist in line or not. In this protocal, a public channel is not necessary.
Faithful quantum secure direct communication protocol against collective noise

Yang Jing,Wang Chuan,Zhang Ru,

中国物理 B , 2010,
Abstract: An improved quantum secure direct communication (QSDC) protocol is proposed in this paper. Blocks of entangled photon pairs are transmitted in two steps in which secret messages are transmitted directly. The single logical qubits and unitary operations under decoherence free subspaces are presented and the generalized Bell states are constructed which are immune to the collective noise. Two steps of qubit transmission are used in this protocol to guarantee the security of communication. The security of the protocol against various attacks are discussed.
A Flexible Improvement for Ping-Pong Protocol
LIU Yu,HUA Sha&sup,WANG Xiao-Xin&sup,LI Yue&sup,YE Jun&sup,LI Jun,
刘玉
,华沙,王晓鑫,李玥,叶俊,李俊

中国物理快报 , 2006,
Abstract: A deterministic quantum communication protocol, called the ping-pong protocol, has been represented by Bostr m and Felbinger Phys. Rev. Lett. 89 (2002) 187902]. Based on an entangled pair of photons, it allows asymptotically secure key distribution and quasi-secure direct communication. However, it was concluded from our previous research that the experiment realization of this protocol requires two optic paths strictly equivalent for interferometry. Here we propose an improved protocol, which is more flexible and secure for conceivable applications. Its feasibility and security are also discussed.
Improving the capacity of the ping-pong protocol  [PDF]
Qing-yu Cai,Bai-wen Li
Physics , 2003, DOI: 10.1103/PhysRevA.69.054301
Abstract: We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol. Alice and Bob can use the variable measurement basises in control mode to detect Eve's eavesdropping attack. In message mode, Alice can use one unitary operations to encode two bits information. Bob only needs to perform a Bell type measurement to decode Alice's information. A classical message authentification method can protect this protocol against the eavesdropping hiding in the quantum channel losses and the denial-of-service (DoS) attack.
On Ping-Pong protocol and its variant  [PDF]
Takayuki Miyadera,Masakazu Yoshida,Hideki Imai
Physics , 2009,
Abstract: We discuss the Ping-Pong protocol which was proposed by Bostroem and Felbinger. We derive a simple trade-off inequality between distinguishability of messages for Eve and detectability of Eve for legitimate users. Our inequality holds for arbitrary initial states. That is, even if Eve prepares an initial state, she cannot distinguish messages without being detected. We show that the same inequality holds also on another protocol in which Alice and Bob use one-way quantum communication channel twice.
The ping-pong protocol can be attacked without eavesdropping  [PDF]
Qing-yu Cai
Physics , 2004, DOI: 10.1103/PhysRevLett.91.109801
Abstract: Attack the ping-pong protocol without eavesdropping.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.