oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel  [PDF]
Qing-yu Cai
Physics , 2003,
Abstract: Based on an EPR pair of qubits and allowing asymptotically secure key distribution, a secure communication protocol is presented. Bob sends either of the EPR pair qubits to Alice. Alice receives the travel qubit. Then she can encode classical information by local unitary operations on this travel qubit. Alice send the qubit back to Bob. Bob can get Alice's information by measurement on the two photons in Bell operator basis. If Eve in line, she has no access to Bob's home qubit. All her operations are restricted to the travel qubit. In order to find out which opeartion Alice performs, Eve's operation must include measurements. The EPR pair qubits are destroyed. Bob's measurement on the two photons in Bell operator basis can help him to judge whether Eve exist in line or not. In this protocal, a public channel is not necessary.
A Flexible Improvement for Ping-Pong Protocol
LIU Yu,HUA Sha&sup,WANG Xiao-Xin&sup,LI Yue&sup,YE Jun&sup,LI Jun,
刘玉
,华沙,王晓鑫,李玥,叶俊,李俊

中国物理快报 , 2006,
Abstract: A deterministic quantum communication protocol, called the ping-pong protocol, has been represented by Bostr m and Felbinger Phys. Rev. Lett. 89 (2002) 187902]. Based on an entangled pair of photons, it allows asymptotically secure key distribution and quasi-secure direct communication. However, it was concluded from our previous research that the experiment realization of this protocol requires two optic paths strictly equivalent for interferometry. Here we propose an improved protocol, which is more flexible and secure for conceivable applications. Its feasibility and security are also discussed.
Correct mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme on ping-pong protocol  [PDF]
Zhanjun Zhang
Physics , 2004,
Abstract: The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected.
The security proof of the ping-pong protocol is wrong  [PDF]
Zhan-jun Zhang
Physics , 2006,
Abstract: The security proof of the ping-pong protocol is wrong.
Deterministic Secure Direct Communication Using Mixed state  [PDF]
Qing-yu Cai
Physics , 2003,
Abstract: We show an improved ping-pong protocol which is based on the protocol showed by Kim Bostrom and Timo Felbinger [Phys. Rev. Lett. 89, 187902 (2002); quant-ph/0209040]. We show that our protocol is asymptotically secure key distribution and quasisecure direct communication using a single photon resource. And this protocol can be can be carried out with great efficiency and speed using today's technology.
Improving the capacity of the ping-pong protocol  [PDF]
Qing-yu Cai,Bai-wen Li
Physics , 2003, DOI: 10.1103/PhysRevA.69.054301
Abstract: We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol. Alice and Bob can use the variable measurement basises in control mode to detect Eve's eavesdropping attack. In message mode, Alice can use one unitary operations to encode two bits information. Bob only needs to perform a Bell type measurement to decode Alice's information. A classical message authentification method can protect this protocol against the eavesdropping hiding in the quantum channel losses and the denial-of-service (DoS) attack.
On Ping-Pong protocol and its variant  [PDF]
Takayuki Miyadera,Masakazu Yoshida,Hideki Imai
Physics , 2009,
Abstract: We discuss the Ping-Pong protocol which was proposed by Bostroem and Felbinger. We derive a simple trade-off inequality between distinguishability of messages for Eve and detectability of Eve for legitimate users. Our inequality holds for arbitrary initial states. That is, even if Eve prepares an initial state, she cannot distinguish messages without being detected. We show that the same inequality holds also on another protocol in which Alice and Bob use one-way quantum communication channel twice.
The ping-pong protocol can be attacked without eavesdropping  [PDF]
Qing-yu Cai
Physics , 2004, DOI: 10.1103/PhysRevLett.91.109801
Abstract: Attack the ping-pong protocol without eavesdropping.
On the Security of the Ping-Pong Protocol  [PDF]
Kim Bostroem,Timo Felbinger
Physics , 2007, DOI: 10.1016/j.physleta.2008.03.048
Abstract: We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.
The security of Ping-Pong protocol  [PDF]
Jian-Chuan Tan,An Min Wang
Physics , 2008,
Abstract: Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.