Eavesdropping on the "ping-pong" quantum communication protocol -: art. no. 157901

被引:313
|
作者
Wójcik, A [1 ]
机构
[1] Adam Mickiewicz Univ Poznan, Fac Phys, PL-61614 Poznan, Poland
关键词
D O I
10.1103/PhysRevLett.90.157901
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Security of the "ping-pong" quantum communication protocol recently proposed by Bostrom and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can be hidden in the channel losses if one replaces the original lossy channel with a less lossy one. Finally, a possible improvement of the ping-pong protocol security is proposed.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Security of ping-pong protocol based on pairs of completely entangled qudits
    Piotr Zawadzki
    Quantum Information Processing, 2012, 11 : 1419 - 1430
  • [42] Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]
    Yang, Yu-Guang
    Teng, Yi-Wei
    Chai, Hai-Ping
    Wen, Qiao-Yan
    QUANTUM INFORMATION PROCESSING, 2011, 10 (03) : 317 - 323
  • [43] Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]
    Yu-Guang Yang
    Yi-Wei Teng
    Hai-Ping Chai
    Qiao-Yan Wen
    Quantum Information Processing, 2011, 10 : 317 - 323
  • [44] Sizzling chops and devilish spins - Ping-pong and the art of staying alive
    Retica, A
    NEW YORK TIMES BOOK REVIEW, 2002, : 23 - 23
  • [45] Quantum identity authentication based on ping-pong technique without entanglements
    Yuan, Hao
    Liu, Yi-min
    Pan, Guo-zhu
    Zhang, Gang
    Zhou, Jun
    Zhang, Zhan-jun
    QUANTUM INFORMATION PROCESSING, 2014, 13 (11) : 2535 - 2549
  • [46] Secure direct communication based on ping–pong protocol
    Arti Chamoli
    C. M. Bhandari
    Quantum Information Processing, 2009, 8 : 347 - 356
  • [47] Quantum identity authentication based on ping-pong technique without entanglements
    Hao Yuan
    Yi-min Liu
    Guo-zhu Pan
    Gang Zhang
    Jun Zhou
    Zhan-jun Zhang
    Quantum Information Processing, 2014, 13 : 2535 - 2549
  • [48] An Improved Security Detection Strategy Based on W State in "Ping-pong" Protocol
    Li Jian
    Song Danjie
    Guo Xiaojing
    Jing Bo
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (01): : 117 - 120
  • [49] An improved security detection strategy based on w state in ping-pong protocol
    Li, J. (lijian@bupt.edu.cn), 1600, Chinese Institute of Electronics (21):
  • [50] Improved Quantum “Ping-Pong” Protocol Based on Five-Qubit GHZ State and Classical CNOT Operation
    Jian Li
    Dan-Jie Song
    Xiao-Jing Guo
    Bo Jing
    International Journal of Theoretical Physics, 2012, 51 : 292 - 302