Improving Wojcik's eavesdropping attack on the ping-pong protocol

被引:117
|
作者
Zhang, ZJ [1 ]
Man, ZX
Li, Y
机构
[1] Chinese Acad Sci, Wuhan Inst Phys & Math, Wuhan 430071, Peoples R China
[2] Anhui Univ, Sch Phys & Mat Sci, Hefei 230039, Peoples R China
[3] Cent China Normal Univ, Dept Phys, Wuhan 430079, Peoples R China
基金
中国国家自然科学基金;
关键词
ping-pong protocol; security; transmission efficiency;
D O I
10.1016/j.physleta.2004.10.025
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme only induces half of the eavesdropping-induced channel loss in Wojcik's scheme, therefore, in a larger domain of the quantum channel transmission efficiency eta, i.e., [0, 75%], the eavesdropper Eve can attack all the transmitted bits. The improvement of the ping-pong protocol security produced by Wojcik's is also suitable for our eavesdropping attack. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:46 / 50
页数:5
相关论文
共 50 条
  • [1] Improved Wojcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss
    Zhang, ZJ
    Li, Y
    Man, ZX
    PHYSICS LETTERS A, 2005, 341 (5-6) : 385 - 389
  • [2] Eavesdropping on the ping-pong quantum communication protocol
    Woájcik, Antoni
    Physical Review Letters, 2003, 90 (15) : 1 - 157901
  • [3] The "ping-pong" protocol can be attacked without eavesdropping
    Cai, QY
    PHYSICAL REVIEW LETTERS, 2003, 91 (10)
  • [4] Ping-Pong Protocol Eavesdropping in Almost Perfect Channels
    Zawadzki, Piotr
    COMPUTER NETWORKS, CN 2016, 2016, 608 : 260 - 268
  • [5] Improving security of the ping-pong protocol
    Piotr Zawadzki
    Quantum Information Processing, 2013, 12 : 149 - 155
  • [6] Improving security of the ping-pong protocol
    Zawadzki, Piotr
    QUANTUM INFORMATION PROCESSING, 2013, 12 (01) : 149 - 155
  • [7] Ping-Pong Protocol Strengthening against Pavicic's Attack
    Zawadzki, Piotr
    COMPUTER NETWORKS, CN 2014, 2014, 431 : 205 - 212
  • [8] Eavesdropping on the 'ping-pong' quantum communication protocol freely in a noise channel
    Deng Fu-Guo
    Li Xi-Han
    Li Chun-Yan
    Zhou Ping
    Zhou Hong-Yu
    CHINESE PHYSICS, 2007, 16 (02): : 277 - 281
  • [9] A "Ping-Pong" Protocol with Authentication
    Chen Zuning
    Qin Zheng
    ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 4, 2010, : 50 - +
  • [10] On the security of the ping-pong protocol
    Bostroem, Kim
    Felbinger, Timo
    PHYSICS LETTERS A, 2008, 372 (22) : 3953 - 3956