RETRACTED ARTICLE: Can Two-Way Direct Communication Protocols Be Considered Secure?

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Can Two-Way Direct Communication Protocols Be Considered Secure?

We consider attacks on two-way quantum key distribution protocols in which an undetectable eavesdropper copies all messages in the message mode. We show that under the attacks, there is no disturbance in the message mode and that the mutual information between the sender and the receiver is always constant and equal to one. It follows that recent proofs of security for two-way protocols cannot ...

متن کامل

Efficient Controlled Quantum Secure Direct Communication Protocols

We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Bro...

متن کامل

Economically Improving Message-Unilaterally-Transmitted Quantum Secure Direct Communication to Realize Two-Way Communication

We present a subtle idea to economically improve message-unilaterally-transmitted quantum secure direct communication (QSDC) protocols to realize two-way secure direct communication. Suppose Alice and Bob securely share a secret key. When the message sender, say, Alice, wants to send her secret messages to Bob, she can first use the secret key to encrypt her secret messages, then she publicly s...

متن کامل

Can Ad Hoc Routing Protocols be Shown Provably Secure?

Formal security analysis of ad hoc routing protocols has historically been lacking, normally following non-formal inspection to identify flaws and attacks. This leads to a cycle of published development, attack, development, attack, ... . Recent formal models and methods attempt to introduce rigor into the analysis approach. We discuss flaws in a previously proposed security framework based on ...

متن کامل

Comparing Two-way Relay Protocols for Satellite Communication

Protocols applicable to bidirectional data transfer via satellite between two earth terminals are analyzed with respect to their achievable rate regions, an information-theoretic comparison. Protocols include amplify-forward, requiring no special satellite processing, and several variations of decode-forward, which necessitate satellite demodulation, decoding, and re-encoding. All such protocol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nanoscale Research Letters

سال: 2017

ISSN: 1931-7573,1556-276X

DOI: 10.1186/s11671-017-2314-3