The “Ping-Pong” Protocol Can Be Attacked without Eavesdropping
نویسندگان
چکیده
منابع مشابه
Attack the ‘ping-pong’ protocol without eavesdropping
Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...
متن کاملEavesdropping on the "ping-pong" quantum communication protocol.
Security of the "ping-pong" quantum communication protocol recently proposed by Boström and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can b...
متن کاملImproving the capacity of the ping-pong protocol
Since Bennett and Brassard presented the pioneer quantum key distribution (QKD) protocol in 1984 [1], there are a lot of theoretical QKD schemes [1-12] today. Recently, Beige et al. proposed a quantum secure direct communication scheme [13], which allows messages communicated directly without first establishing a random key to encrypt them. Bostroem and Felbingeer presented a ping-pong protocol...
متن کاملOn the Security of the Ping-Pong Protocol
We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.
متن کاملOn the Security of Quantum Key Distribution Ping-Pong Protocol
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2003
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.91.109801