Quantum Nonlocallity Protecting the Secure Direct Communication Against Destroying-Travel-Qubit-Type Attack

نویسنده

  • Qing-yu Cai
چکیده

We present a real one-time-pad key communication protocol that allows the secure direct communication. With the quantum nonlocality, Alice and Bob (the communicators) can send message to each other in a deterministic manner by using local operations and a reliable public channel. The security of this protocol is based on the ‘High fidelity implies low entropy’. Actually, the eavesdropper-Eve can use a denial-of-service attack to destroy a quantum communication. In a realistic communication protocol, one has to face such question that Eve destroys the travel qubit to stop the communication. In this protocol, Alice and Bob only use local operations and public channel to communicate with each other in a deterministic manner when the entanglement was successfully shared. In principle, this protocol can protect the communication against the destroying-travelqubit-type attack with the quantum nonlocality, which allows our protocol to be practical. And we discuss its practicality with the current technologies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Nonlocality Protecting Secure Direct Communication Against Denial-of-Service Attack

We present a secure communication protocol which allows direct secure communication. Using quantum nonlocality, information is transferred in a deterministic manner. The security of this protocol is based on the ‘High fidelity implies low entropy’. In fact, the eavesdropper-Eve can use a denial-of-service (DoS) attack to destroy a quantum communication,e.g., she can destroy the travel photon to...

متن کامل

Direct secure communication using step-split Einstein-Podolsky-Rosen pair

A direct secure communication using step-split Einstein-Podolsky-Rosen (EPR) pair is presented. Alice will sends one qubit of the EPR pair to Bob first. Then Bob sends a receipt signal to Alice through public channel. Alice performs her encoding operations on the second qubit and sends the qubit to Bob. Bob performs a Bell type measurement to fraw Alice’s information. If Eve want to eavesdrop A...

متن کامل

Secure direct communication using step-split Einstein-Podolsky-Rosen pair

We presen a secure direct communication protocol by using step-split Einstein-Podolsky-Rosen (EPR) pair. In this communication protocol, Alice first sends one qubit of an EPR pair to Bob. Bob sends a receipt signal to Alice through public channel when he receives Alice’s first qubit. Alice performs her encoding operations on the second qubit and sends this qubit to Bob. Bob performs a Bell-basi...

متن کامل

Deterministic Secure Direct Communication Using Ping-pong protocol without public channel

Based on an EPR pair of qubits and allowing asymptotically secure key distribution, a secure communication protocol is presented. Bob sends either of the EPR pair qubits to Alice. Alice receives the travel qubit. Then she can encode classical information by local unitary operations on this travel qubit. Alice send the qubit back to Bob. Bob can get Alice’s information by measurement on the two ...

متن کامل

Attack the ‘ping-pong’ protocol without eavesdropping

Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004