Quantum Nonlocallity Protecting the Secure Direct Communication Against Destroying-Travel-Qubit-Type Attack
نویسنده
چکیده
We present a real one-time-pad key communication protocol that allows the secure direct communication. With the quantum nonlocality, Alice and Bob (the communicators) can send message to each other in a deterministic manner by using local operations and a reliable public channel. The security of this protocol is based on the ‘High fidelity implies low entropy’. Actually, the eavesdropper-Eve can use a denial-of-service attack to destroy a quantum communication. In a realistic communication protocol, one has to face such question that Eve destroys the travel qubit to stop the communication. In this protocol, Alice and Bob only use local operations and public channel to communicate with each other in a deterministic manner when the entanglement was successfully shared. In principle, this protocol can protect the communication against the destroying-travelqubit-type attack with the quantum nonlocality, which allows our protocol to be practical. And we discuss its practicality with the current technologies.
منابع مشابه
Quantum Nonlocality Protecting Secure Direct Communication Against Denial-of-Service Attack
We present a secure communication protocol which allows direct secure communication. Using quantum nonlocality, information is transferred in a deterministic manner. The security of this protocol is based on the ‘High fidelity implies low entropy’. In fact, the eavesdropper-Eve can use a denial-of-service (DoS) attack to destroy a quantum communication,e.g., she can destroy the travel photon to...
متن کاملDirect secure communication using step-split Einstein-Podolsky-Rosen pair
A direct secure communication using step-split Einstein-Podolsky-Rosen (EPR) pair is presented. Alice will sends one qubit of the EPR pair to Bob first. Then Bob sends a receipt signal to Alice through public channel. Alice performs her encoding operations on the second qubit and sends the qubit to Bob. Bob performs a Bell type measurement to fraw Alice’s information. If Eve want to eavesdrop A...
متن کاملSecure direct communication using step-split Einstein-Podolsky-Rosen pair
We presen a secure direct communication protocol by using step-split Einstein-Podolsky-Rosen (EPR) pair. In this communication protocol, Alice first sends one qubit of an EPR pair to Bob. Bob sends a receipt signal to Alice through public channel when he receives Alice’s first qubit. Alice performs her encoding operations on the second qubit and sends this qubit to Bob. Bob performs a Bell-basi...
متن کاملDeterministic Secure Direct Communication Using Ping-pong protocol without public channel
Based on an EPR pair of qubits and allowing asymptotically secure key distribution, a secure communication protocol is presented. Bob sends either of the EPR pair qubits to Alice. Alice receives the travel qubit. Then she can encode classical information by local unitary operations on this travel qubit. Alice send the qubit back to Bob. Bob can get Alice’s information by measurement on the two ...
متن کاملAttack the ‘ping-pong’ protocol without eavesdropping
Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...
متن کامل