On the Security of Quantum Key Distribution Ping-Pong Protocol
نویسندگان
چکیده
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gained for an eavesdropper and error rate, from the related works for an attack model.
منابع مشابه
Security of the quantum direct communication based on pairs of completely entangled qudits
Quantum secure direct communication protocols offer confidential transmission of classic information over the quantum channel without a prior key agreement. The ping-pong based protocols provide asymptotic security and detailed analysis of the security level provided by each variant of the protocol is required. The paper presents a general method of calculation of the eavesdropped information a...
متن کاملImproving the capacity of the ping-pong protocol
Since Bennett and Brassard presented the pioneer quantum key distribution (QKD) protocol in 1984 [1], there are a lot of theoretical QKD schemes [1-12] today. Recently, Beige et al. proposed a quantum secure direct communication scheme [13], which allows messages communicated directly without first establishing a random key to encrypt them. Bostroem and Felbingeer presented a ping-pong protocol...
متن کاملEavesdropping on the "ping-pong" quantum communication protocol.
Security of the "ping-pong" quantum communication protocol recently proposed by Boström and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can b...
متن کاملOn the Security of the Ping-Pong Protocol
We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.
متن کاملOne Step Quantum Key Distribution Based on EPR Entanglement
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple t...
متن کامل