Eavesdropping on the Boström-Felbinger Communication Protocol in Noisy Quantum Channel
نویسنده
چکیده
We show an eavesdropping scheme on Boström-Felbinger communication protocol ( called pingpong protocol ) [Phys. Rev. Lett. 89, 187902 (2002)] in an ideal quantum channel. A measurement attack can be perfectly used to eavesdrop Alice’s information instead of a most general quantum operation attack. In a noisy quantum channel, the direct communication is forbidden. We present a quantum key distribution protocol based on the ping-pong protocol, which can be used in a low noisy quantum channel. And we give a weak upper bound on the bit-error ratio that the detection probability d should be lower than 0.11, which is a requirement criterion when we utilize the pingpong protocol in a real communication.
منابع مشابه
Eavesdropping on the "ping-pong" quantum communication protocol.
Security of the "ping-pong" quantum communication protocol recently proposed by Boström and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can b...
متن کاملSecure Bidirectional Quantum Communication Protocol without Quantum Channel
In this letter we propose a theoretical deterministic secure direct bidirectional quantum communication protocol by using swapping quantum entanglement and local unitary operations, in which the quantum channel for photon transmission can be discarded, hence any attack with or without eavesdropping or even the destructive attack without scruple is impossible. Much attention [1-6] has been focus...
متن کاملDeterministic secure direct communication using entanglement.
A novel secure communication protocol is presented, based on an entangled pair of qubits and allowing asymptotically secure key distribution and quasisecure direct communication. Since the information is transferred in a deterministic manner, no qubits have to be discarded. The transmission of information is instantaneous, i.e., the information can be decoded during the transmission. The securi...
متن کاملAttack the ‘ping-pong’ protocol without eavesdropping
Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...
متن کاملOn the Security of the Ping-Pong Protocol
We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.
متن کامل