Increasing the security of the ping-pong protocol by using mutually unbiased bases

نویسندگان

  • Piotr Zawadzki
  • Zbigniew Puchala
  • Jaroslaw Adam Miszczak
چکیده

In this paper we propose an extended version of the ping–pong protocol and study its security. The proposed protocol incorporates the usage of mutually unbiased bases in the control mode. We show that, by increasing the number of bases, it is possible to improve the security of this protocol. We also provide the upper bounds on eavesdropping average non-detection probability and propose a control mode modification that increases the attack detection probability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Citronellyl Butyrate Synthesis in Non-Conventional Media Using Packed-Bed Immobilized Candida Rugosa Lipase Reactor

The synthesis of citronellyl butyrate by direct esterification reaction catalyzed by immobilized lipase from Candida rugosa was studied in a continuous packed bed reactor using n-hexane as organic solvent. Parameters such as residence time, temperature, and pH were examined. The optimum conversion was obtained at a flow rate of 1 ml/min (residence time 8 min), temperature of 50 °C, and pH 7.5. ...

متن کامل

On the Security of Ping-Pong Protocols when Implemented using the RSA

The Security of the RSA implementation of ping-pong protocols is considered. It is shown that the obvious RSA properties, such as "multiplicativity", do not endanger the security of ping-pong protocols. Namely, if a ping-pong protocol is secure in general then its implementation using an "ideal RSA" is also secure.

متن کامل

Eavesdropping on the "ping-pong" quantum communication protocol.

Security of the "ping-pong" quantum communication protocol recently proposed by Boström and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can b...

متن کامل

On the Security of the Ping-Pong Protocol

We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

متن کامل

Quantum Cryptography in Noiseless and Noisy Environment

In this paper, three quantum key distribution protocols will be presented. The first protocol considered is the Ekert protocol for qubit systems based on the famous Einstein-Podolsky-Rosen experiment, and using the Bell inequality as a test of channel security. The Ekert protocol will then be extended to a qutrit system for our second protocol. Finally, a protocol based on mutually complementar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Quantum Information Processing

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2013