scispace - formally typeset
Journal ArticleDOI

Improving Wojcik's eavesdropping attack on the ping-pong protocol

Reads0
Chats0
TLDR
The improved scheme only induces half of the eavesdropping-induced channel loss in Wojcik's scheme, therefore, in a larger domain of the quantum channel transmission efficiency eta, the eavesdropper Eve can attack all the transmitted bits.
About
This article is published in Physics Letters A.The article was published on 2004-11-29. It has received 119 citations till now. The article focuses on the topics: Eavesdropping.

read more

Citations
More filters
Journal ArticleDOI

Improving the security of multiparty quantum secret sharing against Trojan horse attack

TL;DR: This work analyzed the security of the multiparty quantum secret sharing protocol and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse.
Journal ArticleDOI

Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state

TL;DR: A multi-step quantum secure direct communication protocol using blocks of multi-particle maximally entangled state is proposed, which has the advantage of high efficiency and high source capacity.
Journal ArticleDOI

Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations

TL;DR: A theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding, where the server of the network provides the service for preparing and measuring the Bell states, and the users encode the states with local unitary operations.
Journal ArticleDOI

Bidirectional quantum secret sharing and secret splitting with polarized single photons

TL;DR: In this paper, the authors presented a quantum secret sharing and secret splitting protocol with single photons running forth and back between the participating parties, which has a high intrinsic efficiency, namely all photons except those chosen for eavesdropping check could be used for sharing secret.
Journal ArticleDOI

Three-step semiquantum secure direct communication protocol

TL;DR: A method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed, and the proposed SQSDC protocol can be implemented with the existing techniques.
References
More filters
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

TL;DR: Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Journal ArticleDOI

Quantum Cryptography

TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.
Journal ArticleDOI

Quantum cryptography using any two nonorthogonal states

TL;DR: It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.
Journal ArticleDOI

Quantum cryptography without Bell's theorem.

TL;DR: A related but simpler EPR scheme is described and it is proved it secure against more general attacks, including substitution of a fake EPR source and the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs.
Journal ArticleDOI

Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block

TL;DR: A protocol for quantum secure direct communication using blocks of Einstein-Podolsky-Rosen (EPR) pairs is proposed, and a set of ordered N EPR pairs is used as a data block for sending secret message directly.
Related Papers (5)
Trending Questions (1)
How do I ping an Exchange server?

The improvement of the ping-pong protocol security produced by Wojcik's is also suitable for our eavesdropping attack.