Comparing the efficiencies of different detect strategies in the ping-pong protocol

被引:0
|
作者
GAO Fei1
2 School of Sciences
3 National Laboratory for Modern Communications
机构
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
quantum key distribution; quantum cryptography; quantum secure direct communication;
D O I
暂无
中图分类号
O413 [量子论]; TN915.04 [通信规程、通信协议];
学科分类号
070201 ; 0810 ; 081001 ;
摘要
The way to compare the efficiencies of different detect strategies (DSs) in the "ping-pong" protocol is studied. The trade-off between information gain and dis- turbance is calculated and compared for different DSs. The comparison result primely tallies with our intuitional analysis. It is shown that the analysis of this trade-off is a feasible way to compare the performances of different DSs in theory.
引用
收藏
页码:1853 / 1860
页数:8
相关论文
共 27 条
  • [21] Ping-pong quantum key distribution with trusted noise: non-Markovian advantage
    Shrikant Utagi
    R. Srikanth
    Subhashish Banerjee
    Quantum Information Processing, 2020, 19
  • [22] Comment on: “secure direct communication based on ping-pong protocol” [Quantum Inf. Process. 8, 347 (2009)]
    Mosayeb Naseri
    Quantum Information Processing, 2010, 9 : 693 - 698
  • [23] Increasing the security of the ping–pong protocol by using many mutually unbiased bases
    Piotr Zawadzki
    Zbigniew Puchała
    Jarosław Adam Miszczak
    Quantum Information Processing, 2013, 12 : 569 - 576
  • [24] Ping-pong quantum key distribution with trusted noise: non-Markovian advantage
    Utagi, Shrikant
    Srikanth, R.
    Banerjee, Subhashish
    QUANTUM INFORMATION PROCESSING, 2020, 19 (10)
  • [25] Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]
    Yang, Yu-Guang
    Teng, Yi-Wei
    Chai, Hai-Ping
    Wen, Qiao-Yan
    QUANTUM INFORMATION PROCESSING, 2011, 10 (03) : 317 - 323
  • [26] Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]
    Yu-Guang Yang
    Yi-Wei Teng
    Hai-Ping Chai
    Qiao-Yan Wen
    Quantum Information Processing, 2011, 10 : 317 - 323
  • [27] How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
    Pavicic, Mladen
    ENTROPY, 2021, 23 (02) : 1 - 10