CRYPTANALYSIS OF THE QSDC PROTOCOL WITHOUT USING PERFECT QUANTUM CHANNEL

被引:1
作者
Gao, Fei [1 ]
Qin, Su-Juan [1 ]
Wen, Qiao-Yan [1 ]
Zhu, Fu-Chen [2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
基金
北京市自然科学基金;
关键词
Quantum secure direct communication; quantum cryptography; cryptanalysis; SECURE DIRECT COMMUNICATION; ATTACK;
D O I
10.1142/S0219749912500542
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the security of quantum secure direct communication without perfect quantum channel. Our analysis is focused on a general individual attack, i.e. entangle-ancilla attack. The sufficient and necessary condition for a successful eavesdropping operation is obtained, and a particular attack is presented, by which Eve can elicit the whole secret without being discovered. Finally we find the root of this loophole and give a possible improvement of this protocol accordingly.
引用
收藏
页数:7
相关论文
共 30 条
[1]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[2]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[3]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[4]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[5]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)
[6]   Secure direct communication with a quantum one-time pad [J].
Deng, FG ;
Long, GL .
PHYSICAL REVIEW A, 2004, 69 (05) :052319-1
[7]   Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block [J].
Deng, FG ;
Long, GL ;
Liu, XS .
PHYSICAL REVIEW A, 2003, 68 (04) :6
[8]   Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs [J].
Deng, Fu-Guo ;
Li, Xi-Han ;
Li, Chun-Yan ;
Zhou, Ping ;
Zhou, Hong-Yu .
PHYSICS LETTERS A, 2006, 359 (05) :359-365
[9]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[10]   Comment on "Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers" [J].
Gao, F ;
Guo, FZ ;
Wen, QY ;
Zhu, FC .
PHYSICAL REVIEW A, 2005, 72 (03)