Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]

被引:28
作者
Yang, Yu-Guang [1 ,3 ,4 ]
Teng, Yi-Wei [1 ]
Chai, Hai-Ping [1 ]
Wen, Qiao-Yan [2 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
[4] Chinese Acad Sci, State Key Lab Informat Secur, Grad Univ, Beijing 100049, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Quantum secure direct communication; GHZ state; Ping-Pong protocol; Decoy photons;
D O I
10.1007/s11128-010-0199-5
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A. Chamoli and C.M. Bhandari presented a secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]. M.Naseri analyzed its security and pointed out that in this protocol any dishonest party can obtain all the other one's secret message with zero risk of being detected by using fake entangled particles (FEP attack) [M. Naseri, Quantum Inf. Process. online]. In this letter, we reexamine the protocol's security and discover that except the FEP attack, using a special property of GHZ states, any one dishonest party can also take a special attack, i.e., double-CNOT(Controlled NOT) attack. Finally, a denial-of-service attack is also discussed.
引用
收藏
页码:317 / 323
页数:7
相关论文
共 21 条
[1]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[2]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[3]   Improving the capacity of the Bostrom-Felbinger protocol [J].
Cai, QY ;
Li, BW .
PHYSICAL REVIEW A, 2004, 69 (05) :054301-1
[4]   Secure direct communication based on ping-pong protocol [J].
Chamoli, Arti ;
Bhandari, C. M. .
QUANTUM INFORMATION PROCESSING, 2009, 8 (04) :347-356
[5]   Secure direct communication with a quantum one-time pad [J].
Deng, FG ;
Long, GL .
PHYSICAL REVIEW A, 2004, 69 (05) :052319-1
[6]   Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block [J].
Deng, FG ;
Long, GL ;
Liu, XS .
PHYSICAL REVIEW A, 2003, 68 (04) :6
[7]   Comment on "Quantum key distribution for d-level systems with generalized Bell states" -: art. no. 066301 [J].
Gao, F ;
Guo, FZ ;
Wen, QY ;
Zhu, FC .
PHYSICAL REVIEW A, 2005, 72 (06)
[8]   Comment on "Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers" [J].
Gao, F ;
Guo, FZ ;
Wen, QY ;
Zhu, FC .
PHYSICAL REVIEW A, 2005, 72 (03)
[9]  
Gao F, 2007, PHYS LETT A, V360, P748, DOI 10.1016/j.physleta.2006.08.016
[10]   Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state [J].
Gao, Fei ;
Qin, Su-Juan ;
Wen, Qiao-Yan ;
Zhu, Fu-Chen .
OPTICS COMMUNICATIONS, 2010, 283 (01) :192-195