Game-theoretic perspective of Ping-Pong protocol

被引:7
作者
Kaur, Hargeet [1 ]
Kumar, Atul [1 ]
机构
[1] Indian Inst Technol Jodhpur, Jodhpur, Rajasthan, India
关键词
Ping-Pong protocol; Quantum games; Quantum key distribution; QUANTUM GAMES; COMMUNICATION; CLONING;
D O I
10.1016/j.physa.2017.09.019
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LMO5 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:1415 / 1422
页数:8
相关论文
共 50 条
[11]   Ping-pong protocol based on the orbital angular momentum of light [J].
Farman, Farnaz ;
Tofighi, Sara ;
Bahrampour, Alireza .
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA B-OPTICAL PHYSICS, 2018, 35 (10) :2348-2355
[12]   Ping-Pong Protocol Strengthening against Pavicic's Attack [J].
Zawadzki, Piotr .
COMPUTER NETWORKS, CN 2014, 2014, 431 :205-212
[13]   Improving Wojcik's eavesdropping attack on the ping-pong protocol [J].
Zhang, ZJ ;
Man, ZX ;
Li, Y .
PHYSICS LETTERS A, 2004, 333 (1-2) :46-50
[14]   Comparing the efficiencies of different detect strategies in the ping-pong protocol [J].
Gao Fei ;
Guo FenZhuo ;
Wen QiaoYan ;
Zhu FuChen .
SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2008, 51 (12) :1853-1860
[15]   Increasing the security of the ping-pong protocol by using many mutually unbiased bases [J].
Zawadzki, Piotr ;
Puchala, Zbigniew ;
Miszczak, Jaroslaw Adam .
QUANTUM INFORMATION PROCESSING, 2013, 12 (01) :569-576
[17]   Eavesdropping on the 'ping-pong' quantum communication protocol freely in a noise channel [J].
Deng Fu-Guo ;
Li Xi-Han ;
Li Chun-Yan ;
Zhou Ping ;
Zhou Hong-Yu .
CHINESE PHYSICS, 2007, 16 (02) :277-281
[18]   Security of ping-pong protocol based on pairs of completely entangled qudits [J].
Piotr Zawadzki .
Quantum Information Processing, 2012, 11 :1419-1430
[19]   An Improved "Ping-pong" Protocol Based on Four-qubit Genuine Entangled State [J].
Li Jian ;
Song Danjie ;
Guo Xiaojing ;
Jing Bo .
CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03) :457-460
[20]   Improved Quantum "Ping-Pong" Protocol Based on Extended Three-Particle GHZ State [J].
Li Jian ;
Guo Xaojing ;
Song Danjie ;
Xie Feng ;
Peng Yong .
CHINA COMMUNICATIONS, 2012, 9 (01) :111-116