Improving Wójcik's eavesdropping attack on the ping-pong protocol
From MaRDI portal
Publication:2463104
DOI10.1016/j.physleta.2004.10.025zbMath1123.94371OpenAlexW1990678155MaRDI QIDQ2463104
Yong Li, Zhong-Xiao Man, Zhan-Jun Zhang
Publication date: 5 December 2007
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.physleta.2004.10.025
Related Items (46)
Probabilistic authenticated quantum dialogue ⋮ Eavesdropping on quantum secure direct communication in quantum channels with arbitrarily low loss rate ⋮ Bidirectional quantum secure direct communication in trapped ion systems ⋮ Quantum communication in the ion-trapped system ⋮ CONTROLLED DENSE CODING WITH CLUSTER STATE ⋮ GENERALIZED THREE-PARTY QUBIT OPERATION SHARING ⋮ THE PING-PONG PROTOCOL WITH A PRIOR PRIVACY AMPLIFICATION ⋮ Game-theoretic perspective of Ping-Pong protocol ⋮ Three-particle deterministic secure and high bit-rate direct quantum communication protocol ⋮ MULTIPARTY QUANTUM SECRET SHARING OF SECURE DIRECT COMMUNICATION WITH HIGH-DIMENSIONAL QUANTUM SUPERDENSE CODING ⋮ Quantum watermarking using entanglement swapping ⋮ Quantum Fisher information in the symmetric pure three-qubit state ⋮ Deterministic secure quantum communication with collective detection using single photons ⋮ Controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding ⋮ Improving security of the ping-pong protocol ⋮ Security of ping-pong protocol based on pairs of completely entangled qudits ⋮ Ping-pong quantum key distribution with trusted noise: non-Markovian advantage ⋮ Quantum secure direct communication by swapping entanglements of \(3\times 3\)-dimensional Bell states ⋮ Quantum secure direct communication based on four-Qubit cluster states ⋮ Dense coding with cluster state via local measurements ⋮ On the security of the ping-pong protocol ⋮ Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state ⋮ Teleportation with mixing state from two Bell states due to qubit confusion ⋮ Cryptanalysis and improvement of multiparty quantum secret sharing schemes ⋮ Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states ⋮ PERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION ⋮ Threshold quantum secure direct communication without entanglement ⋮ Efficient quantum dialogue using single photons ⋮ DETERMINISTIC SECURE QUANTUM COMMUNICATION WITH FOUR-QUBIT W STATES ⋮ Threshold proxy quantum signature scheme with threshold shared verification ⋮ Cryptanalysis and improvement on authenticated semi-quantum direct communication protocol using Bell states ⋮ Deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad ⋮ Decoherence can help quantum cryptographic security ⋮ QUANTUM SECURE DIRECT COMMUNICATION WITH ONLY SEPARATE MEASUREMENTS IN DRIVEN CAVITY QED ⋮ Bidirectional quantum secret sharing and secret splitting with polarized single photons ⋮ Controlled quantum secure direct communication with local separate measurements in cavity QED ⋮ Controlled dense coding using generalized GHZ-type state ⋮ An improved protocol for controlled deterministic secure quantum communication using five-qubit entangled state ⋮ QUANTUM STATE SPLITTING WITH YEO–CHUA GENUINE ENTANGLED STATE ⋮ Secure direct communication based on non-orthogonal entangled pairs and local measurement ⋮ Entanglement swapping and detection in the trapped-ion systems ⋮ AN EFFICIENT DETERMINISTIC SECURE QUANTUM COMMUNICATION SCHEME WITH CLUSTER STATE ⋮ QUANTUM DIALOGUE BY USING THE TWO-QUTRIT ENTANGLED STATES ⋮ BIDIRECTIONAL QUANTUM SECURE DIRECT COMMUNICATION IN DRIVEN CAVITY QED ⋮ Secure direct communication based on ping-pong protocol ⋮ Intercept-and-resend attack and improvement of semiquantum secure direct communication using EPR pairs
Cites Work
- Quantum cryptography without public announcement of bases
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Quantum Cryptography Based on Orthogonal States
- Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps
- Quantum cryptography
This page was built for publication: Improving Wójcik's eavesdropping attack on the ping-pong protocol