Improving Wójcik's eavesdropping attack on the ping-pong protocol

From MaRDI portal
Revision as of 00:32, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2463104

DOI10.1016/j.physleta.2004.10.025zbMath1123.94371OpenAlexW1990678155MaRDI QIDQ2463104

Yong Li, Zhong-Xiao Man, Zhan-Jun Zhang

Publication date: 5 December 2007

Published in: Physics Letters. A (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.physleta.2004.10.025




Related Items (46)

Probabilistic authenticated quantum dialogueEavesdropping on quantum secure direct communication in quantum channels with arbitrarily low loss rateBidirectional quantum secure direct communication in trapped ion systemsQuantum communication in the ion-trapped systemCONTROLLED DENSE CODING WITH CLUSTER STATEGENERALIZED THREE-PARTY QUBIT OPERATION SHARINGTHE PING-PONG PROTOCOL WITH A PRIOR PRIVACY AMPLIFICATIONGame-theoretic perspective of Ping-Pong protocolThree-particle deterministic secure and high bit-rate direct quantum communication protocolMULTIPARTY QUANTUM SECRET SHARING OF SECURE DIRECT COMMUNICATION WITH HIGH-DIMENSIONAL QUANTUM SUPERDENSE CODINGQuantum watermarking using entanglement swappingQuantum Fisher information in the symmetric pure three-qubit stateDeterministic secure quantum communication with collective detection using single photonsControlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense codingImproving security of the ping-pong protocolSecurity of ping-pong protocol based on pairs of completely entangled quditsPing-pong quantum key distribution with trusted noise: non-Markovian advantageQuantum secure direct communication by swapping entanglements of \(3\times 3\)-dimensional Bell statesQuantum secure direct communication based on four-Qubit cluster statesDense coding with cluster state via local measurementsOn the security of the ping-pong protocolThreshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger stateTeleportation with mixing state from two Bell states due to qubit confusionCryptanalysis and improvement of multiparty quantum secret sharing schemesMeasure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum statesPERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATIONThreshold quantum secure direct communication without entanglementEfficient quantum dialogue using single photonsDETERMINISTIC SECURE QUANTUM COMMUNICATION WITH FOUR-QUBIT W STATESThreshold proxy quantum signature scheme with threshold shared verificationCryptanalysis and improvement on authenticated semi-quantum direct communication protocol using Bell statesDeterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time padDecoherence can help quantum cryptographic securityQUANTUM SECURE DIRECT COMMUNICATION WITH ONLY SEPARATE MEASUREMENTS IN DRIVEN CAVITY QEDBidirectional quantum secret sharing and secret splitting with polarized single photonsControlled quantum secure direct communication with local separate measurements in cavity QEDControlled dense coding using generalized GHZ-type stateAn improved protocol for controlled deterministic secure quantum communication using five-qubit entangled stateQUANTUM STATE SPLITTING WITH YEO–CHUA GENUINE ENTANGLED STATESecure direct communication based on non-orthogonal entangled pairs and local measurementEntanglement swapping and detection in the trapped-ion systemsAN EFFICIENT DETERMINISTIC SECURE QUANTUM COMMUNICATION SCHEME WITH CLUSTER STATEQUANTUM DIALOGUE BY USING THE TWO-QUTRIT ENTANGLED STATESBIDIRECTIONAL QUANTUM SECURE DIRECT COMMUNICATION IN DRIVEN CAVITY QEDSecure direct communication based on ping-pong protocolIntercept-and-resend attack and improvement of semiquantum secure direct communication using EPR pairs



Cites Work


This page was built for publication: Improving Wójcik's eavesdropping attack on the ping-pong protocol