Improving Wójcik's eavesdropping attack on the ping-pong protocol
From MaRDI portal
Publication:2463104
DOI10.1016/j.physleta.2004.10.025zbMath1123.94371OpenAlexW1990678155MaRDI QIDQ2463104
Yong Li, Zhong-Xiao Man, Zhan-Jun Zhang
Publication date: 5 December 2007
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.physleta.2004.10.025
Related Items
Probabilistic authenticated quantum dialogue, Eavesdropping on quantum secure direct communication in quantum channels with arbitrarily low loss rate, Bidirectional quantum secure direct communication in trapped ion systems, Quantum communication in the ion-trapped system, CONTROLLED DENSE CODING WITH CLUSTER STATE, GENERALIZED THREE-PARTY QUBIT OPERATION SHARING, THE PING-PONG PROTOCOL WITH A PRIOR PRIVACY AMPLIFICATION, Game-theoretic perspective of Ping-Pong protocol, Three-particle deterministic secure and high bit-rate direct quantum communication protocol, MULTIPARTY QUANTUM SECRET SHARING OF SECURE DIRECT COMMUNICATION WITH HIGH-DIMENSIONAL QUANTUM SUPERDENSE CODING, Quantum watermarking using entanglement swapping, Quantum Fisher information in the symmetric pure three-qubit state, Deterministic secure quantum communication with collective detection using single photons, Controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding, Improving security of the ping-pong protocol, Security of ping-pong protocol based on pairs of completely entangled qudits, Ping-pong quantum key distribution with trusted noise: non-Markovian advantage, Quantum secure direct communication by swapping entanglements of \(3\times 3\)-dimensional Bell states, Quantum secure direct communication based on four-Qubit cluster states, Dense coding with cluster state via local measurements, On the security of the ping-pong protocol, Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state, Teleportation with mixing state from two Bell states due to qubit confusion, Cryptanalysis and improvement of multiparty quantum secret sharing schemes, Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states, PERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION, Threshold quantum secure direct communication without entanglement, Efficient quantum dialogue using single photons, DETERMINISTIC SECURE QUANTUM COMMUNICATION WITH FOUR-QUBIT W STATES, Threshold proxy quantum signature scheme with threshold shared verification, Cryptanalysis and improvement on authenticated semi-quantum direct communication protocol using Bell states, Deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad, Decoherence can help quantum cryptographic security, QUANTUM SECURE DIRECT COMMUNICATION WITH ONLY SEPARATE MEASUREMENTS IN DRIVEN CAVITY QED, Bidirectional quantum secret sharing and secret splitting with polarized single photons, Controlled quantum secure direct communication with local separate measurements in cavity QED, Controlled dense coding using generalized GHZ-type state, An improved protocol for controlled deterministic secure quantum communication using five-qubit entangled state, QUANTUM STATE SPLITTING WITH YEO–CHUA GENUINE ENTANGLED STATE, Secure direct communication based on non-orthogonal entangled pairs and local measurement, Entanglement swapping and detection in the trapped-ion systems, AN EFFICIENT DETERMINISTIC SECURE QUANTUM COMMUNICATION SCHEME WITH CLUSTER STATE, QUANTUM DIALOGUE BY USING THE TWO-QUTRIT ENTANGLED STATES, BIDIRECTIONAL QUANTUM SECURE DIRECT COMMUNICATION IN DRIVEN CAVITY QED, Secure direct communication based on ping-pong protocol, Intercept-and-resend attack and improvement of semiquantum secure direct communication using EPR pairs
Cites Work
- Quantum cryptography without public announcement of bases
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Quantum Cryptography Based on Orthogonal States
- Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps
- Quantum cryptography