On the security of the ping-pong protocol
From MaRDI portal
Publication:637935
DOI10.1016/j.physleta.2008.03.048zbMath1220.81066arXiv0708.2986OpenAlexW1991314033MaRDI QIDQ637935
Timo Felbinger, Kim Joris Boström
Publication date: 6 September 2011
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0708.2986
Related Items (14)
Eavesdropping on quantum secure direct communication in quantum channels with arbitrarily low loss rate ⋮ A general scheme for information interception in the ping-pong protocol ⋮ THE PING-PONG PROTOCOL WITH A PRIOR PRIVACY AMPLIFICATION ⋮ Game-theoretic perspective of Ping-Pong protocol ⋮ Three-particle deterministic secure and high bit-rate direct quantum communication protocol ⋮ Improving security of the ping-pong protocol ⋮ Security of ping-pong protocol based on pairs of completely entangled qudits ⋮ Ping-pong quantum key distribution with trusted noise: non-Markovian advantage ⋮ Security analysis of the ``Ping-Pong quantum communication protocol in the presence of collective-rotation noise ⋮ ENTANGLEMENT AND SUPERDENSE CODING WITH LINEAR OPTICS ⋮ Deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad ⋮ Decoherence can help quantum cryptographic security ⋮ Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits ⋮ An improved control mode for the ping-pong protocol operation in imperfect quantum channels
Cites Work
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Improved Wójcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Improving Wójcik's eavesdropping attack on the ping-pong protocol
- Broadcast channels with confidential messages
This page was built for publication: On the security of the ping-pong protocol