Eavesdropping on the two-way quantum communication protocols with invisible photons
From MaRDI portal
Publication:973469
Abstract: The crucial issue of quantum communication protocol is its security. In this paper, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed. PACS:03.67.Hk
Recommendations
- A general scheme for information interception in the ping-pong protocol
- Comment on: ``Secure direct communication based on ping-pong protocol
- Deterministic six states protocol for quantum communication
- Efficient bidirectional quantum secure communication with two-photon entanglement
- Eavesdropping on quantum secure direct communication in quantum channels with arbitrarily low loss rate
Cites work
Cited in
(only showing first 100 items - show all)- Controlled deterministic secure quantum communication based on quantum search algorithm
- Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states
- Multi-party quantum private comparison of size relation with \(d\)-level single-particle states
- Semiquantum secure direct communication using EPR pairs
- Authenticated semi-quantum key distribution protocol using Bell states
- Private database queries using one quantum state
- Multi-party quantum key agreement without entanglement
- New quantum private comparison protocol using EPR pairs
- Secure multiparty quantum secret sharing with the collective eavesdropping-check character
- Quantum key agreement protocols with four-qubit cluster states
- Two-party quantum key agreement with six-particle entangled states against collective noise
- Improvements on ``multiparty quantum key agreement with single particles
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography
- Fault-tolerate quantum key distribution over a collective-noise channel
- Efficient multiparty quantum secret sharing of secure direct communication based on Bell states and continuous variable operations
- Multiparty controlled quantum secure direct communication with phase encryption
- Quantum secret sharing between multiparty and multiparty with four states
- Novel quantum virtual private network scheme for PON via quantum secure direct communication
- Multi-party quantum private comparison with an almost-dishonest third party
- Multiparty controlled quantum secure direct communication based on quantum search algorithm
- Multiparty quantum key agreement with four-qubit symmetric W state
- Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels
- On the security of the ping-pong protocol
- Controlled bidirectional quantum secure direct communication with six-qubit entangled states
- Efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom
- Threshold quantum secure direct communication without entanglement
- High-capacity deterministic secure four-qubit \(W\) state protocol for quantum communication based on order rearrangement of particle pairs
- Authenticated quantum dialogue based on Bell states
- Multi-user private comparison protocol using GHZ class states
- Efficient quantum dialogue using single photons
- Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states
- Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check
- Multiparty simultaneous quantum identity authentication with secret sharing
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Trojan-horse attacks on quantum key distribution with classical bob
- Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
- Circular multi-party quantum private comparison with \(n\)-level single-particle states
- Efficient bidirectional quantum secure communication with two-photon entanglement
- Threshold quantum secret sharing between multi-party and multi-party
- Improvement on ``quantum key agreement protocol with maximally entangled states
- New secure quantum dialogue protocols over collective noisy channels
- Multi-party semi-quantum secure direct communication protocol with cluster states
- Mutual authentication quantum key agreement protocol based on Bell states
- Semi-quantum private query protocol without invoking the measurement capability of classical user
- Deterministic secure quantum communication with collective detection using single photons
- Quantum secure direct communication based on order rearrangement of single photons
- Cryptanalysis and improvement of a quantum communication-based online shopping mechanism
- Authenticated semi-quantum key distributions without classical channel
- A weak quantum blind signature with entanglement permutation
- Fault-tolerant authenticated quantum dialogue using logical Bell states
- Quantum dialogue protocols over collective noise using entanglement of GHZ state
- Controlled quantum dialogue robust against conspiring users
- AN EFFICIENT DETERMINISTIC SECURE QUANTUM COMMUNICATION SCHEME WITH CLUSTER STATE
- Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states
- Quantum identity authentication based on ping-pong technique without entanglements
- Authenticated semi-quantum direct communication protocols using Bell states
- Multiparty quantum sealed-bid auction using single photons as message carrier
- Probabilistic authenticated quantum dialogue
- Efficient multi-party quantum key agreement by cluster states
- Quantum entanglement establishment between two strangers
- Threshold proxy quantum signature scheme with threshold shared verification
- Detecting relay attacks on RFID communication systems using quantum bits
- Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise
- Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom
- Fault-tolerant asymmetric quantum dialogue protocols against collective noise
- Multi-party quantum key agreement by an entangled six-qubit state
- Intercept-resend attacks on semi-quantum secret sharing and the improvements
- Efficient multiparty quantum key agreement protocol based on commutative encryption
- Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation
- Three-party quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom
- High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom
- Efficient semiquantum key distribution based on single photons in both polarization and spatial-mode degrees of freedom
- Enhancement on ``Quantum blind signature based on two-state vector formalism
- New circular quantum secret sharing for remote agents
- Quantum secret sharing of secure direct communication using one-time pad
- Quantum secure direct dialogue over collective noise channels based on logical Bell states
- Robust quantum dialogue based on the entanglement swapping between any two logical Bell states and the shared auxiliary logical Bell state
- Semi-quantum key agreement and private comparison protocols using Bell states
- Secure three-party semi-quantum summation using single photons
- Controlled quantum dialogue using cluster states
- Quantum secret sharing using the \(d\)-dimensional GHZ state
- Comment and improvement on the ``Semi-quantum ring signature protocol based on multi-particle GHZ state
- Semi-quantum voting protocol with decentralization of vote verification and traceability
- Two-party quantum key agreement with five-particle entangled states
- High-dimensional quantum state manipulation and tracking
- A quantum dialogue reduced by half unitary operations
- Three-party quantum secret sharing against collective noise
- High-dimensional quantum key agreement protocol with pairs of single qudits
- A quantum private comparison protocol with splitting information carriers
- Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom
- Single-state multi-party semiquantum key agreement protocol based on multi-particle GHZ entangled states
- Controlled quantum secure direct communication with authentication based on quantum search algorithm
- Efficient semi-quantum private comparison using single photons
- Frequency shift attack on ‘plug-and-play’ quantum key distribution systems
- Three-party quantum key agreement protocol based on logical four-particle cluster state to resist collective noise
- Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
- Three-party quantum secure direct communication against collective noise
- Circular mediated semi-quantum key distribution
- Two semi-quantum direct communication protocols with mutual authentication based on Bell states
- Quantum private comparison protocol based on the entanglement swapping between \(\chi ^+\) state and W-class state
This page was built for publication: Eavesdropping on the two-way quantum communication protocols with invisible photons
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q973469)