Table of Contents Author Guidelines Submit a Manuscript
Advances in Mathematical Physics
Volume 2016 (2016), Article ID 3162012, 7 pages
http://dx.doi.org/10.1155/2016/3162012
Research Article

A General Scheme for Information Interception in the Ping-Pong Protocol

1Institute of Electronics, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
2Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland

Received 22 March 2016; Revised 25 May 2016; Accepted 6 June 2016

Academic Editor: Kamil Brádler

Copyright © 2016 Piotr Zawadzki and Jarosław Adam Miszczak. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. L. Long and X. S. Liu, “Theoretically efficient high-capacity quantum-key-distribution scheme,” Physical Review A, vol. 65, no. 3, Article ID 032302, 2002. View at Publisher · View at Google Scholar · View at Scopus
  2. F.-G. Deng, G. L. Long, and X.-S. Liu, “Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block,” Physical Review A, vol. 68, no. 4, Article ID 042317, 6 pages, 2003. View at Publisher · View at Google Scholar · View at Scopus
  3. K. Boström and T. Felbinger, “Deterministic secure direct communication using entanglement,” Physical Review Letters, vol. 89, no. 18, pp. 187902/1–187902/4, 2002. View at Google Scholar · View at Scopus
  4. C. Wang, F. G. Deng, and G. L. Long, “Multi-step quantum secure direct communication using multi-particle Green-HorneZeilinger state,” Optics Communications, vol. 253, no. 13, pp. 15–20, 2005. View at Publisher · View at Google Scholar
  5. C. Wang, F. G. Deng, and G. L. Long, “Erratum to ‘Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state’ [Opt. Commun. 253 (2005) 15–20],” Optics Communications, vol. 262, no. 1, p. 134, 2006. View at Publisher · View at Google Scholar
  6. E. V. Vasiliu, “Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits,” Quantum Information Processing, vol. 10, no. 2, pp. 189–202, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  7. P. Zawadzki, “Security of ping-pong protocol based on pairs of completely entangled qudits,” Quantum Information Processing, vol. 11, no. 6, pp. 1419–1430, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. Q.-Y. Cai and B.-W. Li, “Improving the capacity of the Boström-Felbinger protocol,” Physical Review A—Atomic, Molecular, and Optical Physics, vol. 69, no. 5, Article ID 054301, 2004. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Wang, F.-G. Deng, Y.-S. Li, X.-S. Liu, and G. L. Long, “Quantum secure direct communication with high-dimension quantum superdense coding,” Physical Review A, vol. 71, no. 4, Article ID 044305, 2005. View at Publisher · View at Google Scholar · View at Scopus
  10. F.-G. Deng and G. L. Long, “Secure direct communication with a quantum one-time pad,” Physical Review A, vol. 69, no. 5, Article ID 052319, 2004. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Hu, B. Yu, M. Jing et al., Experimental quantum secure direct communication with single photons. LSA, 2016.
  12. M. Lucamarini and S. Mancini, “Secure deterministic communication without entanglement,” Physical Review Letters, vol. 94, no. 14, Article ID 140501, 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. G.-L. Long, F.-G. Deng, C. Wang, X.-H. Li, K. Wen, and W.-Y. Wang, “Quantum secure direct communication and deterministic secure quantum communication,” Frontiers of Physics in China, vol. 2, no. 3, pp. 251–272, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. K. Boström and T. Felbinger, “On the security of the ping-pong protocol,” Physics Letters A, vol. 372, no. 22, pp. 3953–3956, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. P. Zawadzki, “Improving security of the ping-pong protocol,” Quantum Information Processing, vol. 12, no. 1, pp. 149–155, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  16. H. Lu, C.-H. F. Fung, X. Ma, and Q.-Y. Cai, “Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel,” Physical Review A—Atomic, Molecular, and Optical Physics, vol. 84, no. 4, Article ID 042344, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. N. J. Beaudry, M. Lucamarini, S. Mancini, and R. Renner, “Security of two-way quantum key distribution,” Physical Review A, vol. 88, no. 6, Article ID 062302, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. Y.-G. Han, Z.-Q. Yin, H.-W. Li et al., “Security of modified Ping-Pong protocol in noisy and lossy channel,” Scientific Reports, vol. 4, article 4936, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Cerè, M. Lucamarini, G. Di Giuseppe, and P. Tombesi, “Experimental test of two-way quantum key distribution in the presence of controlled noise,” Physical Review Letters, vol. 96, no. 20, Article ID 200501, 2006. View at Publisher · View at Google Scholar · View at Scopus
  20. H. Chen, Z.-Y. Zhou, A. J. J. Zangana et al., “Experimental demonstration on the deterministic quantum key distribution based on entangled photons,” Scientific Reports, vol. 6, Article ID 20962, 2016. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Wójcik, “Eavesdropping on the ‘ping-pong’ quantum communication protocol,” Physical Review Letters, vol. 90, no. 15, Article ID 157901, 2003. View at Publisher · View at Google Scholar · View at Scopus
  22. F.-G. Deng, X.-H. Li, C.-Y. Li, P. Zhou, and H.-Y. Zhou, “Eavesdropping on the ‘ping-pong’ quantum communication protocol freely in a noise channel,” Chinese Physics, vol. 16, no. 2, pp. 277–281, 2007. View at Publisher · View at Google Scholar · View at Scopus
  23. P. Zawadzki, Z. Pucha la, and J. A. Miszczak, “Increasing the security of the ping-pong protocol by using many mutually unbiased bases,” Quantum Information Processing, vol. 12, no. 1, pp. 569–576, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. M. Pavičić, “In quantum direct communication an undetectable eavesdropper can always tell Ψ from Φ Bell states in the message mode,” Physical Review A, vol. 87, no. 4, Article ID 042326, 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. B. Zhang, W.-X. Shi, J. Wang, and C.-J. Tang, “Quantum direct communication protocol strengthening against Pavičić’s attack,” International Journal of Quantum Information, vol. 13, no. 7, Article ID 1550052, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  26. H. E. Brandt, “Entangled eavesdropping in quantum key distribution,” Journal of Modern Optics, vol. 53, no. 16-17, pp. 2251–2257, 2006. View at Publisher · View at Google Scholar · View at Scopus
  27. J. H. Shapiro, “Performance analysis for Brandt's conclusive entangling probe,” Quantum Information Processing, vol. 5, no. 1, pp. 11–24, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus