A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol
GAO Fei1,2, LIN Song1,2, WEN Qiao-Yan1,2, ZHU Fu-Chen3
1State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 1008762School of Science, Beijing University of Posts and Telecommunications, Beijing 1008763National Laboratory for Modern Communications, PO Box 810, Chengdu610041
A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol
1State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 1008762School of Science, Beijing University of Posts and Telecommunications, Beijing 1008763National Laboratory for Modern Communications, PO Box 810, Chengdu610041
摘要We analyse the security of a quantum secure direct communication (QSDC) protocol and find that an eavesdropper can utilize a special property of GHZ states to elicit all or part of the transmitted secrets without being detected. The particular attack strategy is presented in detail. We give an improved version of this protocol so that it can resist this attack.
Abstract:We analyse the security of a quantum secure direct communication (QSDC) protocol and find that an eavesdropper can utilize a special property of GHZ states to elicit all or part of the transmitted secrets without being detected. The particular attack strategy is presented in detail. We give an improved version of this protocol so that it can resist this attack.
GAO Fei;LIN Song;WEN Qiao-Yan;ZHU Fu-Chen. A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol[J]. 中国物理快报, 2008, 25(5): 1561-1563.
GAO Fei, LIN Song, WEN Qiao-Yan, ZHU Fu-Chen. A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol. Chin. Phys. Lett., 2008, 25(5): 1561-1563.
[1] Gisin N, Ribordy G, Tittel W et al 2002 Rev. Mod. Phys. 74 145 [2] Bennett C H and Brassard G 1984 Proceedings of IEEEInternational Conference on Computers, Systems and Signal Processing(Bangalore, India, 1984) (New York: IEEE) p 175 [3] Ekert A K 1991 Phys. Rev. Lett. 67 661 [4] Bennett C H 1992 Phys. Rev. Lett. 68 3121 [5] Bostr\"om K and Felbinger T 2002 Phys. Rev. Lett. 89 187902 [6] Deng F, Long G and Liu X 2003 Phys. Rev. A 68 042317 [7] Deng F and Long G 2004 Phys. Rev. A 69 052319 [8] Lucamarini M and Mancini S 2005 Phys. Rev. Lett. 94 140501 [9] Deng F, Li X, Li C et al 2005 Phys. Lett. A 359359 [10] Zhang Y, Li C and Guo G 2001 Phys. Rev. A 63 036301 [11] W\'{ojcik A 2003 Phys. Rev. Lett. 90 157901 [12] W\'{ojcik A 2005 Phys. Rev. A 71 016301 [13] Gao F, Guo F, Wen Q et al 2005 Phys. Rev. A 72036302 [14] Gao F, Guo F, Wen Q et al 2005 Phys. Rev. A 72066301 [15] Deng F, Li X, Zhou H et al 2005 Phys. Rev. A 72044302 [16] Lo H K and Ko T M 2005 Quantum Inf. Comput. 5 40 [17] Man Z, Zhang Z, Li Y 2005 Chin. Phys. Lett. 22 22 [18] Qin S, Gao F, Wen Q et al 2006 Phys. Lett. A 357 101 [19] Song J and Zhang S 2006 Chin. Phys. Lett. 23 1383 [20] Gao F, Qin S, Wen Q, et al 2007 Quantum Inf. Comput. 7 329 [21] Man Z and Xia Y 2007 Chin. Phys. Lett. 24 15 [22] Man Z and Xia Y 2006 Chin. Phys. Lett. 23 1973 [23] Gao F, Wen Q and Zhu F 2007 Phys. Lett. A 360 748 [24] Song J and Zhang S 2007 Phys. Lett. A 360 746