GENERAL |
|
|
|
|
High Efficiency of Two Efficient QSDC with Authentication Is at the Cost of Their Security |
QIN Su-Juan1,2, WEN Qiao-Yan1, MENG Luo-Ming1, ZHU Fu-Chen3 |
1State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 1008762State Key Laboratory of Integrated Services Network, Xidian University, Xi'an 7100713National Laboratory for Modern Communications, PO Box 810, Chengdu 610041 |
|
Cite this article: |
QIN Su-Juan, WEN Qiao-Yan, MENG Luo-Ming et al 2009 Chin. Phys. Lett. 26 020312 |
|
|
Abstract Two efficient protocols of quantum secure direct communication with authentication [Chin. Phys. Lett. 25(2008) 2354] were recently proposed by Liu et al. to improve the efficiency of two protocols presented in [Phys. Rev. A 75(2007)026301] by four Pauli operations. We show that the high efficiency of the two protocols is at the expense of their security. The authenticator Trent can reach half the secret by a particular attack strategy in the first protocol. In the second protocol, not only Trent but also an eavesdropper outside can elicit half-information about the secret from the public declaration.
|
Keywords:
03.67.H
03.65.Ud
|
|
Received: 28 July 2008
Published: 20 January 2009
|
|
|
|
|
|
[1] Beige A, Englert B G, Kurtsiefer C and Weinfurter H 2002Acta Phys. Pol. A 101 357 [2] Bostr\"{om K and Felbinger T 2002 Phys. Rev. Lett. 89 187902 [3] Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317 [4] Deng F G and Long G L 2004 Phys. Rev. A 69052319 [5] Lucamarini M and Mancini S 2005 Phys. Rev. Lett. 94 140501 [6] Cai Q Y and Li B W 2004 Phys. Rev. A 69 054301 [7] Cai Q Y and Li B W 2004 Chin. Phys. Lett. 21601 [8] Gao T, Yan F L and Wang Z X 2005 Chin. Phys. Lett. 22 2473 [9] Gao T, Yan F L and Wang Z X 2005 J. Phys. A: Math.Gen. 38 5761 [10] Wang C, Deng F G, Li Y S, Liu X S and Long G L 2005 {\itPhys. Rev. A 71 044305 [11] Man Z X and Xia Y J 2006 Chin. Phys. Lett. 231680 [12] Deng F G, Li X H, Li C Y, Zhou P and Zhou H Y 2007 {\itChin. Phys. 16 3553 [13] Li X H, Li C Y, Deng F G, Zhou P, Liang Y J and Zhou H Y2007 Chin. Phys. 16 2149 [14] Lee H, Lim J and Yang H 2006 Phys. Rev. A 73042305 [15] Zhang Z J, Liu J, Wang D and Shi S H 2007 Phys.Rev. A 75 026301 [16] Liu W J, Chen H W, Li Z Q and Liu Z H 2008 Chin.Phys. Lett. 25 2354 [17] Gao F, Wen Q Y and Zhu F C 2007 Phys. Lett. A 360 748 [18] Nielsen M A and Chuang I L 2000 Quantum Computationand Quantum Information (Cambridge: Cambridge University Press) [19] Lo H K and Chau H F 1999 Science 283 2050 [20] Shor P W and Preskill J 2000 Phys. Rev. Lett. 85 441 [21] Zhang Y S, Li C F and Guo G C 2001 Phys. Rev. A 63 036301 [22] Cai Q Y 2003 Phys. Rev. Lett. 91 109801 [23] Gao F, Guo F Z, Wen Q Y and Zhu F C 2005 Phys. Rev.A 72 036302 [24] Gao F, Guo F Z, Wen Q Y and Zhu F C 2005 Phys. Rev.A 72 066301 [25] Deng F G, Li X H, Zhou H Y and Zhang Z J 2005 Phys.Rev. A 72 044302 [26] Qin S J, Gao F, Wen Q Y and Zhu F C 2006 Phys.Lett. A 357 101 [27] Song J and Zhang S 2006 Chin. Phys. Lett. 231383 [28] Qin S J, Gao F, Wen Q Y and Zhu F C 2007 Phys. Rev.A 76 062324 [29] Gao F, Qin S J, Wen Q Y and Zhu F C 2007 QuantumInf. Comput. 7 329 [30] Qin S J, Wen Q Y and Zhu F C 2007 J. Phys. B: At.Mol. Opt. Phys. 40 4661 [31] Man Z X and Xia Y J 2007 Chin. Phys. Lett. 2415 [32] Gao F, Lin S, Wen Q Y and Zhu F C 2008 Chin. Phys.Lett. 25 1561 [33] Gao F, Guo F Z, Wen Q Y and Zhu F C 2008 Chin. Phys.Lett. 25 2766 [34] Qin S J, Gao F, Wen Q Y and Zhu F C 2008 Chin.Phys. Lett. 25 3551 [35] Gao F, Guo F Z, Wen Q Y and Zhu F C 2008 Sci. Chin.G: Phys. Mech. Astron. 51 559 [36] Gao F, Qin S J, Wen Q Y and Zhu F C 2008 Phys.Lett. A 372 3333 [37] Tan Y G and Cai Q Y 2008 Int. J. Quant. Inf. 6 325 |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|