Unconditional security in quantum cryptography
Journal of the ACM (JACM)
Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits
Quantum Information Processing
ISNN'11 Proceedings of the 8th international conference on Advances in neural networks - Volume Part III
No-cloning theorem for a single POVM
Quantum Information & Computation
Dynamic quantum secret sharing
Quantum Information Processing
Fault tolerant authenticated quantum direct communication immune to collective noises
Quantum Information Processing
Quantum Information Processing
Man-in-the-middle attack on quantum secure communications with authentication
Quantum Information Processing
Hi-index | 0.00 |
In this paper, we first point out that some recently proposed quantum direct communi-cation (QDC) protocols with authentication are vulnerable under some specific attacks,and the secrete message will leak out to the authenticator who is introduced to authen-ticate users participating in the communication. We then propose a new protocol that iscapable of achieving secure QDC with authentication as long as the authenticator woulddo the authentication job faithfully. Our quantum protocol introduces a mutual authen-tication procedure, uses the quantum Bell states, and applies unitary transformations inthe authentication process. Then it exploits and utilizes the entanglement swapping andlocal unitary operations in the communication processes. Thus, after the authenticationprocess, the client users are left alone to communicate with each other, and the authen-ticator has no access to the secrete message. In addition, our protocol does not require adirect quantum link between any two users, who want to communicate with each other.This may also be an appealing advantage in the implementation of a practical quantumcommunication network.