Trojan horse attack strategy on quantum private communication

  • Authors:
  • Jinye Peng;Guangqiang He;Jin Xiong;Guihua Zeng

  • Affiliations:
  • School of Information Science and Technology, Northwest University, Xi'an, China;Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai, China;Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai, China;Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai, China

  • Venue:
  • ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Fragility of quantum private communication based on Einstein-Podosky-Rosen (EPR) pair as pre-shared key against trojan horse attack strategy is investigated in detail. To prevent this kind of attack strategy, the EPR pairs employed in the quantum private communication is transferred into non-orthogonal entangled states by employing unitary transformations which are actually rotation operations on the quantum signal. Analysis show that the improved scheme is robust against the trojan horse attack strategy without reducing the security against other kinds of attack strategies.