Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
SIAM Journal on Computing
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure direct communication based on ping---pong protocol
Quantum Information Processing
Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits
Quantum Information Processing
Quantum Information Processing
Improving security of the ping-pong protocol
Quantum Information Processing
Increasing the security of the ping---pong protocol by using many mutually unbiased bases
Quantum Information Processing
Hi-index | 0.00 |
Quantum secure direct communication protocols offer confidential transmission of classic information over quantum channel without prior key agreement. The ping-pong based protocols provide asymptotic security and detailed analysis of security level provided by each variant of the protocol is required. The paper presents a general method of calculation of the eavesdropped information as a function of the attack detection probability. The method is applied to the ping-pong protocol based on completely entangled pairs of qudits. The upper and lower bounds on the amount of the leaked information and eavesdropping detection probability are provided.