Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security of ping-pong protocol based on pairs of completely entangled qudits

Security of ping-pong protocol based on pairs of completely entangled qudits Quantum secure direct communication protocols offer confidential transmission of classic information over quantum channel without prior key agreement. The ping-pong based protocols provide asymptotic security and detailed analysis of security level provided by each variant of the protocol is required. The paper presents a general method of calculation of the eavesdropped information as a function of the attack detection probability. The method is applied to the ping-pong protocol based on completely entangled pairs of qudits. The upper and lower bounds on the amount of the leaked information and eavesdropping detection probability are provided. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Quantum Information Processing Springer Journals

Security of ping-pong protocol based on pairs of completely entangled qudits

Quantum Information Processing , Volume 11 (6) – Sep 22, 2011

Loading next page...
 
/lp/springer-journals/security-of-ping-pong-protocol-based-on-pairs-of-completely-entangled-F2jbyKacC0

References (20)

Publisher
Springer Journals
Copyright
Copyright © 2011 by The Author(s)
Subject
Physics; Quantum Information Technology, Spintronics; Quantum Computing; Data Structures, Cryptology and Information Theory; Quantum Physics; Mathematical Physics
ISSN
1570-0755
eISSN
1573-1332
DOI
10.1007/s11128-011-0307-1
Publisher site
See Article on Publisher Site

Abstract

Quantum secure direct communication protocols offer confidential transmission of classic information over quantum channel without prior key agreement. The ping-pong based protocols provide asymptotic security and detailed analysis of security level provided by each variant of the protocol is required. The paper presents a general method of calculation of the eavesdropped information as a function of the attack detection probability. The method is applied to the ping-pong protocol based on completely entangled pairs of qudits. The upper and lower bounds on the amount of the leaked information and eavesdropping detection probability are provided.

Journal

Quantum Information ProcessingSpringer Journals

Published: Sep 22, 2011

There are no references for this article.