Access the full text.
Sign up today, get DeepDyve free for 14 days.
D. Fu-Guo, L. Gui-Lu (2006)
Quantum privacy amplification for a sequence of single qubitsCommun. Theor. Phys., 46
M. Ostermeyer, N. Walenta (2008)
On the implementation of a deterministic secure coding protocol using polarization entangled photonsOpt. Commun., 281
A. Wójcik (2003)
Eavesdropping on the ping-pong quantum communication protocolPhys. Rev. Lett., 90
C. Wang, F.G. Deng, G.L. Long (2005)
Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger stateOpt. Commun., 253
G.L. Long, X.S. Liu (2002)
Theoretically efficient high-capacity quantum-key-distribution schemePhys. Rev. A, 65
K. Boström, T. Felbinger (2008)
On the security of the ping-pong protocolPhys. Lett. A, 372
A. Beige, B.G. Englert, C. Kurtsiefer, H. Weinfurter (2002)
Secure communication with a publicly known keyAct. Phys. Pol., 101
F.G. Deng, G.L. Long, X.S. Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhys. Rev. A, 68
E.V. Vasiliu (2011)
Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutritsQuantum Inf. Process., 10
C. Wang, F.G. Deng, Y.S. Li, X.S. Liu, G.L. Long (2005)
Quantum secure direct communication with high-dimension quantum superdense codingPhys. Rev. A, 71
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglementPhys. Rev. Lett., 89
Q.Y. Cai, B.W. Li (2004)
Improving the capacity of the Boström-Felbinger protocolPhys. Rev. A, 69
Z. Zhang, Z. Man, Y. Li (2004)
Improving Wójciks eavesdropping attack on the ping-pong protocolPhys. Lett. A, 333
F.G. Deng, G.L. Long, Y. Wang, L. Xiao (2004)
Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurementChin. Phys. Lett., 21
A security layer for the asymptotically secure ping-pong protocol is proposed and analyzed in the paper. The operation of the improvement exploits inevitable errors introduced by the eavesdropping in the control and message modes. Its role is similar to the privacy amplification algorithms known from the quantum key distribution schemes. Messages are processed in blocks which guarantees that an eavesdropper is faced with a computationally infeasible problem as long as the system parameters are within reasonable limits. The introduced additional information preprocessing does not require quantum memory registers and confidential communication is possible without prior key agreement or some shared secret.
Quantum Information Processing – Springer Journals
Published: Feb 2, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.