Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
F-G Deng, GL Long (2004)
Secure direct communication with a quantum one-time padPhys. Rev. A, 69
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
K. Shimizu, K. Tamaki, Hiroyuki Fukasaka (2009)
Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pairPhysical Review A, 80
Arti Chamoli, C. Bhandari (2007)
Secure direct communication based on ping–pong protocolQuantum Information Processing, 8
V. Scarani, H. Bechmann-Pasquinucci, N. Cerf, M. Dušek, N. Lutkenhaus, M. Peev (2008)
The security of practical quantum key distributionReviews of Modern Physics, 81
Q. Cai, Baishun Li (2003)
Improving the capacity of the Boström-Felbinger protocolPhysical Review A, 69
E. Vasiliu (2009)
Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutritsQuantum Information Processing, 10
Harry Buhrman (2018)
Quantum communicationPrinciples of Quantum Computation and Information
A. Wójcik (2002)
Eavesdropping on the "ping-pong" quantum communication protocol.Physical review letters, 90 15
P. Zawadzki (2013)
Improving security of the ping-pong protocolQuantum Information Processing, 12
Hua Lu, C. Fung, Xiongfeng Ma, Q. Cai (2011)
Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channelPhysical Review A, 84
Song Lin, Q. Wen, F. Gao, F. Zhu (2009)
Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacksPhysical Review A, 79
S. Molotkov (2012)
On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with “blinding” of avalanche photodetectorsJournal of Experimental and Theoretical Physics, 114
N Gisin, R Thew (2007)
Quantum communicationNat. Photonics, 1
Hoi-Kwong Lo, Yi Zhao (1995)
Quantum Cryptography
K. Bostroem, T. Felbinger (2007)
On the security of the ping-pong protocolPhysics Letters A, 372
S. Qin, F. Gao, F. Guo, Q. Wen (2010)
Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'Physical Review A, 82
C. Fung, Xiongfeng Ma, H. Chau, Q. Cai (2011)
Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocolPhysical Review A, 85
A. Clerk, M. Devoret, S. Girvin, F. Marquardt, R. Schoelkopf (2008)
Introduction to quantum noise, measurement, and amplificationReviews of Modern Physics, 82
S. Massar (2006)
Fiber Optics Protocols for Quantum CommunicationQuantum Information Processing, 5
Q. Cai (2003)
The "ping-pong" protocol can be attacked without eavesdropping.Physical review letters, 91 10
Chun-Wei Yang, T. Hwang (2012)
Improved QSDC Protocol over a Collective-Dephasing Noise ChannelInternational Journal of Theoretical Physics, 51
Zhan-jun Zhang, Z. Man, Yong Li (2004)
Improving Wojcik's eavesdropping attack on the ping-pong protocolPhysics Letters A, 333
H. Hoffmann, K. Bostroem, T. Felbinger (2004)
Comment on 'Secure direct communication with a quantum one-time pad'Physical Review A, 72
Marco Lucamarini, S. Mancini (2004)
Secure deterministic communication without entanglement.Physical review letters, 94 14
Almut Beige, B. Englert, C. Kurtsiefer, H. Weinfurter (2001)
Secure Communication with a Publicly Known KeyActa Physica Polonica A, 101
Jason Lin, T. Hwang (2013)
Bell state entanglement swappings over collective noises and their applications on quantum cryptographyQuantum Information Processing, 12
P. Zawadzki (2012)
Security of ping-pong protocol based on pairs of completely entangled quditsQuantum Information Processing, 11
W. Kye, Chil-Min Kim, Myung-Woon Kim, Young-Jai Park (2005)
Quantum key distribution with blind polarization bases.Physical review letters, 95 4
M. Naseri (2010)
Comment on: “secure direct communication based on ping-pong protocol” [Quantum Inf. Process. 8, 347 (2009)]Quantum Information Processing, 9
A scheme for deterministic secure and high bit-rate direct communication without resorting to a distinct control interval is proposed. It utilizes three entangled qubits, and presents higher bit transfer rate of information and higher security. The security of protocol is asserted by introducing a security control for each transferred bit. The protocol is investigated for a class of individual attacks and it is explicitly showed that the protocol has a high security even in the presence of channel loss.
Quantum Information Processing – Springer Journals
Published: Feb 17, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.