Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
Song Lin, Q. Wen, F. Gao, F. Zhu (2008)
Quantum secure direct communication with χ -type entangled statesPhysical Review A, 78
F. Gao, F. Guo, Q. Wen, F. Zhu (2005)
Comment on "Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers" [Phys. Rev. A 67, 044302 (2003)]Physical Review A
Gao Fei, Lin Song, W. Qiao-yan, Zhu Fu-chen (2008)
A Special Eavesdropping on One-Sender Versus N-Receiver QSDC ProtocolChinese Physics Letters, 25
N. An (2004)
Quantum dialogue
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
F. Gao, Q. Wen, F. Zhu (2006)
Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]Physics Letters A, 360
Fengli Yan, Xiaoqiang Zhang (2003)
A scheme for secure direct communication using EPR pairs and teleportationThe European Physical Journal B - Condensed Matter and Complex Systems, 41
Chuan Wang, Fuguo Deng, Yansong Li, Xiao-Shu Liu, G. Long (2005)
Quantum secure direct communication with high-dimension quantum superdense codingPhysical Review A, 71
Arti Chamoli, C. Bhandari (2007)
Secure direct communication based on ping–pong protocolQuantum Information Processing, 8
Q. Cai, Baishun Li (2003)
Improving the capacity of the Boström-Felbinger protocolPhysical Review A, 69
N. Gisin, G. Ribordy, W. Tittel, H. Zbinden (2002)
Quantum cryptographyRev. Mod. Phys., 74
Fuguo Deng, G. Long (2004)
Secure direct communication with a quantum one-time padPhysical Review A, 69
F. Gao, F. Guo, Q. Wen, F. Zhu (2005)
Comment on “Quantum key distribution for d -level systems with generalized Bell states”Physical Review A, 72
K. Shimizu, N. Imoto (1999)
Communication channels secured from eavesdropping via transmission of photonic Bell statesPhysical Review A, 60
Jian-zhong Du, S. Qin, Q. Wen, F. Zhu (2005)
Entanglement Split:Comment on ``Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'' [Phys. Rev. A 67, 044302 (2003)]Physical Review A
Marco Lucamarini, S. Mancini (2004)
Secure deterministic communication without entanglement.Physical review letters, 94 14
F. Gao, F.Z. Guo, Q.Y. Wen, F.C. Zhu (2005)
Comment on Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriersPhys. Rev. A, 72
Hwayean Lee, Jongin Lim, H. Yang (2005)
Quantum direct communication with authenticationPhysical Review A, 73
M. Naseri (2010)
Comment on: “secure direct communication based on ping-pong protocol” [Quantum Inf. Process. 8, 347 (2009)]Quantum Information Processing, 9
Zhan-jun Zhang (2006)
Improving the security of quantum direct communication with authentication
F. Gao, S. Qin, Q. Wen, F. Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOptics Communications, 283
Z.J. Zhang, J. Liu, D. Wang, S.H. Shi (2007)
Comment on Quantum direct communication with authenticationPhys. Rev. A, 75
Nicolas Gisin, G. Ribordy, Wolfgang Tittel, Hugo Zbinden (2001)
Quantum cryptographyApplied Physics B, 67
A. Chamoli and C.M. Bhandari presented a secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]. M.Naseri analyzed its security and pointed out that in this protocol any dishonest party can obtain all the other one’s secret message with zero risk of being detected by using fake entangled particles (FEP attack) [M. Naseri, Quantum Inf. Process. online]. In this letter, we reexamine the protocol’s security and discover that except the FEP attack, using a special property of GHZ states, any one dishonest party can also take a special attack, i.e., double-CNOT(Controlled NOT) attack. Finally, a denial-of-service attack is also discussed.
Quantum Information Processing – Springer Journals
Published: Sep 26, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.