Access the full text.
Sign up today, get DeepDyve free for 14 days.
Chuan Wang, Fuguo Deng, G. Long (2005)
Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger stateOptics Communications, 253
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
Song Lin, Q. Wen, F. Gao, F. Zhu (2008)
Quantum secure direct communication with χ -type entangled statesPhysical Review A, 78
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
Cheng-An Yen, S. Horng, H. Goan, T. Kao, Yao-Hsin Chou (2009)
Quantum direct communication with mutual authenticationQuantum Inf. Comput., 9
A. Vaziri, Jian-Wei Pan, T. Jennewein, G. Weihs, A. Zeilinger (2003)
Concentration of higher dimensional entanglement: qutrits of photon orbital angular momentum.Physical review letters, 91 22
J. Joo, T. Rudolph, B. Sanders (2009)
A heralded two-qutrit entangled stateJournal of Physics B: Atomic, Molecular and Optical Physics, 42
Arti Chamoli, C. Bhandari (2007)
Secure direct communication based on ping–pong protocolQuantum Information Processing, 8
Q. Cai, Baishun Li (2003)
Improving the capacity of the Boström-Felbinger protocolPhysical Review A, 69
Xihan Li, Chun-Yan Li, Fu-Guo Deng, Ping Zhou, Yu-Jie Liang, Hong-Yu Zhou (2005)
Quantum secure direct communication with quantum encryption based on pure entangled statesChinese Physics, 16
E.V. Vasiliu (2009)
Asymptotic security of the ping-pong quantum direct communication protocol with three-qubit Greenberger–Horne–Zeilinger states. Georgian ElecSci. J. Comput. Sci. Telecomm., 3
Xihan Li, Fuguo Deng, Hong-Yu Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhysical Review A, 74
Hwayean Lee, Jongin Lim, H. Yang (2005)
Quantum direct communication with authenticationPhysical Review A, 73
Ting Gao, Fengli Yan, Zhixi Wang (2004)
Deterministic secure direct communication using GHZ states and swapping quantum entanglementarXiv: Quantum Physics
K. Bostroem, T. Felbinger (2007)
On the security of the ping-pong protocolPhysics Letters A, 372
W. Stinespring (2010)
POSITIVE FUNCTIONS ON C*-ALGEBRAS
Fengli Yan, Xiaoqiang Zhang (2003)
A scheme for secure direct communication using EPR pairs and teleportationThe European Physical Journal B - Condensed Matter and Complex Systems, 41
Chuan Wang, Fuguo Deng, Yansong Li, Xiao-Shu Liu, G. Long (2005)
Quantum secure direct communication with high-dimension quantum superdense codingPhysical Review A, 71
Q. Cai (2003)
The "ping-pong" protocol can be attacked without eavesdropping.Physical review letters, 91 10
Jian Wang, Quan Zhang, Chaojing Tang (2006)
Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger stateOptics Communications, 266
(2008)
Analysis of asymptotic security of three variants of the ping–pong protocol // The modern scientific bulletin
Fuguo Deng, G. Long (2004)
Secure direct communication with a quantum one-time padPhysical Review A, 69
Zhan-jun Zhang, Yong Li, Z. Man (2004)
Improved Wójcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel lossPhysics Letters A, 341
(2008)
Ping-pong protocol with three- and four-qubit Greenberger– Horne–Zeilinger states
R. Thew, A. Acín, H. Zbinden, N. Gisin (2003)
Experimental realization of entangled qutrits for quantum communicationQuantum Inf. Comput., 4
Marco Lucamarini, S. Mancini (2004)
Secure deterministic communication without entanglement.Physical review letters, 94 14
E.V. Vasiliu, S.V. Nikolaenko (2009)
Synthesis of the secure system of direct messages transfer based on the ping-pong protocol of quantum communicationSci. Work. Odessa Natl. Acad. Telecomm., 1
Ai‐Dong Zhu, Yan Xia, Qiu-Bo Fan, Shou Zhang (2006)
Secure direct communication based on secret transmitting order of particlesPhysical Review A, 73
蔡庆宇, 李白文 (2004)
Deterministic Secure Communication Without Using Entanglement, 21
Yazhen Wang (2012)
Quantum Computation and Quantum InformationStatistical Science, 27
Fuguo Deng, G. Long (2004)
Bidirectional quantum key distribution protocol with practical faint laser pulsesPhysical Review A, 70
W. Stinespring (1955)
Positive functions on *-algebras, 6
Xihan Li, Fuguo Deng, Chun-Yan Li, Yu-Jie Liang, P. Zhou, Hong-Yu Zhou (2006)
Deterministic secure quantum communication without maximally entangled statesarXiv: Quantum Physics
The non-coherent attack on the ping-pong protocol with completely entangled pairs of three-dimensional quantum systems (qutrits) is analyzed. The expression for the amount of the eavesdropper’s information as functions of attack detection probability is derived. It is shown that the security of the ping-pong protocol with pairs of qutrits is higher than the security of the protocol with pairs of qubits. It is also shown that with the use by legitimate users in a control mode of two mutually unbiased measuring bases, the ping-pong protocol with pairs of qutrits possesses only asymptotic security, as well as the protocol with entangled qubits.
Quantum Information Processing – Springer Journals
Published: Jul 20, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.