2011
DOI: 10.1007/s11433-011-4448-0
|View full text |Cite
|
Sign up to set email alerts
|

Improved quantum “Ping-pong” protocol based on GHZ state and classical XOR operation

Abstract: In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Boström and Felbinger [Boström K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
10
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 38 publications
0
10
0
Order By: Relevance
“…Then Beige et al [2] proposed a QSDC scheme with the exchange of single photons. In the same year, Boström and Felbinger [3] proposed a deterministic secure direct communication scheme named "ping-pong" protocol based on two-photon entangled states, which was improved by Li et al [4]. Deng et al [5] proposed two-step quantum direct communication protocol using the EPR pair block.…”
Section: Introductionmentioning
confidence: 99%
“…Then Beige et al [2] proposed a QSDC scheme with the exchange of single photons. In the same year, Boström and Felbinger [3] proposed a deterministic secure direct communication scheme named "ping-pong" protocol based on two-photon entangled states, which was improved by Li et al [4]. Deng et al [5] proposed two-step quantum direct communication protocol using the EPR pair block.…”
Section: Introductionmentioning
confidence: 99%
“…Quantum secure direct communication (QSDC) is an important branch of quantum cryptography, in which the secret messages are directly transmitted in a quantum channel between two legitimate parties, say Alice and Bob, without creating a private key to encode and decode the messages. Since QSDC has a great advantage of unconditional security based on quantum mechanics for the legal users to communicate, much attention has been focused on this research field and many schemes have been presented [1][2][3][4][5][6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…Beige et al [2] presented a QSDC protocol based on the exchange of single photons. Boström et al [3] proposed a ping-pong QSDC scheme based on EPR pairs, which was improved by Li et al [4] in 2011. Deng et al [5] proposed an efficient QSDC scheme.…”
Section: Introductionmentioning
confidence: 99%
“…The quantum key distribution (QKD), whose task is to create a secret key between two remote authorized users, is one of the most remarkable applications of quantum mechanics and the only proven protocol for secure key distribution. Since Bennett and Brassard presented the pioneer QKD protocol (BB84 protocol) [1] in 1984, a lot of quantum information security processing methods have been advanced, such as quantum teleportation [2][3][4][5][6][7], quantum dense coding [8][9][10], quantum secret sharing [11,12] and so on.In recent years, a novel concept, quantum secure direct communication (QSDC) [13,14] was put forward and studied by some groups. Different from the key distribution whose object is to establish a common random key between two parties, the secure direct communication is to transmit important message directly without establishing a random key to encrypt them first.…”
mentioning
confidence: 99%
“…In recent years, a novel concept, quantum secure direct communication (QSDC) [13,14] was put forward and studied by some groups. Different from the key distribution whose object is to establish a common random key between two parties, the secure direct communication is to transmit important message directly without establishing a random key to encrypt them first.…”
mentioning
confidence: 99%