2013
DOI: 10.1088/0256-307x/30/7/079902
|View full text |Cite
|
Sign up to set email alerts
|

Reply to the Comment on “Improvement of Controlled Bidirectional Quantum Direct Communication Using a GHZ State" [Chin. Phys. Lett. 30 (2013) 040305]

Abstract: Most recently, Liu and Chen [Chin. Phys. Lett. 30 (2013) 079901] used the tool of information theory to analyze the security of our two improved versions of the MX protocol [Chin. Phys. Lett. 30 (2013) 040305], and they found out that our two improved versions still have the information leakage problem. After revisiting them with the tool of information theory again, with respect to the security, we draw the same conclusion as Liu and Chen. In addition, we point out that how to use a single quantum state as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 18 publications
(44 citation statements)
references
References 13 publications
0
44
0
Order By: Relevance
“…Also, the effectiveness of this method towards Eve's above active attacks has been fully analyzed in Refs. [10,13].…”
Section: Security Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Also, the effectiveness of this method towards Eve's above active attacks has been fully analyzed in Refs. [10,13].…”
Section: Security Analysismentioning
confidence: 99%
“…Suppose that Alice and Bob expect to transmit bits 10 and 01 to each other, respectively. After receiving particles a and b, Bob imposes U EX on particles a and b. Consequently, the |W abc evolves in a manner shown as (13). Then Bob performs Z-basis measurement on particle a to know its state.…”
Section: Protocol Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the pioneering work of Bennett and Brassard in 1984 [1], quantum cryptography has attracted a great deal of attention and has become one of the most promising applications of quantum information processing. There are several remarkable branches of quantum cryptography, including quantum key distribution (QKD) [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], quantum secure direct communication (QSDC) [15], [16], [17], [18], [19], [20], [21], quantum secret sharing (QSS) [22], [23], [24], [25], [26], [27], and secure multi-party computation (SMC) [28], [29], [30], [31], [32]. As one of the most important parts of quantum cryptographic protocols, the multi-party quantum cryptographic protocol (MQCP) which involves at least three participants, such as quantum private comparison (QPC) protocols and QSS protocols, are more complicated than the two-party ones.…”
Section: Introductionmentioning
confidence: 99%
“…21 However, as pointed out in Refs. 36 and 37, Ye's two improved protocols 35 still have the information leakage problem. Actually, all of the protocols in Refs.…”
Section: Introductionmentioning
confidence: 99%