0612016v1

related topics
{alice, bob, state}
{key, protocol, security}
{photon, photons, single}

Improving the security of secure direct communication based on secret transmitting order of particles

Xi-Han Li, Fu-Guo Deng, Hong-Yu Zhou

abstract: We analyzed the security of the secure direct communication protocol based on secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang [Phys. Rev. A 73, 022338 (2006)], and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.

oai_identifier:
oai:arXiv.org:quant-ph/0612016
categories:
quant-ph
comments:
4 pages, no figure
doi:
10.1103/PhysRevA.74.054302
arxiv_id:
quant-ph/0612016
journal_ref:
Phys. Rev. A 74, 054302 (2006)
created:
2006-12-02

Full article ▸

related documents
0501174v1
0005102v1
0412203v1
9605025v1
0602232v1
0511130v1
0305168v3
0403058v4
0504213v1
0303112v1
0012139v2
0511050v3
0407138v1
0301048v1
0010103v5
0605064v1
0612149v1
0212164v1
0703099v5
0702155v3
0611145v1
0701079v1
0701091v1
0612052v2
0612033v1