|
related topics |
{alice, bob, state} |
{key, protocol, security} |
{photon, photons, single} |
|
Improving the security of secure direct communication based on secret
transmitting order of particles
Xi-Han Li, Fu-Guo Deng, Hong-Yu Zhou
abstract: We analyzed the security of the secure direct communication protocol based on
secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and
Zhang [Phys. Rev. A 73, 022338 (2006)], and found that this scheme is insecure
if an eavesdropper, say Eve, wants to steal the secret message with Trojan
horse attack strategies. The vital loophole in this scheme is that the two
authorized users check the security of their quantum channel only once. Eve can
insert another spy photon, an invisible photon or a delay one in each photon
which the sender Alice sends to the receiver Bob, and capture the spy photon
when it returns from Bob to Alice. After the authorized users check the
security, Eve can obtain the secret message according to the information about
the transmitting order published by Bob. Finally, we present a possible
improvement of this protocol.
- oai_identifier:
- oai:arXiv.org:quant-ph/0612016
- categories:
- quant-ph
- comments:
- 4 pages, no figure
- doi:
- 10.1103/PhysRevA.74.054302
- arxiv_id:
- quant-ph/0612016
- journal_ref:
- Phys. Rev. A 74, 054302 (2006)
- created:
- 2006-12-02
Full article ▸
|
|
related documents |
0501174v1 |
0005102v1 |
0412203v1 |
9605025v1 |
0602232v1 |
0511130v1 |
0305168v3 |
0403058v4 |
0504213v1 |
0303112v1 |
0012139v2 |
0511050v3 |
0407138v1 |
0301048v1 |
0010103v5 |
0605064v1 |
0612149v1 |
0212164v1 |
0703099v5 |
0702155v3 |
0611145v1 |
0701079v1 |
0701091v1 |
0612052v2 |
0612033v1 |
|