Eavesdropping on the two-way quantum communication protocols with invisible photons

[1]  Fei Gao,et al.  Comment on ``Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'' , 2005 .

[2]  Chil-Min Kim,et al.  Quantum key distribution with blind polarization bases. , 2005, Physical review letters.

[3]  T. Felbinger,et al.  Comment on 'Secure direct communication with a quantum one-time pad' , 2004, quant-ph/0406115.

[4]  Marco Lucamarini,et al.  Secure deterministic communication without entanglement. , 2004, Physical review letters.

[5]  A. Wójcik Comment on 'Quantum dense key distribution' , 2004, quant-ph/0405035.

[6]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[7]  Lü Hua,et al.  Cai–Li Communication Protocol in Noisy Quantum Channel , 2004 .

[8]  Fuguo Deng,et al.  Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .

[9]  Fuguo Deng,et al.  Secure direct communication with a quantum one-time pad , 2004, quant-ph/0405177.

[10]  Cai Qing-yu,et al.  Deterministic secure communication without using entanglement , 2004 .

[11]  A. Colla,et al.  Quantum dense key distribution , 2003, quant-ph/0312128.

[12]  Qing-yu Cai,et al.  Improving the capacity of the Boström-Felbinger protocol , 2003, quant-ph/0311168.

[13]  M. Lewenstein,et al.  Entanglement as a precondition for secure quantum key distribution. , 2003, Physical review letters.

[14]  Q. Cai The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.

[15]  A. Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2002, Physical review letters.

[16]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[17]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[18]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[19]  T. Kutsuwa,et al.  A single-photon detector in the far-infrared range , 2000, Nature.

[20]  G. Brassard,et al.  Security aspects of practical quantum cryptography , 1999, Conference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504).

[21]  H. Chau,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1998, Science.

[22]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[23]  Karsten P. Ulland,et al.  Vii. References , 2022 .