SECURITY ENHANCED DIRECT QUANTUM COMMUNICATION WITH HIGHER BIT-RATE

A scheme for deterministic secure direct communication based on ping-pong protocol without restricting the security control only to a distinct control mode and debate via classical channel is proposed. It utilizes an entangled pair of qubits and presents a higher bit-rate transfer of information together with a higher security than ping-pong protocol. The security of protocol is enhanced by introducing a control factor for each message mode. It is explicitly showed that the protocol has a high degree of security against a class of individual attacks, and successfully resolves the famous Wojcik attack.

[1]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[2]  Qiaoyan Wen,et al.  Quantum secure direct communication with χ -type entangled states , 2008 .

[3]  P. Mateus,et al.  Fair and optimistic quantum contract signing , 2011, 1106.2922.

[4]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[5]  Qiaoyan Wen,et al.  Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .

[6]  Jaroslaw Adam Miszczak,et al.  Increasing the security of the ping–pong protocol by using many mutually unbiased bases , 2012, Quantum Inf. Process..

[7]  Eugene V. Vasiliu Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits , 2011, Quantum Inf. Process..

[8]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.

[9]  Piotr Zawadzki THE PING-PONG PROTOCOL WITH A PRIOR PRIVACY AMPLIFICATION , 2012 .

[10]  T. Felbinger,et al.  On the security of the ping-pong protocol , 2007, 0708.2986.

[11]  Kaoru Shimizu,et al.  Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair , 2009 .

[12]  Zhan-jun Zhang,et al.  Improving Wojcik's eavesdropping attack on the ping-pong protocol , 2004 .

[13]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[14]  S. Girvin,et al.  Introduction to quantum noise, measurement, and amplification , 2008, 0810.4729.

[15]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[16]  Marco Lucamarini,et al.  Secure deterministic communication without entanglement. , 2005, Physical review letters.

[17]  Hermann Kampermann,et al.  Distributed super dense coding over noisy channels , 2012 .

[18]  V. Scarani,et al.  Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography , 2004, quant-ph/0408122.

[19]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[20]  Qing-yu Cai,et al.  The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.

[21]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[22]  Harald Weinfurter,et al.  Secure Communication with a Publicly Known Key , 2001 .

[23]  A. Acín,et al.  Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.

[24]  Qing-yu Cai,et al.  Improving the capacity of the Boström-Felbinger protocol , 2003, quant-ph/0311168.

[25]  Todd A. Brun,et al.  Quantum steganography , 2010, Digital Media Steganography.

[26]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[27]  Mark M. Wilde,et al.  Public and private communication with a quantum channel and a secret key , 2009, 0903.3920.

[28]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[29]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[30]  Piotr Zawadzki Security of ping-pong protocol based on pairs of completely entangled qudits , 2012, Quantum Inf. Process..

[31]  Chil-Min Kim,et al.  Quantum key distribution with blind polarization bases. , 2005, Physical review letters.