Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]

A. Chamoli and C.M. Bhandari presented a secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]. M.Naseri analyzed its security and pointed out that in this protocol any dishonest party can obtain all the other one’s secret message with zero risk of being detected by using fake entangled particles (FEP attack) [M. Naseri, Quantum Inf. Process. online]. In this letter, we reexamine the protocol’s security and discover that except the FEP attack, using a special property of GHZ states, any one dishonest party can also take a special attack, i.e., double-CNOT(Controlled NOT) attack. Finally, a denial-of-service attack is also discussed.

[1]  Kaoru Shimizu,et al.  Communication channels secured from eavesdropping via transmission of photonic Bell states , 1999 .

[2]  Nguyen Ba An Quantum dialogue , 2004 .

[3]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[4]  Fuguo Deng,et al.  Quantum secure direct communication with high-dimension quantum superdense coding , 2005 .

[5]  Fei Gao,et al.  Comment on ``Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'' , 2005 .

[6]  Marco Lucamarini,et al.  Secure deterministic communication without entanglement. , 2005, Physical review letters.

[7]  F. L. Yan,et al.  A scheme for secure direct communication using EPR pairs and teleportation , 2004 .

[8]  Qiaoyan Wen,et al.  Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .

[9]  Qiaoyan Wen,et al.  Quantum secure direct communication with χ -type entangled states , 2008 .

[10]  Wen Qiao-Yan,et al.  A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .

[11]  Zhan-jun Zhang Comment on : Quantum direct communication with authentication , 2006, quant-ph/0604125.

[12]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[13]  Hwayean Lee,et al.  Quantum direct communication with authentication , 2005, quant-ph/0512051.

[14]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[15]  Arti Chamoli,et al.  Secure direct communication based on ping–pong protocol , 2009, Quantum Inf. Process..

[16]  Su-Juan Qin,et al.  Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .

[17]  Mosayeb Naseri,et al.  Comment on: “secure direct communication based on ping-pong protocol” [Quantum Inf. Process. 8, 347 (2009)] , 2010, Quantum Inf. Process..

[18]  Qing-yu Cai,et al.  Improving the capacity of the Boström-Felbinger protocol , 2003, quant-ph/0311168.

[19]  Qiaoyan Wen,et al.  Comment II on "Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers" (3 pages) , 2005, quant-ph/0505052.

[20]  Qiaoyan Wen,et al.  Comment on “Quantum key distribution for d -level systems with generalized Bell states” , 2005, quant-ph/0505053.

[21]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.