Quantum direct communication protocol strengthening against Pavičić’s attack

A quantum circuit providing an undetectable eavesdropping of information in message mode, which compromises all two-state ψ-ϕ quantum direct communication (QDC) protocols, has been recently proposed by Pavicic [Phys. Rev. A 87 (2013) 042326]. A modification of the protocol’s control mode is proposed, which improves users’ 25% detection probability of Eve to 50% at best, as that in ping-pong protocol. The modification also improves the detection probability of Wojcik’s attack [Phys. Rev. Lett 90 (2003) 157901] to 75% at best. The resistance against man-in-the-middle (MITM) attack as well as the discussion of security for four Bell state protocols is presented. As a result, the protocol security is strengthened both theoretically and practically, and quantum advantage of superdense coding is restored.

[1]  Alireza Bahrampour,et al.  Three-particle deterministic secure and high bit-rate direct quantum communication protocol , 2013, Quantum Inf. Process..

[2]  Qun-Yong Zhang,et al.  Quantum secure direct communication by entangled qutrits and entanglement swapping , 2009 .

[3]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[4]  Li Jun,et al.  A Flexible Improvement for Ping-Pong Protocol , 2006 .

[5]  Mladen Pavičić In quantum direct communication an undetectable eavesdropper can always tell Ψ from Φ Bell states in the message mode , 2013 .

[6]  Patrick J. Coles Role of complementarity in superdense coding , 2013, 1308.1511.

[7]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[8]  Piotr Zawadzki Ping-Pong Protocol Strengthening against Pavičić's Attack , 2014, CN.

[9]  Ming-Liang Hu,et al.  Quantum secure dialogue by using single photons , 2010 .

[10]  Mosayeb Naseri,et al.  Comment on: “secure direct communication based on ping-pong protocol” [Quantum Inf. Process. 8, 347 (2009)] , 2010, Quantum Inf. Process..

[11]  Hua Lu,et al.  Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel , 2011, 1111.0109.

[12]  Qing-yu Cai,et al.  Improving the capacity of the Boström-Felbinger protocol , 2003, quant-ph/0311168.

[13]  Su-Juan Qin,et al.  Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair' , 2010 .

[14]  Ping Zhou,et al.  Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs , 2006 .

[15]  Qing-yu Cai,et al.  Deterministic secure communication protocol without using entanglement , 2003 .

[16]  Piotr Zawadzki Improving security of the ping-pong protocol , 2013, Quantum Inf. Process..

[17]  Liu Yu,et al.  Cryptanalysis of an Improved Flexible Ping-Pong Protocol in Perfect and Imperfect Quantum Channels , 2009 .

[18]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[19]  Kaoru Shimizu,et al.  Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair , 2009 .

[20]  Jian Wang,et al.  Quantum secure direct communication based on order rearrangement of single photons , 2006, quant-ph/0603100.

[21]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[22]  Cai Qing-yu,et al.  Deterministic secure communication without using entanglement , 2004 .

[23]  Jaroslaw Adam Miszczak,et al.  Increasing the security of the ping–pong protocol by using many mutually unbiased bases , 2012, Quantum Inf. Process..

[24]  Eugene V. Vasiliu Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits , 2011, Quantum Inf. Process..

[25]  Marco Lucamarini,et al.  Secure deterministic communication without entanglement. , 2005, Physical review letters.

[26]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[27]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.

[28]  Q. Cai,et al.  Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol , 2011, 1111.4411.

[29]  Zhan-jun Zhang,et al.  Improving Wojcik's eavesdropping attack on the ping-pong protocol , 2004 .

[30]  Piotr Zawadzki Security of ping-pong protocol based on pairs of completely entangled qudits , 2012, Quantum Inf. Process..

[31]  Qiaoyan Wen,et al.  Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .

[32]  Fuguo Deng,et al.  Quantum secure direct communication with high-dimension quantum superdense coding , 2005 .