Quantum direct communication protocol strengthening against Pavičić’s attack
暂无分享,去创建一个
Bo Zhang | Jian Wang | Chao-jing Tang | Wei-Xu Shi | Bo Zhang | Jian Wang | Chaojing Tang | Weixu Shi
[1] Alireza Bahrampour,et al. Three-particle deterministic secure and high bit-rate direct quantum communication protocol , 2013, Quantum Inf. Process..
[2] Qun-Yong Zhang,et al. Quantum secure direct communication by entangled qutrits and entanglement swapping , 2009 .
[3] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[4] Li Jun,et al. A Flexible Improvement for Ping-Pong Protocol , 2006 .
[5] Mladen Pavičić. In quantum direct communication an undetectable eavesdropper can always tell Ψ from Φ Bell states in the message mode , 2013 .
[6] Patrick J. Coles. Role of complementarity in superdense coding , 2013, 1308.1511.
[7] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[8] Piotr Zawadzki. Ping-Pong Protocol Strengthening against Pavičić's Attack , 2014, CN.
[9] Ming-Liang Hu,et al. Quantum secure dialogue by using single photons , 2010 .
[10] Mosayeb Naseri,et al. Comment on: “secure direct communication based on ping-pong protocol” [Quantum Inf. Process. 8, 347 (2009)] , 2010, Quantum Inf. Process..
[11] Hua Lu,et al. Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel , 2011, 1111.0109.
[12] Qing-yu Cai,et al. Improving the capacity of the Boström-Felbinger protocol , 2003, quant-ph/0311168.
[13] Su-Juan Qin,et al. Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair' , 2010 .
[14] Ping Zhou,et al. Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs , 2006 .
[15] Qing-yu Cai,et al. Deterministic secure communication protocol without using entanglement , 2003 .
[16] Piotr Zawadzki. Improving security of the ping-pong protocol , 2013, Quantum Inf. Process..
[17] Liu Yu,et al. Cryptanalysis of an Improved Flexible Ping-Pong Protocol in Perfect and Imperfect Quantum Channels , 2009 .
[18] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[19] Kaoru Shimizu,et al. Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair , 2009 .
[20] Jian Wang,et al. Quantum secure direct communication based on order rearrangement of single photons , 2006, quant-ph/0603100.
[21] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[22] Cai Qing-yu,et al. Deterministic secure communication without using entanglement , 2004 .
[23] Jaroslaw Adam Miszczak,et al. Increasing the security of the ping–pong protocol by using many mutually unbiased bases , 2012, Quantum Inf. Process..
[24] Eugene V. Vasiliu. Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits , 2011, Quantum Inf. Process..
[25] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[26] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[27] Antoni Wójcik. Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.
[28] Q. Cai,et al. Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol , 2011, 1111.4411.
[29] Zhan-jun Zhang,et al. Improving Wojcik's eavesdropping attack on the ping-pong protocol , 2004 .
[30] Piotr Zawadzki. Security of ping-pong protocol based on pairs of completely entangled qudits , 2012, Quantum Inf. Process..
[31] Qiaoyan Wen,et al. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .
[32] Fuguo Deng,et al. Quantum secure direct communication with high-dimension quantum superdense coding , 2005 .