Modification Attack on QSDC with Authentication and the Improvement

Recently, Yu et al. [Int. J. Theor. Phys., 2012, doi:10.1007/s10773-012-1336-y] proposed a quantum secure direct communication (QSDC) with authentication using two non-orthogonal states. This study points out a pitfall in Yu et al.’s scheme, in which an eavesdropper can deliberately modify the message without being detected. Furthermore, an enhanced scheme is proposed to avoid the modification attack.

[1]  T. Hwang,et al.  Improved QSDC Protocol over a Collective-Dephasing Noise Channel , 2012 .

[2]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.

[3]  T. Hwang,et al.  One-Way Quantum Authenticated Secure Communication Using Rotation Operation , 2011 .

[4]  Zhan-jun Zhang Comment on : Quantum direct communication with authentication , 2006, quant-ph/0604125.

[5]  Li Zhi-qiang,et al.  Efficient Quantum Secure Direct Communication with Authentication , 2007 .

[6]  Hwayean Lee,et al.  Quantum direct communication with authentication , 2005, quant-ph/0512051.

[7]  Liu Dan,et al.  A New Quantum Secure Direct Communication Scheme with Authentication , 2010 .

[8]  Shi-Jinn Horng,et al.  Quantum direct communication with mutual authentication , 2009, Quantum Inf. Comput..

[9]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[10]  Jing Yang,et al.  Quantum Secure Direct Communication with Authentication Expansion Using Single Photons , 2010 .

[11]  Chao-Hua Yu,et al.  Quantum Secure Direct Communication with Authentication Using Two Nonorthogonal States , 2013 .

[12]  Fuguo Deng,et al.  Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.

[13]  Chun-Wei Yang,et al.  Enhancement on “quantum blind signature based on two-state vector formalism” , 2013, Quantum Inf. Process..

[14]  Wen Qiao-Yan,et al.  High Efficiency of Two Efficient QSDC with Authentication Is at the Cost of Their Security , 2009 .

[15]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[16]  Zhiwei Sun,et al.  QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM IDENTIFICATION , 2012 .

[17]  Q. Cai Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.

[18]  Ping Zhou,et al.  Robustness of two-way quantum communication protocols against Trojan horse attack , 2005 .

[19]  Qing-yu Cai,et al.  The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.

[20]  Wen Qiao-Yan,et al.  Quantum blind signature based on Two-State Vector Formalism , 2010 .

[21]  Deng Fu-Guo,et al.  Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .