Skip to main content
Log in

Comment on: “secure direct communication based on ping-pong protocol” [Quantum Inf. Process. 8, 347 (2009)]

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

The crucial issue of quantum communication protocol is its security. In this paper, the security of a secure direct communication based on ping-pong protocol [Chamoli A, Bhandari CM, Quantum Inf Process 8, 347 (2009)] is analyzed. It is shown that in this protocol any dishonest party can obtain all the other one’s secret message with zero risk of being detected by using a special type of attack, i.e., using fake entangled particles (FEP attack). Finally, a simple improvement to resist this attack is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, pp. 175–179. IEEE, New York (1984)

  2. Ekert A.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)

    Article  MATH  MathSciNet  ADS  PubMed  Google Scholar 

  3. Bennett C. H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)

    Article  MATH  MathSciNet  ADS  PubMed  Google Scholar 

  4. Nielsen M. A., Chuang I. L.: Quantum computation and quantum information. Cambridge University Press, Cambridge (2000)

    MATH  Google Scholar 

  5. Beige A., Engler B. G., Kurtsiefer C., Weinfurter H.: Secure communication with a publicly known key. Acta. Phys. Pol. A 101, 357 (2002)

    CAS  ADS  Google Scholar 

  6. Bostrom K., Felbinger T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)

    Article  ADS  PubMed  Google Scholar 

  7. Nguyen B. A.: Quantum dialogue. Phys. Lett. A 328, 6–10 (2004)

    Article  MATH  CAS  MathSciNet  ADS  Google Scholar 

  8. Wen X.J. et al.: Secure quantum telephone . Opt. Commun. 275, 278–282 (2007)

    Article  CAS  ADS  Google Scholar 

  9. Sun Y. et al.: Improving the security of secure quantum telephone against an attack with fake particles and local operations. Opt. Commun. 282, 2278–2280 (2009). doi:10.1016/j.optcom.2009.02.033

    Article  CAS  ADS  Google Scholar 

  10. Naseri M.: Eavesdropping on secure quantum telephone protocol with dishonest server. Opt. Commun. 282, 3375–3378 (2009). doi:10.1016/j.optcom.2009.05.012

    Article  CAS  ADS  Google Scholar 

  11. Jin X. R. et al.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354, 67 (2006)

    Article  CAS  ADS  Google Scholar 

  12. Deng F. G. et al.: Multiparty quantum secret report. Chin. Phys. Lett. 23, 1676–1679 (2006)

    Article  ADS  Google Scholar 

  13. Naseri M.: Secure quantum sealed-bid auction. Opt. Commun. 282, 1939–1943 (2009)

    Article  CAS  ADS  Google Scholar 

  14. Chamoli A., Bhandari C. M.: Secure direct communication based on ping-pong protocol. Quantum Inf. Process. 8, 347 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  15. Li X. H. et al.: Deterministic secure quantum communication without maximally entangled states. J. Korean Phys. Soc. 49, 1354 (2006)

    Google Scholar 

  16. Li C. Y. et al.: Secure quantum key distribution network with Bell states and local unitary operations. Chin. Phys. Lett. 22, 1049–1052 (2005)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mosayeb Naseri.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Naseri, M. Comment on: “secure direct communication based on ping-pong protocol” [Quantum Inf. Process. 8, 347 (2009)]. Quantum Inf Process 9, 693–698 (2010). https://doi.org/10.1007/s11128-009-0157-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-009-0157-2

Keywords

PACS

Navigation