Skip to main content
Log in

Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

A. Chamoli and C.M. Bhandari presented a secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]. M.Naseri analyzed its security and pointed out that in this protocol any dishonest party can obtain all the other one’s secret message with zero risk of being detected by using fake entangled particles (FEP attack) [M. Naseri, Quantum Inf. Process. online]. In this letter, we reexamine the protocol’s security and discover that except the FEP attack, using a special property of GHZ states, any one dishonest party can also take a special attack, i.e., double-CNOT(Controlled NOT) attack. Finally, a denial-of-service attack is also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Gisin N., Ribordy G., Tittel W., Zbinden H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)

    Article  ADS  Google Scholar 

  2. Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, pp. 175–179. IEEE, New York (1984)

  3. Bostrom K., Felbinger T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)

    Article  PubMed  ADS  CAS  Google Scholar 

  4. Shimizu K., Imoto N.: Communication channels secured from eavesdropping via transmission of photonic Bell states. Phys. Rev. A 60, 157–166 (1999)

    Article  CAS  ADS  Google Scholar 

  5. Deng F.G., Long G.L., Liu X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)

    Article  ADS  CAS  Google Scholar 

  6. Deng F.G., Long G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)

    Article  ADS  CAS  Google Scholar 

  7. Lucamarini M., Mancini S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501 (2005)

    Article  PubMed  ADS  CAS  Google Scholar 

  8. Cai Q.Y., Li B.W.: Improving the capacity of the Bostrom-Felbinger protocol. Phys. Rev. A 69, 054301 (2004)

    Article  ADS  CAS  Google Scholar 

  9. Wang C., Deng F.G., Li Y.S., Liu X.S., Long G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71, 044305 (2005)

    Article  ADS  CAS  Google Scholar 

  10. Nguyen B.A.: Quantum dialogue. Phys. Lett. A 328, 6–10 (2004)

    Article  MATH  CAS  ADS  MathSciNet  Google Scholar 

  11. Yan F.L., Zhang X.Q.: A scheme for secure direct communication using EPR pairs and teleportation. Eur. Phys. J. B 41, 75–78 (2004)

    Article  CAS  ADS  MathSciNet  Google Scholar 

  12. Lee H., Lim J., Yang H.J.: Quantum direct communication with authentication. Phys. Rev. A 73, 042305 (2006)

    Article  ADS  CAS  Google Scholar 

  13. Zhang Z.J., Liu J., Wang D., Shi S.H.: Comment on Quantum direct communication with authentication. Phys. Rev. A 75, 026301 (2007)

    Article  ADS  CAS  Google Scholar 

  14. Lin S., Wen Q.Y., Gao F.: Quantum secure direct communication with χ-type entangled states. Phys. Rev. A 78, 064304 (2008)

    Article  ADS  CAS  Google Scholar 

  15. Chamoli A., Bhandari C.M.: Secure direct communication based on ping-pong protocol. Quantum Inf. Process. 8, 347 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  16. Naseri, M.: Comment on: secure direct communication based on ping-pong protocol [Quantum Inf. Process. 8, 347 (2009)]. Quantum Inf. Process. Online

  17. Gao F., Guo F.Z., Wen Q.Y., Zhu F.C.: Comment on Quantum key distribution for d-level systems with generalized Bell states. Phys. Rev. A 72, 066301 (2005)

    Article  ADS  CAS  Google Scholar 

  18. Gao F., Guo F.Z., Wen Q.Y., Zhu F.C.: Comment on Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers. Phys. Rev. A 72, 036302 (2005)

    Article  ADS  MathSciNet  CAS  Google Scholar 

  19. Gao F., Wen Q.Y., Zhu F.C.: Comment on: Quantum exam [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360, 748–750 (2007)

    Article  CAS  ADS  Google Scholar 

  20. Gao F., Lin S., Wen Q.Y., Zhu F.C.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25, 1561–1563 (2008)

    Article  ADS  Google Scholar 

  21. Gao F., Qin S.J., Wen Q.Y., Zhu F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283, 192–195 (2010)

    Article  CAS  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Guang Yang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, YG., Teng, YW., Chai, HP. et al. Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]. Quantum Inf Process 10, 317–323 (2011). https://doi.org/10.1007/s11128-010-0199-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-010-0199-5

Keywords

Navigation