Abstract
Fragility of quantum private communication based on Einstein-Podosky-Rosen (EPR) pair as pre-shared key against trojan horse attack strategy is investigated in detail. To prevent this kind of attack strategy, the EPR pairs employed in the quantum private communication is transferred into non-orthogonal entangled states by employing unitary transformations which are actually rotation operations on the quantum signal. Analysis show that the improved scheme is robust against the trojan horse attack strategy without reducing the security against other kinds of attack strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Schneier, B.: Applied Cryptography:protocols, algorithms, and source code in C. John Wiley & Sons, Inc., Chichester (1994)
Wiesner, S.: Conjugate coding. Sigact News 15, 78–98 (1983)
Bennett, C.H., Brassard, G.: Advances in Cryptology: Proceedings of Crypto 1984, August 1984, p. 475. Springer, Heidelberg (1984)
Ekert, A.K.: Quantum cryptography bases on Bell’s theorem. Phys. Rev. Lett. 67, 661–664 (1991)
Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptology 5, 3–28 (1992)
Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999)
Lo, H.-K., Chau, H.F.: Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances. Science 283, 2050–2057 (1999)
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Reviews of Modern Physics 74, 145–195 (2002)
Larsson, J. (November 13, 2001), http://xxx.lanl.gov/quant-ph/0111073
Zhang, Y., Li, C., Guo, G.: Phys. Rev. A 64, 24302 (2001)
Leung, D.W.: Quantun vernam cipher. Quantum information and computation 2, 14–30 (2002)
Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162–168 (1999)
Wootters, W., Zurek, W.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Peng, J., He, G., Xiong, J., Zeng, G. (2006). Trojan Horse Attack Strategy on Quantum Private Communication. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2006. Lecture Notes in Computer Science, vol 3903. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11689522_17
Download citation
DOI: https://doi.org/10.1007/11689522_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33052-3
Online ISBN: 978-3-540-33058-5
eBook Packages: Computer ScienceComputer Science (R0)