Nothing Special   »   [go: up one dir, main page]

Skip to main content

Attacks and Improvements of QSDC Schemes Based on CSS Codes

  • Conference paper
Bio-Inspired Computing and Applications (ICIC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNBI,volume 6840))

Included in the following conference series:

Abstract

Quantum secure direct communication (QSDC) is a new research direction in quantum cryptography. Recently, a QSDC scheme using quantum Calderbank-Shor-Steane (CSS) error correction codes is proposed [Journal of Software, 17, 509–515 (2006)]. However, in this paper, it is showed that the scheme can not resist the man-in-the-middle attack. To resist man-in-the-middle attacks, an improved QSDC scheme using quantum CSS error correction codes is suggested. Furthermore, we discuss the security of the improved QSDC scheme for an ideal noiseless channel. In particular, it can resist the attack without eavesdropping.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179 (1984)

    Google Scholar 

  2. Ekert, A.K.: Quantum Cryptography Based on Bell’s Theorem. Physical Review Letters 67, 661–663 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  3. Lo, H.K., Chau, H.F.: Unconditional Security of Quantumkey Distribution over Arbitrarily Long Distances. Science 283, 2050–2056 (1999)

    Article  Google Scholar 

  4. Shor, P.W., Preskill, J.: Simple Proof of Security of The BB84 Quantum Key Distribution Protocol. Physical Review Letters 85, 441–444 (2000)

    Article  Google Scholar 

  5. Nielsen, M.A., Chuang, I.L.: Quantum Conputation and Quantum Information. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  6. Beige, A., Englert, B.G., Kurtsiefer, C., Weinfurter, H.: Secure Communication With a Publicly Known Key. Acta Physica Polonica A 101, 357–368 (2002)

    Article  MATH  Google Scholar 

  7. Bostöm, K., Felbinger, T.: Deterministic Secure Direct Communication Using Entanglement. Physical Review Letters 89, 187902 (2002)

    Article  Google Scholar 

  8. Wójcik, A.: Eavesdropping on the ”Ping-Pong” Quantum Communication Protocol. Physical Review Letters 90, 157901 (2003)

    Article  Google Scholar 

  9. Zhang, Z., Man, Z., Li, Y.: Improving Wójcik’s Eavesdropping Attack on the Ping-pong Protocol. Physics Letters A 333, 46–50 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  10. Deng, F.G., Long, G.L., Liu, X.S.: Two-step Quantum Direct Communication Protocol Using the Einstein-Podolsky-Rosen Pair Block. Physical Review A 68, 042317 (2003)

    Article  Google Scholar 

  11. Gao, T., Yan, F.L., Wang, Z.X.: Quantum Secure Direct Communication by EPR Pairs and Entanglement Swapping. Nuovo Cimento Della Societa Italiana di Fisica B 119, 313–318 (2004)

    Google Scholar 

  12. Gao, T., Yan, F.L., Wang, Z.X.: Deterministic Secure Direct Communication Using GHZ States and Swapping Quantum Entanglement. Journal of Physics A 38, 5761–5770 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  13. Deng, F.G., Long, G.L.: Secure Direct Communication with a Quantum One-time Pad. Physical Review A 69, 052319 (2004)

    Article  Google Scholar 

  14. Hoffmann, H., Bostroem, K., Felbinger, T.: Comment on Secure Direct Communication with a Quantum One-time Pad. Physical Review A 72, 016301 (2005)

    Article  Google Scholar 

  15. Deng, F.G., Long, G.L.: Reply to Comment on Secure Direct Communication with a Quantum Onetime-pad. Physical Review A 72, 016302 (2005)

    Article  Google Scholar 

  16. Man, Z.X., Zhang, Z.J., Li, Y.: Deterministic Secure Direct Communication by Using Swapping Quantum Entanglement and Local Unitary Operations. Chinese Physics Letters 22, 18–21 (2005)

    Article  Google Scholar 

  17. Lucamarini, M., Mancini, S.: Secure Deterministic Communication without Entanglement. Physical Review Letters 94, 140501 (2005)

    Article  Google Scholar 

  18. Nguyen, B.A.: Quantum Dialogue. Physics Letters A 328, 6–10 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  19. Jin, X.R., Ji, X., Zhang, Y.Q., Zhang, S., Hong, S.K., Yeon, K.H., Um, C.I.: Three-party Quantum Secure Direct Communication Based on GHZ States. Physics Letters A 35, 67–70 (2006)

    Article  Google Scholar 

  20. Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Quantum Secure Direct Communication Network with Einstein-Podolsky-Rosen Pairs. Physics Letters A 359, 359–365 (2006)

    Article  MATH  Google Scholar 

  21. Lü, X., Ma, Z., Feng, D.G.: Quantum Secure Direct Communication Using Quantum Calderbank-Shor-Steane Error Correcting Codes. Journal of Software 17, 509–515 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  22. Wang, Y., Wang, H., Li, Z., Huang, J.: Man-in-the-Middle Attack on BB84 Protocol and its Defence. In: 2nd IEEE International Conference on Computer Science and Information Technology, pp. 438–439 (2009)

    Google Scholar 

  23. Cai, Q.Y.: The “Ping-Pong” Protocol can be Attacked Without Eavesdropping. Physical Review Letters 91, 109801 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zou, X., Qiu, D. (2012). Attacks and Improvements of QSDC Schemes Based on CSS Codes. In: Huang, DS., Gan, Y., Premaratne, P., Han, K. (eds) Bio-Inspired Computing and Applications. ICIC 2011. Lecture Notes in Computer Science(), vol 6840. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24553-4_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24553-4_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24552-7

  • Online ISBN: 978-3-642-24553-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics