Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'

Journal Article · · Physical Review. A
; ;  [1];  [2]
  1. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China)
  2. School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876 (China)
Three protocols of quantum cryptography with a nonmaximally entangled qubit pair [Phys. Rev. A 80, 022323 (2009)] were recently proposed by Shimizu, Tamaki, and Fukasaka. The security of these protocols is based on the quantum-mechanical constraint for a state transformation between nonmaximally entangled states. However, we find that the second protocol is vulnerable under the correlation-elicitation attack. An eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.
OSTI ID:
21450676
Journal Information:
Physical Review. A, Journal Name: Physical Review. A Journal Issue: 3 Vol. 82; ISSN 1050-2947; ISSN PLRAAN
Country of Publication:
United States
Language:
English

Similar Records

Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol
Journal Article · Mon May 15 00:00:00 EDT 2000 · Physical Review Letters · OSTI ID:20216598

Security of quantum key distribution with entangled qutrits
Journal Article · Tue Dec 31 23:00:00 EST 2002 · Physical Review. A · OSTI ID:20634089

Security of two quantum cryptography protocols using the same four qubit states
Journal Article · Thu Sep 15 00:00:00 EDT 2005 · Physical Review. A · OSTI ID:20718487