Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'
Journal Article
·
· Physical Review. A
- State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China)
- School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876 (China)
Three protocols of quantum cryptography with a nonmaximally entangled qubit pair [Phys. Rev. A 80, 022323 (2009)] were recently proposed by Shimizu, Tamaki, and Fukasaka. The security of these protocols is based on the quantum-mechanical constraint for a state transformation between nonmaximally entangled states. However, we find that the second protocol is vulnerable under the correlation-elicitation attack. An eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.
- OSTI ID:
- 21450676
- Journal Information:
- Physical Review. A, Vol. 82, Issue 3; Other Information: DOI: 10.1103/PhysRevA.82.036301; (c) 2010 The American Physical Society; ISSN 1050-2947
- Country of Publication:
- United States
- Language:
- English
Similar Records
Security of two quantum cryptography protocols using the same four qubit states
Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography
No information flow using statistical fluctuations and quantum cryptography
Journal Article
·
Thu Sep 15 00:00:00 EDT 2005
· Physical Review. A
·
OSTI ID:21450676
+1 more
Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography
Journal Article
·
Fri Apr 01 00:00:00 EST 2005
· Physical Review. A
·
OSTI ID:21450676
No information flow using statistical fluctuations and quantum cryptography
Journal Article
·
Thu Apr 01 00:00:00 EST 2004
· Physical Review. A
·
OSTI ID:21450676