publication . Preprint . 2003

Improving the capacity of the ping-pong protocol

Cai, Qing-yu; Li, Bai-wen;
Open Access English
  • Published: 25 Nov 2003
Abstract
We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol. Alice and Bob can use the variable measurement basises in control mode to detect Eve's eavesdropping attack. In message mode, Alice can use one unitary operations to encode two bits information. Bob only needs to perform a Bell type measurement to decode Alice's information. A classical message authentification method can protect this protocol against the eavesdropping hiding in the quantum channel losses and the denial-of-service (DoS) attack.
Subjects
free text keywords: Quantum Physics
Download from
19 references, page 1 of 2

[1] C. H. Bennett, and G. Brassard, in Proceedings of the IEEE international Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175-179.

[2] A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).

[3] C. H. Bennett, G. Brassard, and N. D. Mermin, Phys. Rev. Lett. 68, 557 (1992).

[4] C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).

[5] C. H. Bennett and S. J. Winsner, Phys. Rev. Lett. 69, 2881 (1992).

[6] L. Goldenberg and L. Vaidman, Phys. Rev. Lett. 75, 1239 (1995).

[7] B. Huttner, N. Imoto, N. Gisin, and T. Mor, Phys. Rev. A 51, 1863 (1995).

[8] M. Koashi and N. Imoto, Phys. Rev. Lett. 79, 2383 (19970.

[9] D. Bruss, Phys. Rev. Lett. 81, 3018 (1998).

[10] W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998).

[11] H.-K. Lo and H. F. Chau, Science 283, 2050 (1999).

[12] A. Cabell, Phys. Rev. Lett. 85, 5635 (2000).

[13] A. Beige, B.-G. Englert, C. Kurtsiefer, and H. Weinfurter, Acta. Phys. Pol. A 101, 357 (2002).

[14] K. Bostroem and T. Felbinger, Phys. Rev. Lett. 89, 187902 (2002).

[15] A. Wojcik, Phys. Rev. Lett. 90, 157901 (2003).

19 references, page 1 of 2
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue