On the Security of the Ping-Pong Protocol

Preprint English OPEN
Bostroem, Kim; Felbinger, Timo;

We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our origi... View more
  • References (17)
    17 references, page 1 of 2

    [1] K. Bostroem, T. Felbinger, Deterministic secure direct communication using entanglement., Phys. Rev. Lett. 89 (18) (2002) 187902.

    [2] C. Bennett, G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing, Bangalore (1984) 175-179.

    [3] M. Ostermeyer, N. Walenta, Experimental demonstration of quantum key distribution with entangled photons following the ping-pong coding protocol, arXiv:quant-ph/0703242. URL http://www.arxiv.org/abs/quant-ph/0703242

    [4] Q.-Y. Cai, B.-W. Li, Improving the capacity of the bostr¨omfelbinger protocol, Phys. Rev. A 69 (2004) 054301.

    [5] Q.-Y. Cai, B.-W. Li, Deterministic secure communication without using entanglement, Chin. Phys. Lett. 21 (2004) 601- 603.

    [6] I. P. Degiovanni, I. Ruo Berchera, S. Castelletto, M. L. Rastello, Quantum dense key distribution, Phys. Rev. A 69 (2004) 032310.

    [7] M. Lucamarini, S. Mancini, Secure deterministic communication without entanglement., Phys. Rev. Lett. 94 (14) (2005) 140501.

    [8] F.-G. Deng, G.-L. Long, Secure direct communication with a quantum one-time pad, Phys. Rev. A 69 (2004) 052319.

    [9] Q. Cai, The “ping-pong” protocol can be attacked without eavesdropping, Phys. Rev. Lett. 91 (10) (2003) 109801.

    [10] B. Schneier, Applied Cryptography, 2nd Edition, Wiley, New York, 1996.

  • Metrics
Share - Bookmark