Abstract
From the perspective of information theory and cryptography, the security of two quantum dialogue protocols and a bidirectional quantum secure direct communication (QSDC) protocol was analyzed, and it was pointed out that the transmitted information would be partly leaked out in them. That is, any eavesdropper can elicit some information about the secrets from the public annunciations of the legal users. This phenomenon should have been strictly forbidden in a quantum secure communication. In fact, this problem exists in quite a few recent proposals and, therefore, it deserves more research attention in the following related study.
Similar content being viewed by others
References
Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography. Rev Mod Phys, 2002, 74: 145–195
Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984. 175–179
Ekert A K. Quantum cryptography based on Bell’s theorem. Phys Rev Lett, 1991, 67: 661–663
Bennett C H. Quantum cryptography using any two nonorthogonal states. Phys Rev Lett, 1992, 68: 3121–3124
Boström K, Felbinger T. Deterministic secure direct communication using entanglement. Phys Rev Lett, 2002, 89: 187902
Deng F G, Long G L, Liu X S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys Rev A, 2003, 68: 042317
Deng F G, Long G L. Secure direct communication with a quantum one-time pad. Phys Rev A, 2004, 69: 052319
Lucamarini M, Mancini S. Secure deterministic communication without entanglement. Phys Rev Lett, 2005, 94: 140501
Hoffmann H, Bostroem K, Felbinger T. Comment on “Secure direct communication with a quantum one-time pad”. Phys Rev A, 2005, 72: 016301
Deng F G, Long G L. Reply to “Comment on ’secure direct communication with a quantum one-time pad’”. Phys Rev A, 2005, 72: 016302
Deng F G, Li X H, Li C Y, et al. Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs. Phys Lett A, 2006, 359: 359–365
Nguyen B A. Quantum dialogue. Phys Lett A, 2004, 328: 6–10
Zhang Y S, Li C F, Guo G C. Comment on “Quantum key distribution without alternative measurements”. Phys Rev A, 2001, 63: 036301
Wójcik A. Eavesdropping on the “Ping-Pong” quantum communication protocol. Phys Rev Lett, 2003, 90: 157901
Wójcik A. Comment on “Quantum dense key distribution”. Phys Rev A, 2005, 71: 016301
Gao F, Guo F Z, Wen Q Y, et al. Comment on “Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers”. Phys Rev A, 2005, 72: 036302
Gao F, Guo F Z, Wen Q Y, et al. Comment on “Quantum key distribution for d-level systems with generalized Bell states”. Phys Rev A, 2005, 72: 066301
Deng F G, Li X H, Zhou H Y, et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys Rev A, 2005, 72: 044302
Lo H K, Ko T M. Some attacks on quantum-based cryptographic protocols. Quantum Inf Comput, 2005, 5: 40–47
Qin S J, Gao F, Wen Q Y, et al. Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys Lett A, 2006, 357: 101–103
Gao F, Wen Q Y, Zhu F C. Comment on “Quantum exam”. Phys Lett A, 2007, 360: 748–750
Gao F, Qin S J, Wen Q Y, et al. A simple participant attack on the Brádler-Dušek protocol. Quantum Inf Comput, 2007, 7: 329–334
Zhang Z J, Liu J, Wang D, et al. Comment on “Quantum direct communication with authentication”. Phys Rev A, 2007, 75: 026301
Man Z X, Zhang Z J, Li Y. Quantum dialogue revisited. Chin Phys Lett, 2005, 22: 22–24
Bennett C H, Wiesner S J. Communication via one-and two-particle operators on Einstein-Podolsky-Rosen states. Phys Rev Lett, 1992, 69: 2881–2884
Man Z X, Xia Y J, Nguyen B A. Quantum secure direct communication by using GHZ states and entanglement swapping. J Phys B: At Mol Opt Phys, 2006, 39: 3855–3863
Zukowski M, Zeilinger A, Horne M A, et al. “Event-ready-detectors” Bell experiment via entanglement swapping. Phys Rev Lett, 1993, 71: 4287–4290
Ji X, Zhang S. Secure quantum dialogue based on single-photon. Chin Phys, 2006, 15: 1418–1420
Man Z X, Xia Y J. Controlled bidirectional quantum direct communication by using a GHZ state. Chin Phys Lett, 2006, 23: 1680–1682
Xia Y, Fu C B, Zhang S, et al. Quantum dialogue by using the GHZ state. J Korean Phys Soc, 2006, 48: 24–27
Jin X R, Ji X, Zhang Y Q, et al. Three-party quantum secure direct communication based on GHZ states. Phys Lett A, 2006, 354: 67–70
Man Z X, Xia Y J. Improvement of security of three-party quantum secure direct communication based on GHZ states. Chin Phys Lett, 2007, 24: 15–18
Chen Y, Man Z X, Xia Y J. Quantum bidirectional secure direct communication via entanglement swapping. Chin Phys Lett, 2007, 24: 19–22
Gao F, Guo F Z, Wen Q Y, et al. On the information-splitting essence of two types of quantum key distribution protocols. Phys Lett A, 2006, 355: 172–175
Shannon C E. Communication theory of secrecy system. Bell Syst Tech J, 1949, 28: 656–715
Gao F, Qin S J, Wen Q Y, et al. One-time pads cannot be used to improve the efficiency of quantum communication. Phys Lett A, 2007, 365: 386–388
Tan Y, Cai Q. Classical correlation in quantum dialogue. arXiv:0802.0358
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National High Technology Research and Development Program of China (Grant No. 2006AA01Z419), the National Natural Science Foundation of China (Grant Nos. 90604023 and 60373059), the National Research Foundation for the Doctoral Program of Higher Education of China (Grant No. 20040013007), the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601), the Natural Science Foundation of Beijing (Grant No. 4072020) and the ISN Open Foundation
Rights and permissions
About this article
Cite this article
Gao, F., Guo, F., Wen, Q. et al. Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G-Phys. Mech. As 51, 559–566 (2008). https://doi.org/10.1007/s11433-008-0065-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11433-008-0065-y