Improving the security of secure direct communication based on the secret transmitting order of particles
Citations Over TimeTop 1% of 2006 papers
Abstract
We analyzed the security of the secure direct communication protocol based on the secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang[Phys. Rev. A 73, 022338 (2006)] and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon, or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.
Related Papers
- → ALICE: A system for manipulating and analyzing multidimensional data(1976)6 cited
- → Introduction: Alice Doesn’t Live Here Anymore (Transcript)(2011)
- → Analysis on A 1-out-n Security Protocol Based on Threshold Idea(2012)
- Detection of Trojan Horse based on behavior analysis(2012)
- → Post-Trojan Horse: Changes to Policy and Practice since the Trojan Horse Affair(2016)