Attack the ‘ping-pong’ protocol without eavesdropping

نویسنده

  • Qing-yu Cai
چکیده

Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of eavesdropping attack is correct. The aim of this Comment, however, is to point out that the information Bob gains from Alice is not reliable, i.e., the message can not be transmitted successfully from Alice to Bob if this ‘ping-pong’ protocol is not modified. In the ‘ping-pong’ protocol, it utilizes the property that one bit of information can be encoded in the states |ψ± >, which is completely unavailable to anyone who has only access to one of the qubits. To gain information from Alice, Bob prepares two qubits in the Bell state |ψ+ >= (1/ √ 2)(|0 > |1 > +|1 > |0 >). Then he stores one qubit and sends the other one to Alice through the quantum channel. Alice can decide to the control or the message mode randomly. In message mode, Alice performs a unitary operation σ z to encode the information ‘1’ or does nothing to encode the information ‘0’. Then she sends it back. Bob can get Alice’s information by a Bell measurement. In control mode, Alice performs a measurement in the basis Bz = {|0 >, |1 >}. Using the public channel, she sends the result to Bob, who then also switches to control mode and performs a measurement in the same basis Bz. Bob compares his own result with Alice’s result. If both results coincide, Bob knows that Eve is in line and stops the communication. Else, Bob sends next qubit to Alice and this communication continues. It has been proven that any information Eve gains would make her face a nonzero detection probability. This is true. However, a fact that Eve can attack this quantum communication without eavesdropping is ignored, which would lead to the information Bob gains is not reliable. Suppose Eve is in the line. In every control mode, Eve does not touch the travel back qubit sent by Alice to Bob since Alice announces publicly. In every message mode, Eve captures the travel back qubit Alice sent to Bob and performs a measurement in the basis Bz and forwards to Bob this qubit. Alice and Bob have zero probability to find out Eve’s attack. Then Bob lets this communication continue. But, every Bob’s measurement result is meaningless since the two qubits become independent of each other after Eve’s attack measurement. The measurement result of Bob is randomly in states |ψ± >. When the communication is terminated, Bob has learned nothing but a sequence of nonsense random bits (With zero detection probability, Eve also can attack every qubit Bob sent to Alice using a measurement in basis Bz .). Essentially, this attack on the ‘ping-pong’ protocol without eavesdropping is a special case of a Denial-of-Service (DoS) attack. To detect such attack described above, the ‘ping-pong’ protocol should be modified. Alice can use a strategy like this: In control mode, with probability c0, Alice measures the travel qubit in basis Bz and tells the result to Bob through public channel. With probability 1 − c0, Alice sends the qubit back to Bob directly instead of encoding. After Bob receives the qubit ( Maybe Bob should tell Alice about his receipt through public channel in every message mode. If Alice publishes her operation without Bob’s receipt, Eve would forward the qubit directly. ), she tells Bob about her operation. If Bob find his measurement result in |ψ− >, there is an Eve in this line. In this case, Bob has a probability p = 0.5 to find out Bob’s attack. In fact, this modification can be completely dropped and replaced by any method of message authentification to protects the protocol against man-in-the-middle attacks with a reliable public channel [2]. The basis of secure communication is that message can be transmitted successfully. And the security must be ensured. If the ‘ping-pong’ quantum communication protocol is not modified, the message transmission cannot be accomplished under Eve’s DoS attack. We can see, such problem does not exist in BB84 protocol [3], security of which is based on the no-cloning theorem and that non-orthogonal quantum states cannot be reliably distinguished [4]. Attack without eavesdropping, therefore, aims at the property of the ‘ping-pong’ protocol. I thank Yuan-chuan Zou for useful discussions. This work is funded by the National Science Foundation of China (Grant No. 10004013).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eavesdropping on the "ping-pong" quantum communication protocol.

Security of the "ping-pong" quantum communication protocol recently proposed by Boström and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can b...

متن کامل

Increasing the security of the ping-pong protocol by using mutually unbiased bases

In this paper we propose an extended version of the ping–pong protocol and study its security. The proposed protocol incorporates the usage of mutually unbiased bases in the control mode. We show that, by increasing the number of bases, it is possible to improve the security of this protocol. We also provide the upper bounds on eavesdropping average non-detection probability and propose a contr...

متن کامل

Eavesdropping on the Boström-Felbinger Communication Protocol in Noisy Quantum Channel

We show an eavesdropping scheme on Boström-Felbinger communication protocol ( called pingpong protocol ) [Phys. Rev. Lett. 89, 187902 (2002)] in an ideal quantum channel. A measurement attack can be perfectly used to eavesdrop Alice’s information instead of a most general quantum operation attack. In a noisy quantum channel, the direct communication is forbidden. We present a quantum key distri...

متن کامل

Eavesdropping on the “ping-pong” type quantum communication protocols with invisible photon

The crucial issue of quantum communication protocol is its security. A quantum communication scheme must be based on the existing or nearly existing technology, but its security must be guaranteed against an eavesdropper whose technology is limited only by the laws of quantum mechanics. In this paper, we show that all the deterministic and direct two-way quantum communication protocols, sometim...

متن کامل

A general scheme for information interception in the ping pong protocol

The existence of an undetectable eavesdropping of dense coded information has been already demonstrated by Pavičić for the quantum direct communication based on the ping-pong paradigm. However, a) the explicit scheme of the circuit is only given and no design rules are provided, b) the existence of losses is implicitly assumed, c) the attack has been formulated against qubit based protocol only...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004