We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe...We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol.展开更多
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ...In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure.展开更多
A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the ...A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the corresponding compensation approach is introduced. Finally, the proposed algorithm is validated through computer simulation in TDD CDMA uplink transmission. The result shows that the ping-pong effects are almost avoided completely in the presence of the compensation scheme, and system performance is greatly improved.展开更多
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security att...Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model.展开更多
高速列车在越区切换过程中,由于路径损耗和地形等因素的影响,参考信号接收功率(reference signal receiving power,RSRP)会发生上下波动,采用基于A3事件的传统越区切换判决方法,会导致发生乒乓切换和切换成功率下降。文中提出基于改进灰...高速列车在越区切换过程中,由于路径损耗和地形等因素的影响,参考信号接收功率(reference signal receiving power,RSRP)会发生上下波动,采用基于A3事件的传统越区切换判决方法,会导致发生乒乓切换和切换成功率下降。文中提出基于改进灰色-马尔可夫模型的切换算法,改进灰色-马尔可夫模型对参考信号接收功率进行处理和预测,结合预承载方法,利用处理结果作为切换判决依据执行切换过程。仿真结果表明,采用改进切换算法,使列车接收到的源小区和目标小区RSRP值的波动情况得到明显改善,乒乓切换概率更低,切换成功率得以有效提高。展开更多
基金Project supported by the National Natural Science Foundation of China (Grant No 10604008) and the Beijing Education Committee (Grant No XK100270454).
文摘We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol.
基金supported by Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20060013007National Natural Science Foundation of Beijing under Grant No.4092029National Natural Science Foundation of China under Grant No.60873001
文摘In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure.
文摘A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the corresponding compensation approach is introduced. Finally, the proposed algorithm is validated through computer simulation in TDD CDMA uplink transmission. The result shows that the ping-pong effects are almost avoided completely in the presence of the compensation scheme, and system performance is greatly improved.
文摘Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model.
文摘高速列车在越区切换过程中,由于路径损耗和地形等因素的影响,参考信号接收功率(reference signal receiving power,RSRP)会发生上下波动,采用基于A3事件的传统越区切换判决方法,会导致发生乒乓切换和切换成功率下降。文中提出基于改进灰色-马尔可夫模型的切换算法,改进灰色-马尔可夫模型对参考信号接收功率进行处理和预测,结合预承载方法,利用处理结果作为切换判决依据执行切换过程。仿真结果表明,采用改进切换算法,使列车接收到的源小区和目标小区RSRP值的波动情况得到明显改善,乒乓切换概率更低,切换成功率得以有效提高。