Abstract
It is found that there is the information leakage problem in the secure quantum dialogue (QD) protocol via cavity QED [Int J Theor Phys 54(3):772–779 (2015)]. To be specific, one out of the four bits about the secret messages is leaked out. Finally, an improved QD protocol without information leakage is put forward. It is sincerely hoped that researchers pay more attention to the information leakage problem in quantum secure communication to design truly secure protocols.
Similar content being viewed by others
References
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting Parallel Computing. IEICE Trans. Commun. E98B(1), 190–200 (2015)
Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Lee, S.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. E98D(4), 902–910 (2015)
Fu, Z., Huang, F., Sun, X., Vasilakos, A., Yang, C.-N.: Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data, IEEE Transactions on Services Computing. doi:10.1109/TSC.2016.2622697 (2016)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)
Fu, Z., Sun, X., Ji, S., Xie, G.: Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of The 35th Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2016). San Francisco, CA, pp. 1–9 (2016)
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE T. Inf. Foren. Sec. 11(12), 2706–2716 (2016)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: Aprivacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE T. Inf. Foren. Sec. 11(11), 2594–2608 (2016)
Gisin, N., Ribordy, G.G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145–195 (2002)
Liu, Z. -H., Chen, H. -W., Wang, D., Li, W. -Q.: Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol. Quantum Inf. Process. 13(6), 1345–1351 (2014)
Liu, Z.-H., Chen, H.-W.: Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad. Chin. Phys. B 25(8), 080308 (2016)
Liu, Z., Chen, H., Liu, W.: Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Int. J. Theor. Phys. 55(10), 4564–4576 (2016)
Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on ”Quantum key distribution without alternative measurements [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A 6303 (3), 036301 (2001)
Gao, F., Qin, S.-J., Wen, Q.-Y.: A simple participant attack on the Bradler-Dusek protocol. Quantum Inf. Comput. 7(4), 329–334 (2007)
Gao, F., Wen, Q.-Y., Zhu, F.-C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189–3193 (2008)
Qin, S.-J., Gao, F., Wen, Q.-Y., Zhu, F.-C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101–103 (2006)
Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China: Phys. Mech. Astron. 53(3), 491–495 (2010)
Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Dense-coding attack on three-party quantum key distribution protocols. Ieee J. Quantum Electron. 47(5), 630–635 (2011)
Cai, Q.Y.: The ”ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), 109801 (2003)
Liu, Z.H., Chen, H.W.: Comment on cryptanalysis and improvement of a quantum network system of QSS-QDC using chi-type entangled states [Chin. Phys. Lett. 29 (2012) 110305]. Chin. Phys. Lett. 30(7), 079903 (2013)
Liu, Z.H., Chen, H.W., Liu, W.J., Xu, J.: Comment on A quantum network system of QSS-QDC using chi-type entangled states [Chin. Phys. Lett. 29 (2012) 050303]. Chin. Phys. Lett. 30(3), 039901 (2013)
Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: Quantum exam [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360(6), 748–750 (2007)
Gao, F., Qin, S.-J., Wen, Q.-Y., Zhu, F.-C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283(1), 192–195 (2010)
Qin, S.J., Gao, F., Guo, F.Z., Wen, Q.Y.: Comment on ”Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair. Phys. Rev. A 82 (3), 036301 (2010)
Liu, Z.H., Chen, H.W., Liu, W.J., Xu, J., Li, Z.Q.: Analyzing and revising a two-way protocol for quantum cryptography with a nonmaximally entangled qubit pair. Int. J. Quantum. Inf. 9(5), 1329–1339 (2011)
Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G-Phys. Mech. Astron. 51(5), 559–566 (2008)
Tan, Y.G., Cai, Q.Y.: Classical correlation in quantum dialogue. Int. J. Quantum. Inf. 6(2), 325–329 (2008)
Liu, Z.-H., Chen, H.-W., Liu, W.-J.: Informationleakage problem in high-capacity quantum secure communication with authentication using Einstein-Podolsky-Rosen pairs. Chin. Phys. Lett. 33(7), 070305 (2016)
Liu, Z.-H., Chen, H.-W., Liu, W.-J.: Information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 55(11), 4681–4686 (2016)
Ye, T.-Y.: Secure quantum dialogue via cavity QED. Int. J. Theor. Phys. 54(3), 772–779 (2015)
Acknowledgments
This work was supported by National Natural Science Foundation of China (Grant Nos. 61502101 and 61170321), Natural Science Foundation of Jiangsu Province, China (Grant Nos. BK20140651 and BK20140823), Natural Science Foundation of Henan Province, China (Grant No. 142300410126) and Funded by PAPD and CICAEET.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, ZH., Chen, HW. Analysis and Revision of Secure Quantum Dialogue via Cavity QED. Int J Theor Phys 56, 2303–2309 (2017). https://doi.org/10.1007/s10773-017-3382-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-017-3382-y