Skip to main content
Log in

Analysis and Revision of Secure Quantum Dialogue via Cavity QED

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

It is found that there is the information leakage problem in the secure quantum dialogue (QD) protocol via cavity QED [Int J Theor Phys 54(3):772–779 (2015)]. To be specific, one out of the four bits about the secret messages is leaked out. Finally, an improved QD protocol without information leakage is put forward. It is sincerely hoped that researchers pay more attention to the information leakage problem in quantum secure communication to design truly secure protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting Parallel Computing. IEICE Trans. Commun. E98B(1), 190–200 (2015)

    Article  ADS  Google Scholar 

  2. Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Lee, S.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. E98D(4), 902–910 (2015)

    Article  ADS  Google Scholar 

  3. Fu, Z., Huang, F., Sun, X., Vasilakos, A., Yang, C.-N.: Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data, IEEE Transactions on Services Computing. doi:10.1109/TSC.2016.2622697 (2016)

  4. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)

    Article  Google Scholar 

  5. Fu, Z., Sun, X., Ji, S., Xie, G.: Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of The 35th Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2016). San Francisco, CA, pp. 1–9 (2016)

  6. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE T. Inf. Foren. Sec. 11(12), 2706–2716 (2016)

    Article  Google Scholar 

  7. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)

    Article  Google Scholar 

  8. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: Aprivacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE T. Inf. Foren. Sec. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  9. Gisin, N., Ribordy, G.G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145–195 (2002)

    Article  ADS  Google Scholar 

  10. Liu, Z. -H., Chen, H. -W., Wang, D., Li, W. -Q.: Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol. Quantum Inf. Process. 13(6), 1345–1351 (2014)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  11. Liu, Z.-H., Chen, H.-W.: Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad. Chin. Phys. B 25(8), 080308 (2016)

    Article  ADS  Google Scholar 

  12. Liu, Z., Chen, H., Liu, W.: Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Int. J. Theor. Phys. 55(10), 4564–4576 (2016)

    Article  MATH  Google Scholar 

  13. Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on ”Quantum key distribution without alternative measurements [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A 6303 (3), 036301 (2001)

    Article  ADS  MathSciNet  Google Scholar 

  14. Gao, F., Qin, S.-J., Wen, Q.-Y.: A simple participant attack on the Bradler-Dusek protocol. Quantum Inf. Comput. 7(4), 329–334 (2007)

    MathSciNet  MATH  Google Scholar 

  15. Gao, F., Wen, Q.-Y., Zhu, F.-C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189–3193 (2008)

    Article  ADS  Google Scholar 

  16. Qin, S.-J., Gao, F., Wen, Q.-Y., Zhu, F.-C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101–103 (2006)

    Article  ADS  MATH  Google Scholar 

  17. Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China: Phys. Mech. Astron. 53(3), 491–495 (2010)

    ADS  Google Scholar 

  18. Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Dense-coding attack on three-party quantum key distribution protocols. Ieee J. Quantum Electron. 47(5), 630–635 (2011)

    Article  ADS  Google Scholar 

  19. Cai, Q.Y.: The ”ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), 109801 (2003)

    Article  ADS  Google Scholar 

  20. Liu, Z.H., Chen, H.W.: Comment on cryptanalysis and improvement of a quantum network system of QSS-QDC using chi-type entangled states [Chin. Phys. Lett. 29 (2012) 110305]. Chin. Phys. Lett. 30(7), 079903 (2013)

    Article  ADS  Google Scholar 

  21. Liu, Z.H., Chen, H.W., Liu, W.J., Xu, J.: Comment on A quantum network system of QSS-QDC using chi-type entangled states [Chin. Phys. Lett. 29 (2012) 050303]. Chin. Phys. Lett. 30(3), 039901 (2013)

    Article  ADS  Google Scholar 

  22. Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: Quantum exam [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360(6), 748–750 (2007)

    Article  ADS  Google Scholar 

  23. Gao, F., Qin, S.-J., Wen, Q.-Y., Zhu, F.-C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283(1), 192–195 (2010)

    Article  ADS  Google Scholar 

  24. Qin, S.J., Gao, F., Guo, F.Z., Wen, Q.Y.: Comment on ”Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair. Phys. Rev. A 82 (3), 036301 (2010)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  25. Liu, Z.H., Chen, H.W., Liu, W.J., Xu, J., Li, Z.Q.: Analyzing and revising a two-way protocol for quantum cryptography with a nonmaximally entangled qubit pair. Int. J. Quantum. Inf. 9(5), 1329–1339 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  26. Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G-Phys. Mech. Astron. 51(5), 559–566 (2008)

    Article  ADS  Google Scholar 

  27. Tan, Y.G., Cai, Q.Y.: Classical correlation in quantum dialogue. Int. J. Quantum. Inf. 6(2), 325–329 (2008)

    Article  Google Scholar 

  28. Liu, Z.-H., Chen, H.-W., Liu, W.-J.: Informationleakage problem in high-capacity quantum secure communication with authentication using Einstein-Podolsky-Rosen pairs. Chin. Phys. Lett. 33(7), 070305 (2016)

    Article  Google Scholar 

  29. Liu, Z.-H., Chen, H.-W., Liu, W.-J.: Information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 55(11), 4681–4686 (2016)

    Article  MATH  Google Scholar 

  30. Ye, T.-Y.: Secure quantum dialogue via cavity QED. Int. J. Theor. Phys. 54(3), 772–779 (2015)

    Article  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant Nos. 61502101 and 61170321), Natural Science Foundation of Jiangsu Province, China (Grant Nos. BK20140651 and BK20140823), Natural Science Foundation of Henan Province, China (Grant No. 142300410126) and Funded by PAPD and CICAEET.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi-Hao Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, ZH., Chen, HW. Analysis and Revision of Secure Quantum Dialogue via Cavity QED. Int J Theor Phys 56, 2303–2309 (2017). https://doi.org/10.1007/s10773-017-3382-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-017-3382-y

Keywords

Navigation