Trojan Horse Attack Strategy on Quantum Private Communication
Fragility of quantum private communication based on Einstein-Podosky-Rosen (EPR) pair as pre-shared key against trojan horse attack strategy is investigated in detail. To prevent this kind of attack strategy, the EPR pairs employed in the quantum private communication is transferred into non-orthogonal entangled states by employing unitary transformations which are actually rotation operations on the quantum signal. Analysis show that the improved scheme is robust against the trojan horse attack strategy without reducing the security against other kinds of attack strategies.
KeywordsQuantum Channel Feedback Information Quantum Cryptography Trojan Horse Legitimate User
Unable to display preview. Download preview PDF.
- 1.Schneier, B.: Applied Cryptography:protocols, algorithms, and source code in C. John Wiley & Sons, Inc., Chichester (1994)Google Scholar
- 3.Bennett, C.H., Brassard, G.: Advances in Cryptology: Proceedings of Crypto 1984, August 1984, p. 475. Springer, Heidelberg (1984)Google Scholar
- 9.Larsson, J. (November 13, 2001), http://xxx.lanl.gov/quant-ph/0111073
- 10.Zhang, Y., Li, C., Guo, G.: Phys. Rev. A 64, 24302 (2001)Google Scholar