Skip to main content
Log in

Increasing the security of the ping–pong protocol by using many mutually unbiased bases

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

In this paper we propose an extended version of the ping–pong protocol and study its security. The proposed protocol incorporates the usage of mutually unbiased bases in the control mode. We show that, by increasing the number of bases, it is possible to improve the security of this protocol. We also provide the upper bounds on eavesdropping average non-detection probability and propose a control mode modification that increases the attack detection probability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Beige A., Englert B.G., Kurtsiefer C., Weinfurter H.: Secure communication with a publicly known key. Act. Phys. Pol. A 101(3), 357–368 (2002)

    Google Scholar 

  2. Boström K., Felbinger T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187,902 (2002). doi:10.1103/PhysRevLett.89.187902

    Article  Google Scholar 

  3. Brierley S., Weigert S., Bengtsson I.: All mutually unbiased bases in dimensions two to five. Quant. Inf. Comput. 10, 0803–0820 (2010)

    MathSciNet  Google Scholar 

  4. Cai Q.Y., Li B.W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21(4), 601–603 (2004). doi:10.1088/0256-307X/21/4/003

    Article  ADS  Google Scholar 

  5. Cai Q.Y., Li B.W.: Improving the capacity of the Boström-Felbinger protocol. Phys. Rev. Lett. 69(5), 054,301 (2004). doi:10.1103/PhysRevA.69.054301

    Google Scholar 

  6. Deng F.G., Li X.H., Li C.Y., Zhou P., Zhou H.Y.: Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs. Phys. Lett. A 359(5), 359–365 (2006). doi:10.1016/j.physleta.2006.06.054

    Article  MathSciNet  ADS  MATH  Google Scholar 

  7. Durt T.: About mutually unbiased bases in even and odd prime power dimensions. J. Phys. A Math. Gen. 38, 5267 (2005)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  8. Durt T., Englert B.G., Bengtsson I., Życzkowski K.: On mutually unbiased bases. Int. J. Quantum Inf. 8(4), 535–640 (2010)

    Article  MATH  Google Scholar 

  9. Durt T., Kaszlikowski D., Chen J.L., Kwek L.C.: Security of quantum key distributions with entangled qudits. Phys. Rev. A. 69(3), 032313 (2004). doi:10.1103/PhysRevA.69.032313

    Article  ADS  Google Scholar 

  10. Eusebi A., Mancini S.: Deterministic quantum distribution of a d-ary key. Quantum Inform. Comput. 9(11 & 12), 950–962 (2009)

    MathSciNet  MATH  Google Scholar 

  11. Horn R.A., Johnson C.R.: Topics in Matrix Analysis. Cambridge University Press, Cambridge (1991)

    Book  MATH  Google Scholar 

  12. Korchenko O., Vasiliu Y., Gnatyuk S.: Modern quantum technologies of information security against cyberterrorist attacks. Aviation 14(2), 58–69 (2010). doi:10.3846/aviation.2010.10

    Article  Google Scholar 

  13. Liu X.S., Long G.L., Tong D.M., Li F.: General scheme for superdense coding between multiparties. Phys. Rev. A 65(2), 022,304 (2002). doi:10.1103/PhysRevA.65.022304

    Google Scholar 

  14. Lucamarini M., Mancini S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140,501 (2005). doi:10.1103/PhysRevLett.94.140501

    Article  Google Scholar 

  15. McNulty, D., Weigert, S.: All mutually unbiased product bases in dimension six (2011). http://arxiv.org/abs/1111.3632v1

  16. Schur J.: Bemerkungen zur theorie der beschränkten bilinearformen mit unendlich vielen veränderlichen. J. Reine Angew. Math. 1911(140), 1–28 (1911). doi:10.1515/crll.1911.140.1

    Article  Google Scholar 

  17. Shi G.F., Xi X.Q., Hu M.L., Yue R.H.: Quantum secure dialogue by using single photons. Opt. Commun. 283(9), 1984–1986 (2010). doi:10.1016/j.optcom.2010.01.007

    Article  ADS  Google Scholar 

  18. Shimizu K., Tamaki K., Fukasaka H.: Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair. Phys. Rev. A 80(2), 022,323 (2009). doi:10.1103/PhysRevA.80.022323

    Article  MathSciNet  Google Scholar 

  19. Vasiliu, E., Nikolaenko, S.: Synthesis if the secure system of direct message transfer based on the ping–pong protocol of quantum communication. Scientific works of the Odessa national academy of telecommunications named after O.S. Popov (1), 83–91 (2009) (in Russian)

  20. Vasiliu E.V.: Non-coherent attack on the ping–pong protocol with completely entangled pairs of qutrits. Quantum Inf. Process. 10, 189–202 (2011). doi:10.1007/s11128-010-0188-8

    Article  MathSciNet  MATH  Google Scholar 

  21. Wang C., Deng F.G., Li Y.S., Liu X.S., Long G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71, 044,305 (2005). doi:10.1103/PhysRevA.71.044305

    Google Scholar 

  22. Wang J., Zhang Q., Tang C.J.: Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358(4), 256–258 (2006). doi:10.1016/j.physleta.2006.05.035

    Article  ADS  MATH  Google Scholar 

  23. Zawadzki, P.: Security of ping–pong protocol based on pairs of completely entangled qudits. Quantum Inf. Process. (2011). doi:10.1007/s11128-011-0307-1. http://dx.doi.org/10.1007/s11128-011-0307-1 (published online)

  24. Zawadzki, P.: Improving security of the ping–pong protocol. Quantum Inf. Process. (2012). doi:10.1007/s11128-012-0363-1. http://dx.doi.org/10.1007/s11128-012-0363-1 (published online)

  25. Zhan Y.B., Zhang L.L., Zhang Q.Y.: Quantum secure direct communication by entangled qutrits and entanglement swapping. Opt. Commun. 282(23), 4633–4636 (2009). doi:10.1016/j.optcom.2009.08.024

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jarosław Adam Miszczak.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zawadzki, P., Puchała, Z. & Miszczak, J.A. Increasing the security of the ping–pong protocol by using many mutually unbiased bases. Quantum Inf Process 12, 569–576 (2013). https://doi.org/10.1007/s11128-012-0403-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-012-0403-x

Keywords

Navigation