Loading…
Cryptanalysis and improvement in controlled quantum dialogue using cluster states
The controlled quantum dialogue protocol which was put forward recently (Kao and Hwang in Quantum Inf Process 16(5):139, 2017 ) is analyzed. It shows that a dishonest controller can successfully eavesdrop on the secret messages that the two users send by the different initial state attack or he (she...
Saved in:
Published in: | Quantum information processing 2019-04, Vol.18 (4), p.1-11, Article 98 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c316t-745f73fa1b9e62e7d1ddb5493afa15b3c63f1f964cb97060bcae9c9235ff92aa3 |
---|---|
cites | cdi_FETCH-LOGICAL-c316t-745f73fa1b9e62e7d1ddb5493afa15b3c63f1f964cb97060bcae9c9235ff92aa3 |
container_end_page | 11 |
container_issue | 4 |
container_start_page | 1 |
container_title | Quantum information processing |
container_volume | 18 |
creator | Liu, Zhihao Chen, Hanwu |
description | The controlled quantum dialogue protocol which was put forward recently (Kao and Hwang in Quantum Inf Process 16(5):139,
2017
) is analyzed. It shows that a dishonest controller can successfully eavesdrop on the secret messages that the two users send by the different initial state attack or he (she) can disturb communication without being detected by the denial-of-service attack. To improve these security loopholes, a new method to check eavesdropping is given. The correctness and efficiency of this method is proven. |
doi_str_mv | 10.1007/s11128-019-2214-9 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2183729605</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2183729605</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-745f73fa1b9e62e7d1ddb5493afa15b3c63f1f964cb97060bcae9c9235ff92aa3</originalsourceid><addsrcrecordid>eNp1kE9LxDAQxYMouK5-AG8Bz9FM0iSboyz-gwUR9BzSNFm6tOlukgr77a1W8ORphuG9x7wfQtdAb4FSdZcBgK0IBU0Yg4roE7QAoTgBztnpz04JVUKco4ucd5QykCu5QG_rdNwXG213zG3GNja47fdp-PS9jwW3EbshljR0nW_wYbSxjD1uWtsN29HjMbdxi1035uITzsUWny_RWbBd9le_c4k-Hh_e189k8_r0sr7fEMdBFqIqERQPFmrtJfOqgaapRaW5nW6i5k7yAEHLytVaUUlrZ712mnERgmbW8iW6mXOnbw-jz8XshjFNRbJhsOKKaUnFpIJZ5dKQc_LB7FPb23Q0QM03OTOTMxM5803O6MnDZk-etHHr01_y_6YvUexysA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2183729605</pqid></control><display><type>article</type><title>Cryptanalysis and improvement in controlled quantum dialogue using cluster states</title><source>Springer Nature</source><creator>Liu, Zhihao ; Chen, Hanwu</creator><creatorcontrib>Liu, Zhihao ; Chen, Hanwu</creatorcontrib><description>The controlled quantum dialogue protocol which was put forward recently (Kao and Hwang in Quantum Inf Process 16(5):139,
2017
) is analyzed. It shows that a dishonest controller can successfully eavesdrop on the secret messages that the two users send by the different initial state attack or he (she) can disturb communication without being detected by the denial-of-service attack. To improve these security loopholes, a new method to check eavesdropping is given. The correctness and efficiency of this method is proven.</description><identifier>ISSN: 1570-0755</identifier><identifier>EISSN: 1573-1332</identifier><identifier>DOI: 10.1007/s11128-019-2214-9</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Cryptography ; Data Structures and Information Theory ; Eavesdropping ; Mathematical Physics ; Physics ; Physics and Astronomy ; Quantum Computing ; Quantum Information Technology ; Quantum Physics ; Spintronics</subject><ispartof>Quantum information processing, 2019-04, Vol.18 (4), p.1-11, Article 98</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2019</rights><rights>Copyright Springer Nature B.V. 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-745f73fa1b9e62e7d1ddb5493afa15b3c63f1f964cb97060bcae9c9235ff92aa3</citedby><cites>FETCH-LOGICAL-c316t-745f73fa1b9e62e7d1ddb5493afa15b3c63f1f964cb97060bcae9c9235ff92aa3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Liu, Zhihao</creatorcontrib><creatorcontrib>Chen, Hanwu</creatorcontrib><title>Cryptanalysis and improvement in controlled quantum dialogue using cluster states</title><title>Quantum information processing</title><addtitle>Quantum Inf Process</addtitle><description>The controlled quantum dialogue protocol which was put forward recently (Kao and Hwang in Quantum Inf Process 16(5):139,
2017
) is analyzed. It shows that a dishonest controller can successfully eavesdrop on the secret messages that the two users send by the different initial state attack or he (she) can disturb communication without being detected by the denial-of-service attack. To improve these security loopholes, a new method to check eavesdropping is given. The correctness and efficiency of this method is proven.</description><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Eavesdropping</subject><subject>Mathematical Physics</subject><subject>Physics</subject><subject>Physics and Astronomy</subject><subject>Quantum Computing</subject><subject>Quantum Information Technology</subject><subject>Quantum Physics</subject><subject>Spintronics</subject><issn>1570-0755</issn><issn>1573-1332</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNp1kE9LxDAQxYMouK5-AG8Bz9FM0iSboyz-gwUR9BzSNFm6tOlukgr77a1W8ORphuG9x7wfQtdAb4FSdZcBgK0IBU0Yg4roE7QAoTgBztnpz04JVUKco4ucd5QykCu5QG_rdNwXG213zG3GNja47fdp-PS9jwW3EbshljR0nW_wYbSxjD1uWtsN29HjMbdxi1035uITzsUWny_RWbBd9le_c4k-Hh_e189k8_r0sr7fEMdBFqIqERQPFmrtJfOqgaapRaW5nW6i5k7yAEHLytVaUUlrZ712mnERgmbW8iW6mXOnbw-jz8XshjFNRbJhsOKKaUnFpIJZ5dKQc_LB7FPb23Q0QM03OTOTMxM5803O6MnDZk-etHHr01_y_6YvUexysA</recordid><startdate>20190401</startdate><enddate>20190401</enddate><creator>Liu, Zhihao</creator><creator>Chen, Hanwu</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20190401</creationdate><title>Cryptanalysis and improvement in controlled quantum dialogue using cluster states</title><author>Liu, Zhihao ; Chen, Hanwu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-745f73fa1b9e62e7d1ddb5493afa15b3c63f1f964cb97060bcae9c9235ff92aa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Eavesdropping</topic><topic>Mathematical Physics</topic><topic>Physics</topic><topic>Physics and Astronomy</topic><topic>Quantum Computing</topic><topic>Quantum Information Technology</topic><topic>Quantum Physics</topic><topic>Spintronics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Zhihao</creatorcontrib><creatorcontrib>Chen, Hanwu</creatorcontrib><collection>CrossRef</collection><jtitle>Quantum information processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Zhihao</au><au>Chen, Hanwu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cryptanalysis and improvement in controlled quantum dialogue using cluster states</atitle><jtitle>Quantum information processing</jtitle><stitle>Quantum Inf Process</stitle><date>2019-04-01</date><risdate>2019</risdate><volume>18</volume><issue>4</issue><spage>1</spage><epage>11</epage><pages>1-11</pages><artnum>98</artnum><issn>1570-0755</issn><eissn>1573-1332</eissn><abstract>The controlled quantum dialogue protocol which was put forward recently (Kao and Hwang in Quantum Inf Process 16(5):139,
2017
) is analyzed. It shows that a dishonest controller can successfully eavesdrop on the secret messages that the two users send by the different initial state attack or he (she) can disturb communication without being detected by the denial-of-service attack. To improve these security loopholes, a new method to check eavesdropping is given. The correctness and efficiency of this method is proven.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11128-019-2214-9</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1570-0755 |
ispartof | Quantum information processing, 2019-04, Vol.18 (4), p.1-11, Article 98 |
issn | 1570-0755 1573-1332 |
language | eng |
recordid | cdi_proquest_journals_2183729605 |
source | Springer Nature |
subjects | Cryptography Data Structures and Information Theory Eavesdropping Mathematical Physics Physics Physics and Astronomy Quantum Computing Quantum Information Technology Quantum Physics Spintronics |
title | Cryptanalysis and improvement in controlled quantum dialogue using cluster states |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T12%3A08%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cryptanalysis%20and%20improvement%20in%20controlled%20quantum%20dialogue%20using%20cluster%20states&rft.jtitle=Quantum%20information%20processing&rft.au=Liu,%20Zhihao&rft.date=2019-04-01&rft.volume=18&rft.issue=4&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.artnum=98&rft.issn=1570-0755&rft.eissn=1573-1332&rft_id=info:doi/10.1007/s11128-019-2214-9&rft_dat=%3Cproquest_cross%3E2183729605%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c316t-745f73fa1b9e62e7d1ddb5493afa15b3c63f1f964cb97060bcae9c9235ff92aa3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2183729605&rft_id=info:pmid/&rfr_iscdi=true |