arXiv:0906.2518 [quant-ph]AbstractReferencesReviewsResources
On Ping-Pong protocol and its variant
Takayuki Miyadera, Masakazu Yoshida, Hideki Imai
Published 2009-06-14Version 1
We discuss the Ping-Pong protocol which was proposed by Bostroem and Felbinger. We derive a simple trade-off inequality between distinguishability of messages for Eve and detectability of Eve for legitimate users. Our inequality holds for arbitrary initial states. That is, even if Eve prepares an initial state, she cannot distinguish messages without being detected. We show that the same inequality holds also on another protocol in which Alice and Bob use one-way quantum communication channel twice.
Categories: quant-ph
Related articles: Most relevant | Search more
arXiv:2412.02887 [quant-ph] (Published 2024-12-03)
Quantum sensitivity of parametric oscillators
Alex Gu et al.
General individual attack on the ping-pong protocol with completely entangled pairs of qutrits
arXiv:0808.3880 [quant-ph] (Published 2008-08-28)
The security of Ping-Pong protocol