Comment on “Deterministic six states protocol for quantum communication” [Phys. Lett. A 358 (2006) 85] |
| |
Authors: | Faisal A.A. El-Orany |
| |
Affiliation: | Cyberspace Security Laboratory, MIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur, Malaysia |
| |
Abstract: | In [J.S. Shaari, M. Lucamarini, M.R.B. Wahiddin, Phys. Lett. A 358 (2006) 85] the deterministic six states protocol (6DP) for quantum communication has been developed. This protocol is based on three mutually unbiased bases and four encoding operators. Information is transmitted between the users via two qubits from different bases. Three attacks have been studied; namely intercept-resend attack (IRA), double-CNOT attack (2CNOTA) and quantum man-in-the-middle attack. In this Letter, we show that the IRA and 2CNOTA are not properly addressed. For instance, we show that the probability of detecting Eve in the control mode of the IRA is 70% instead of 50% in the previous study. Moreover, in the 2CNOTA, Eve can only obtain 50% of the data not all of it as argued earlier. |
| |
Keywords: | Quantum protocol Deterministic protocol Six states protocol Eavesdropper Intercept-resend attack Double-CNOT attack |
本文献已被 ScienceDirect 等数据库收录! |
|