The "ping-pong" protocol can be attacked without eavesdropping

被引:252
作者
Cai, QY [1 ]
机构
[1] Chinese Acad Sci, Wuhan Inst Phys & Math, Wuhan 430071, Peoples R China
关键词
D O I
10.1103/PhysRevLett.91.109801
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
引用
收藏
页数:1
相关论文
共 4 条
[1]  
[Anonymous], 2009, Quantum computation and quantum information, DOI DOI 10.1119/1.1463744
[2]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[4]  
Schneier Bruce, 1996, APPL CRYPTOGRAPHY