Acta Photonica Sinica, Volume. 41, Issue 10, 1256(2012)

Damage Model of Quantum Signaling of Multi-user Based on Malicious Attack and Repair Strategy

LI Chao* and NIE Min
Author Affiliations
  • [in Chinese]
  • show less
    References(12)

    [1] [1] ZHAO Yi, QI Bing, MA Xiong-feng, et al. Experimental quantum key distribution with decoy states[J]. Physical Review Letters, 2006, 96(7):070502-1-070502-4.

    [2] [2] QUAN Dong-xiao, PEI Chang-xing, ZHU Chang-hua, et al. New method of decoy state quantum key distribution with a heralded single-photon source[J]. Acta Physica Sinica, 2008, 57(9): 5600-5604.

    [4] [4] LIU Dan, PEI Chang-xing, QUAN Dong-xiao, et al. A new quantum secure direct communication scheme with authentication[J]. Chinese Physics Letters, 2010, 27(5): 050306.

    [5] [5] CHEN Zhi-xin, TANG Zhi-lie, LIAO Chang-jun, et al. Practical security problem of six states Q KD protocol[J].Acta Photonica Sinica, 2006, 35(1): 126-129.

    [6] [6] QUAN Dong-xiao, PEI Chang-xing, LIU Dan, et al. Qne-way quantum secure direct communication based on single photons[C]. 2009 Forth Internal Conference on Communications and Networking in China, Xi′an, China, Aug. 26-28, 2009.(EI: 20095112557671).

    [7] [7] BOSTROEM K, FELBINGER T. Deterministic secure direct communication using entanglement[J]. Physical Review Letters, 2002, 89(18): 187902.

    [8] [8] DENG Fu-guo, LONG Gui-lu, LIU Xiao-shu. Two-step quantum direct communication protocol using t he Einstein-Podolsky-Rosen pair block[J]. Physical Review A, 2003, 68(4): 042317.

    [9] [9] DENG Fu-guo, LI Xi-han, LI Chun-yan, et al. Economical quantum secure direct communication network wit h single photons[J]. Chinese Physics, 2007, 16(12): 355323559.

    [10] [10] GISIN N, FASEL S, KRAUS B, et al. Trojan-horse attacks on quantum-key-distribution systems[J]. Physical Review A, 2006, 73(2): 022320.

    [11] [11] GISIN N, RIBORDY G, TITTEL W, et al. Quantum cryptography[J]. Review of Modern Physics, 2002, 74(1): 145

    [12] [12] DENG Fu-guo, LI Xi-han, ZHOU Hong-yu, et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack[J]. Physical Review A, 2005, 72(4): 044302.

    Tools

    Get Citation

    Copy Citation Text

    LI Chao, NIE Min. Damage Model of Quantum Signaling of Multi-user Based on Malicious Attack and Repair Strategy[J]. Acta Photonica Sinica, 2012, 41(10): 1256

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Received: May. 31, 2012

    Accepted: --

    Published Online: Nov. 7, 2012

    The Author Email: Chao LI (lc32514@163.com)

    DOI:10.3788/gzxb20124110.1256

    Topics