Skip to main content
Log in

Modification Attack on QSDC with Authentication and the Improvement

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Recently, Yu et al. [Int. J. Theor. Phys., 2012, doi:10.1007/s10773-012-1336-y] proposed a quantum secure direct communication (QSDC) with authentication using two non-orthogonal states. This study points out a pitfall in Yu et al.’s scheme, in which an eavesdropper can deliberately modify the message without being detected. Furthermore, an enhanced scheme is proposed to avoid the modification attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lee, H., Lim, J., Yang, H.: Quantum direct communication with authentication. Phys. Rev. A 73(4) (2006)

  2. Zhang, Z.J., Liu, J., Wang, D., Shi, S.H.: Comment on “Quantum direct communication with authentication”. Phys. Rev. A 75(2) (2007)

  3. Liu, W.J., Chen, H.W., Li, Z.Q., Liu, Z.H.: Efficient quantum secure direct communication with authentication. Chinese Phys. Lett. 25(7), 2354–2357 (2008)

    Article  MathSciNet  ADS  Google Scholar 

  4. Qin, S.J., Wen, Q.Y., Meng, L.M., Zhu, F.C.: High efficiency of two efficient QSDC with authentication is at the cost of their security. Chin. Phys. Lett. 26(2) (2009)

  5. Yen, C.A., Horng, S.J., Goan, H.S., Kao, T.W., Chou, Y.H.: Quantum direct communication with mutual authentication. Quantum Inf Comput 9(5–6), 376–394 (2009)

    MathSciNet  MATH  Google Scholar 

  6. Liu, D., Pei, C.X., Quan, D.X., Zhao, N.: A new quantum secure direct communication scheme with authentication. Chin. Phys. Lett. 27(5) (2010)

  7. Yang, J., Wang, C.A., Zhang, R.: Quantum secure direct communication with authentication expansion using single photons. Commun. Theor. Phys 54(5), 829–834 (2010)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  8. Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with quantum identification. Int. J. Quant. Inf. 10(1) (2012)

  9. Tsai, C.W., Wei, T.S., Hwang, T.: One-way quantum authenticated secure communication using rotation operation. Commun. Theor. Phys 56(6), 1023–1026 (2011)

    Article  ADS  MATH  Google Scholar 

  10. Yu, C.-H., Guo, G.-D., Lin, S.: Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Throe. Phys. (2012). doi:10.1007/s10773-012-1336-y

    Google Scholar 

  11. Cai, Q.-Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), 109801(1) (2003)

    Article  ADS  Google Scholar 

  12. Yang, C.-W., Hwang, T.: Improved QSDC protocol over a collective-dephasing noise channel. Int. J. Throe. Phys. 51(12), 3941–3950 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  13. Damgard, I.B.: A design principle for hash functions. In: Advances in Cryptology (Crypto 89), vol. 435, pp. 416–427 (1990)

    Chapter  Google Scholar 

  14. Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack. Q. Phys. (2005). arXiv:quant-ph/0508168v1

  15. Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)

    Article  ADS  MATH  Google Scholar 

  16. Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)

    Article  ADS  Google Scholar 

  17. Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol. 72, art. No. 044302, 2005). Phys. Rev. A 73(4), 049901 (2006)

    Article  ADS  Google Scholar 

  18. Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)

    Article  ADS  Google Scholar 

  19. Yang, C.-W., Hwang, T., Luo, Y.-P.: Enhancement on “Quantum Blind Signature Based on Two-State Vector Formalism”. Q. Inf. Process. 12(1), 109–117 (2013)

    Article  MATH  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Science Council, Taiwan, R.O.C., under the Contract No. NSC 100-2221-E-006-152-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzonelih Hwang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, CW., Hwang, T. & Lin, TH. Modification Attack on QSDC with Authentication and the Improvement. Int J Theor Phys 52, 2230–2234 (2013). https://doi.org/10.1007/s10773-013-1498-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-013-1498-2

Keywords

Navigation