Improving Wójcik's eavesdropping attack on the ping–pong protocol
Section snippets
Acknowledgments
Zhang thanks to Prof. Baiwen Li for his encouragement. We would like to thank the referee very much for his/her valuable opinions on this Letter. This work is funded by the National Science Foundation of China under No. 10304022.
References (25)
- et al.
Phys. Lett. A
(1998) - et al.
- et al.
Rev. Mod. Phys.
(2002) Phys. Rev. Lett.
(1991)Phys. Rev. Lett.
(1992)- et al.
Phys. Rev. Lett.
(1992) - et al.
Phys. Rev. Lett.
(1995) - et al.
Phys. Rev. A
(1995) - et al.
Phys. Rev. Lett.
(1997) - et al.
Phys. Rev. A
(2002)
J. Mod. Opt.
(1995)
Phys. Rev. A
(1999)
Cited by (121)
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
2023, Internet of Things and Cyber-Physical SystemsGame-theoretic perspective of Ping-Pong protocol
2018, Physica A: Statistical Mechanics and its ApplicationsSecure data-sharing using distributed environmental matching keys
2017, Pervasive and Mobile ComputingCitation Excerpt :Besides, important parameters are hidden in the trusted device to avoid them from being cracked. Based on our security analyses, the proposed system is able to resist machine-specific data leakage [10], replay attack [11], eavesdropping attack [12], impersonation attack [13], forgery attack, and known-key attack. The contributions of this paper are as follows.
An efficient modification to the Ping-Pong Protocol to enhance the Security
2023, AIP Conference ProceedingsSecurity of a High Dimensional Two-Way Quantum Key Distribution Protocol
2022, Advanced Quantum Technologies
Copyright © 2004 Elsevier B.V. All rights reserved.