It Does Not Follow. Response to "Yes They Can! ..."
Abstract
This a response to "Yes They Can! ..." (a comment on [5]) by J.S. Shaari et al. [9]. We show that the claims in the comment do not hold up and that all the conclusions obtained in [5] are correct. In particular, the two considered kinds of two-way communication protocols (ping-pong and LM05) under a quantum-man-in-the-middle (QMM) attack have neither a critical disturbance (D), nor a valid privacy amplification (PA) procedure, nor an unconditional security proof. However, we point out that there is another two-way protocol which does have a critical D and a valid PA and which is resistant to a QMM attack.
- Publication:
-
arXiv e-prints
- Pub Date:
- November 2018
- DOI:
- arXiv:
- arXiv:1811.06138
- Bibcode:
- 2018arXiv181106138P
- Keywords:
-
- Quantum Physics;
- Computer Science - Information Theory
- E-Print:
- 3 pages