A verifiable quantum key agreement protocol based on six-qubit cluster
states
- URL: http://arxiv.org/abs/2006.12733v2
- Date: Tue, 13 Apr 2021 11:09:25 GMT
- Title: A verifiable quantum key agreement protocol based on six-qubit cluster
states
- Authors: Li-Juan Liu, Zhi-Hui Li
- Abstract summary: A verifiable distributor who preserves some subsequences of the six-qubit cluster states is introduced into this protocol.
The correctness and simultaneity of the shared key are guaranteed by the trusted design combiner and homomorphic hash function.
- Score: 14.148375496762261
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key agreement requires all participants to recover the shared key
together, so it is crucial to resist the participant attack. In this paper, we
propose a verifiable multi-party quantum key agreement protocol based on the
six-qubit cluster states. A verifiable distributor who preserves some
subsequences of the six-qubit cluster states is introduced into this protocol,
thus the participants can not obtain the shared key in advance. Besides, the
correctness and simultaneity of the shared key are guaranteed by the trusted
design combiner and homomorphic hash function. Furthermore, the security
analysis shows that the new protocol can resist the external and internal
attacks.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a novel quantum digital signature protocol without a trusted third-party.
We prove that the protocol has information-theoretical unforgeability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Efficient source-independent quantum conference key agreement [25.617190829449893]
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants.
We propose a source-independent QCKA scheme utilizing the post-matching method.
We introduce an equivalent distributing virtual multi-photon entanglement protocol for providing the unconditional security proof.
arXiv Detail & Related papers (2024-06-25T04:24:06Z) - Dynamic Quantum Group Key Agreement via Tree Key Graphs [36.47236890715043]
We propose two dynamic Quantum Group Key Agreement protocols for a join or leave request in group communications.
The number of qubits required per join or leave only increases logarithmically with the group size.
arXiv Detail & Related papers (2023-12-07T07:45:59Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Anonymous conference key agreement in linear quantum networks [0.29998889086656577]
Conference key agreement (CKA) is an extension of key distribution to multiple parties.
CKA can also be performed in a way that protects the identities of the participating parties, therefore providing anonymity.
We propose an anonymous CKA protocol for three parties that is implemented in a highly practical network setting.
arXiv Detail & Related papers (2022-05-18T18:38:52Z) - Multi-party quantum key agreement protocol with authentication [16.298896422265297]
A multi-party quantum key agreement protocol with authentication is proposed.
Classical hash function and Hadamard operation are utilized to authenticate the identity of participants.
The security of this protocol against common attacks is analyzed.
arXiv Detail & Related papers (2021-03-23T01:12:55Z) - Permutation attack and counterattack on the two-party quantum key
agreement over a collective noisy channel [0.20767168898581634]
This study shows that the participant who announces the permutation operation can manipulate the final shared key by himself/herself without being detected by the other.
To avoid this loophole, an improvement is proposed here.
arXiv Detail & Related papers (2020-09-15T05:27:39Z) - Anonymous Conference Key Agreement in Quantum Networks [0.0]
Quantum Conference Key Agreement (CKA) is a cryptographic effort of multiple parties to establish a shared secret key.
We provide the first protocol for Anonymous Quantum Conference Key Agreement.
arXiv Detail & Related papers (2020-07-15T21:17:41Z) - Secure multiparty quantum key agreement against collusive attacks [0.0]
Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs.
In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants.
In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone.
arXiv Detail & Related papers (2020-04-24T13:27:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.