Multi-party quantum key agreement protocol with authentication
- URL: http://arxiv.org/abs/2103.12252v1
- Date: Tue, 23 Mar 2021 01:12:55 GMT
- Title: Multi-party quantum key agreement protocol with authentication
- Authors: Yiting Wu, Hong Chang, Gongde Guo, and Song Lin
- Abstract summary: A multi-party quantum key agreement protocol with authentication is proposed.
Classical hash function and Hadamard operation are utilized to authenticate the identity of participants.
The security of this protocol against common attacks is analyzed.
- Score: 16.298896422265297
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Utilizing the advantage of quantum entanglement swapping, a multi-party
quantum key agreement protocol with authentication is proposed. In this
protocol, a semi-trusted third party is introduced, who prepares Bell states,
and sends one particle to multiple participants respectively. After that the
participants can share a Greenberger-Horne-Zeilinger state by entanglement
swapping. Finally, these participants measure the particles in their hands and
obtain an agreement key. Here, classical hash function and Hadamard operation
are utilized to authenticate the identity of participants. The correlations of
GHZ states ensure the security of the proposed protocol. To illustrated it
detailly, the security of this protocol against common attacks is analyzed,
which shows that the proposed protocol is secure in theory.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Quantum-private distributed sensing [37.69303106863453]
Quantum networks will provide unconditional security for communication, computation and distributed sensing tasks.
We report on an experimental demonstration of private parameter estimation, which allows a global phase to be evaluated without revealing the constituent local phase values.
This is achieved by sharing a Greenberger-Horne-Zeilinger (GHZ) state among three users who first verify the shared state before performing the sensing task.
arXiv Detail & Related papers (2024-10-01T18:00:08Z) - Simultaneous quantum identity authentication scheme utilizing entanglement swapping with secret key preservation [0.0]
We introduce a new protocol for quantum identity authentication (QIA)
Our proposed scheme facilitates simultaneous authentication between two users, Alice and Bob, leveraging Bell states with the assistance of a third party, Charlie.
We demonstrate that the proposed protocol withstands various known attacks, including impersonation, intercept and resend and impersonated fraudulent attacks.
arXiv Detail & Related papers (2024-05-23T18:40:15Z) - Dynamic Quantum Group Key Agreement via Tree Key Graphs [36.47236890715043]
We propose two dynamic Quantum Group Key Agreement protocols for a join or leave request in group communications.
The number of qubits required per join or leave only increases logarithmically with the group size.
arXiv Detail & Related papers (2023-12-07T07:45:59Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Collective attack free controlled quantum key agreement without quantum
memory [0.0]
We present a new protocol for controlled quantum key agreement and another protocol for key agreement with a specific focus on the security analysis.
Specifically, detailed security proof is provided against impersonated fraudulent attack and collective attacks.
arXiv Detail & Related papers (2023-08-10T09:51:23Z) - Semi-quantum private comparison and its generalization to the key
agreement, summation, and anonymous ranking [12.16288190962638]
Semi-quantum protocols construct connections between quantum users and classical'' users who can only perform certain classical'' operations.
We present a new semi-quantum private comparison protocol based on entangled states and single particles.
arXiv Detail & Related papers (2022-10-07T09:40:36Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Scalable Mediated Semi-quantum Key Distribution [5.548873288570182]
Mediated semi-quantum key distribution (M-SQKD) permits two limited "semi-quantum" or "classical" users to establish a secret key with the help of a third party (TP)
Several protocols have been studied recently for two-party scenarios, but no one has considered M-SQKD for multi-party scenarios.
arXiv Detail & Related papers (2022-05-13T09:21:12Z) - Quantum Secure Multi-party Summation Based on entanglement swapping [16.298896422265297]
We present a quantum secure multi-party summation protocol, which allows multiple mutually distrustful parties to compute the summation of their secret data.
In the presented protocol, a semitrusted third party is introduced to help multiple parties to achieve this secure task.
At last, its security against some common attacks is analyzed, which shows that the presented protocol is secure in theory.
arXiv Detail & Related papers (2021-03-23T02:41:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.