Scalable Mediated Semi-quantum Key Distribution
- URL: http://arxiv.org/abs/2205.06528v3
- Date: Sun, 4 Sep 2022 09:30:36 GMT
- Title: Scalable Mediated Semi-quantum Key Distribution
- Authors: Chong-Qiang Ye, Jian Li, Xiu-Bo Chen, Yan-Yan Hou
- Abstract summary: Mediated semi-quantum key distribution (M-SQKD) permits two limited "semi-quantum" or "classical" users to establish a secret key with the help of a third party (TP)
Several protocols have been studied recently for two-party scenarios, but no one has considered M-SQKD for multi-party scenarios.
- Score: 5.548873288570182
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Mediated semi-quantum key distribution (M-SQKD) permits two limited
"semi-quantum" or "classical" users to establish a secret key with the help of
a third party (TP), in which TP has fully quantum power and may be untrusted.
Several protocols have been studied recently for two-party scenarios, but no
one has considered M-SQKD for multi-party scenarios. In this paper, we design a
circular M-SQKD protocol based on Bell states, which offers an approach to
realizing multiple "classical" users' key distribution. Then, we prove the
protocol is unconditional security in the asymptotic scenario. The protocol's
key rate and noise tolerance can be derived by utilizing the parameters
observed in the channel. The results show that our protocol may hold similar
security to a fully quantum one. We also compare the proposed protocol with
similar protocols in terms of noise tolerance, qubit efficiency, communication
cost, and scalability. Finally, the security proof method of this paper may
contribute to studying the security of other circular semi-quantum cryptography
protocols.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.
We derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Efficient Device-Independent Quantum Key Distribution [4.817429789586127]
Device-independent quantum key distribution (DIQKD) is a key distribution scheme whose security is based on the laws of quantum physics.
We propose an efficient device-independent quantum key distribution protocol in which one participant prepares states and transmits them to another participant.
arXiv Detail & Related papers (2023-11-16T13:01:34Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Improved Semi-Quantum Key Distribution with Two Almost-Classical Users [1.827510863075184]
We revisit a mediated semi-quantum key distribution protocol introduced by Massa et al.
We show how this protocol may be extended to improve its efficiency and also its noise tolerance.
We evaluate the protocol's performance in a variety of lossy and noisy channels.
arXiv Detail & Related papers (2022-03-20T14:41:14Z) - Mediated Semi-Quantum Key Distribution with Improved Efficiency [1.827510863075184]
We introduce a new mediated semi-quantum key distribution protocol.
Our protocol is backwards compatible with prior work.
To prove security, we show an interesting reduction from the mediated semi-quantum scenario to a fully-quantum entanglement based protocol.
arXiv Detail & Related papers (2021-11-02T14:39:28Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Qutrit-based semi-quantum key distribution protocol [0.0]
This article provides the unconditional security of a semi quantum key distribution protocol based on 3-dimensional states.
We find that this protocol has improved secret key rate with much more tolerance for noise compared to the previous 2-dimensional SQKD protocol.
arXiv Detail & Related papers (2021-01-07T15:16:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.