An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol
Using Bell States
- URL: http://arxiv.org/abs/2309.12719v1
- Date: Fri, 22 Sep 2023 09:02:18 GMT
- Title: An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol
Using Bell States
- Authors: Wen-Jie Liu, Yong Xu, Ching-Nung Yang, Pei-Pei Gao and Wen-Bin Yu
- Abstract summary: Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al.
Zhu et al. pointed out that there are some security flaws and proposed an improved version.
This study shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.
- Score: 16.277401577186605
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Two quantum key agreement protocols using Bell states and Bell measurement
were recently proposed by Shukla et al.(Quantum Inf. Process. 13(11),
2391-2405, 2014). However, Zhu et al. pointed out that there are some security
flaws and proposed an improved version (Quantum Inf. Process. 14(11),
4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still
exists some security problems, and its efficiency is not high enough. For
solving these problems, we utilize four Pauli operations {I, Z, X, Y } to
encode two bits instead of the original two operations {I,X} to encode one bit,
and then propose an efficient and secure arbitrary N-party quantum key
agreement protocol. In the protocol, the channel checking with decoy single
photons is introduced to avoid the eavesdropper's flip attack, and a
post-measurement mechanism is used to prevent against the collusion attack. The
security analysis shows the present protocol can guarantee the correctness,
security, privacy and fairness of quantum key agreement.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Efficient source-independent quantum conference key agreement [25.617190829449893]
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants.
We propose a source-independent QCKA scheme utilizing the post-matching method.
We introduce an equivalent distributing virtual multi-photon entanglement protocol for providing the unconditional security proof.
arXiv Detail & Related papers (2024-06-25T04:24:06Z) - A Secure Quantum Key Distribution Protocol Using Two-Particle Transmission [0.0]
Unextendible Product Bases (UPBs) hold promise in quantum cryptography due to their inherent indistinguishability.
This work introduces a protocol utilizing UPBs to establish quantum keys between distant parties.
arXiv Detail & Related papers (2024-03-20T14:33:17Z) - Collective attack free controlled quantum key agreement without quantum
memory [0.0]
We present a new protocol for controlled quantum key agreement and another protocol for key agreement with a specific focus on the security analysis.
Specifically, detailed security proof is provided against impersonated fraudulent attack and collective attacks.
arXiv Detail & Related papers (2023-08-10T09:51:23Z) - Security of One-Way Entanglement Purification with Quantum Sampling
Against a Restricted Adversary [0.0]
Entanglement purification protocols promise to play a critical role in the future of quantum networks by distributing entanglement across noisy channels.
We propose a one-way entanglement purification protocol which utilizes quantum sampling and prove its security against an adversary restricted to single qubit Pauli gates.
arXiv Detail & Related papers (2023-06-18T02:29:21Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Multi-party quantum key agreement protocol with authentication [16.298896422265297]
A multi-party quantum key agreement protocol with authentication is proposed.
Classical hash function and Hadamard operation are utilized to authenticate the identity of participants.
The security of this protocol against common attacks is analyzed.
arXiv Detail & Related papers (2021-03-23T01:12:55Z) - Asymptotic security analysis of teleportation based quantum cryptography [0.0]
We prove that the teleportation based quantum cryptography protocol presented in [Opt. Commun 283, 184] is secure against all types of individual and collective attacks.
We then investigate modifications to that protocol leading to greater secret-key rates and to security against coherent attacks.
arXiv Detail & Related papers (2020-02-10T17:54:15Z) - Experimental quantum conference key agreement [55.41644538483948]
Quantum networks will provide multi-node entanglement over long distances to enable secure communication on a global scale.
Here we demonstrate quantum conference key agreement, a quantum communication protocol that exploits multi-partite entanglement.
We distribute four-photon Greenberger-Horne-Zeilinger (GHZ) states generated by high-brightness, telecom photon-pair sources across up to 50 km of fibre.
arXiv Detail & Related papers (2020-02-04T19:00:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.