Controlling the key by choosing the detection bits in quantum cryptographic protocols

被引:0
作者
LIU Bin [1 ,2 ]
GAO Fei [1 ]
HUANG Wei [1 ]
LI Dan [1 ]
WEN QiaoYan [1 ]
机构
[1] State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications
[2] College of Computer Science, Chongqing University
关键词
eavesdropping detection; deterministic quantum key distribution; quantum key agreement; quantum information; quantum cryptography;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Eavesdropping detection is an indispensable process of most quantum cryptographic protocols. By publishing and comparing part of the shared bits, called as detection bits, the participants can check whether there exists an eavesdropper. Generally, the detection bits are chosen randomly. Consequently, the secret bits, i.e., the rest bits, are also random. Then, what if the detection bits are chosen non-randomly? Can the participant who chooses the detection bits make the secret bits to be a predetermined string he expected?This paper focuses on the participants' key control capability when they choose the detection bits selectively in two-party quantum communication protocols. Concretely, we analyze the participants' key control capability in different situations of different proportions of the detection bits. And we prove that the participants can predetermine, with high probability, any part of the secret bits of which the length is smaller than that of the detection bits. The above result has various potential applications in quantum cryptographic protocols.Obviously, utilizing this non-random selection of the detection bits, one can realize the function of a deterministic quantum key distribution protocol through a random one if the number of the detection bits is not smaller than that of the secret bits. What is more, we find that quite a few quantum key agreement protocols cannot guarantee the fairness of the key in the sense that the participant who chooses the detection bits can control the key somewhat.
引用
收藏
页码:200 / 210
页数:11
相关论文
共 23 条
[1]  
Information leakage resistant quantum dialogue against collective noise[J]. YE TianYu.Science China(Physics,Mechanics & Astronomy). 2014(12)
[2]  
Quantum computation with surface-state electrons by rapid population passages[J]. SHI Xuan,WEI LianFu,OH Choo Hiap.Science China(Physics,Mechanics & Astronomy). 2014(09)
[3]  
Three-step semiquantum secure direct communication protocol[J]. ZOU XiangFu,QIU DaoWen.Science China(Physics,Mechanics & Astronomy). 2014(09)
[4]  
Delayed error verification in quantum key distribution[J]. Chun-Mei Zhang,Xiao-Tian Song,Patcharapong Treeviriyanupab,Mo Li,Chao Wang,Hong-Wei Li,Zhen-Qiang Yin,Wei Chen,Zheng-Fu Han.Chinese Science Bulletin. 2014(23)
[5]  
Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad[J]. Yan Chang,Chunxiang Xu,Shibin Zhang,Lili Yan.Chinese Science Bulletin. 2014(21)
[6]  
Quantum secure direct dialogue using Einstein-Podolsky-Rosen pairs[J]. ZHENG Chao,LONG GuoFei.Science China(Physics,Mechanics & Astronomy). 2014(07)
[7]  
Minimum best success probability by classical strategies for quantum pseudo-telepathy[J]. GAO Fei,FANG Wei,WEN QiaoYan.Science China(Physics,Mechanics & Astronomy). 2014(07)
[8]  
CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys”[J]. LIN Ching-Ying,HWANG Tzonelih.Science China(Physics,Mechanics & Astronomy). 2014(05)
[9]   Applying Gaussian quantum discord to quantum key distribution [J].
Su, Xiaolong .
CHINESE SCIENCE BULLETIN, 2014, 59 (11) :1083-1090
[10]  
Quantum secure direct communication and authentication protocol with single photons[J]. CHANG Yan,XU ChunXiang,ZHANG ShiBin,YAN LiLi.Chinese Science Bulletin. 2013(36)