Improved quantum key agreement protocol with authentication

被引:4
作者
Guo, Ji-Hong
Bai, Ming-Qiang [1 ]
Lei, Xiao-Yan
Xie, Jia-Xin
Mo, Zhi-Wen
机构
[1] Sichuan Normal Univ, Inst Intelligent Informat & Quantum Informat, Chengdu 610068, Peoples R China
基金
美国国家科学基金会;
关键词
quantum key agreement; authentication; six-particle entangled states; BELL STATES; ENTANGLEMENT;
D O I
10.1088/1674-1056/ac9b31
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process. Finally, security analysis shows that this scheme is resistant to some important attacks.
引用
收藏
页数:6
相关论文
共 45 条
[1]  
Bennett C H., 1984, Theor. Comput. Sci, V560, P175, DOI [10.1016/j.tcs.2014.05.025, DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2011.08.039, DOI 10.1016/J.TCS.2011.08.039]
[2]   Multiqubit systems: highly entangled states and entanglement distribution [J].
Borras, A. ;
Plastino, A. R. ;
Batle, J. ;
Zander, C. ;
Casas, M. ;
Plastino, A. .
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2007, 40 (44) :13407-13421
[3]   Maximum efficiency of a linear-optical Bell-state analyzer [J].
Calsamiglia, J ;
Lütkenhaus, N .
APPLIED PHYSICS B-LASERS AND OPTICS, 2001, 72 (01) :67-71
[4]   Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States" [J].
Chong, Song-Kong ;
Tsai, Chia-Wei ;
Hwang, Tzonelih .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2011, 50 (06) :1793-1802
[5]   Quantum key agreement protocol based on BB84 [J].
Chong, Song-Kong ;
Hwang, Tzonelih .
OPTICS COMMUNICATIONS, 2010, 283 (06) :1192-1195
[6]   Quantum teleportation and state sharing using a genuinely entangled six-qubit state [J].
Choudhury, Sayan ;
Muralidharan, Sreraman ;
Panigrahi, Prasanta K. .
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2009, 42 (11)
[7]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)
[8]   Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block [J].
Deng, FG ;
Long, GL ;
Liu, XS .
PHYSICAL REVIEW A, 2003, 68 (04) :6
[9]   Efficient high-capacity quantum secret sharing with two-photon entanglement [J].
Deng, Fu-Guo ;
Li, Xi-Han ;
Zhou, Hong-Yu .
PHYSICS LETTERS A, 2008, 372 (12) :1957-1962
[10]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663