A New Secure Quantum Key Expansion Scheme

被引:3
作者
Yang, Yun-yan [1 ]
Luo, Lai-zhen [2 ]
Yin, Gui-sheng [3 ]
机构
[1] Harbin Engn Univ, Dept Math, Harbin 150001, Peoples R China
[2] Harbin Univ Sci & Technol, Dept Math, Harbin 150080, Peoples R China
[3] Harbin Engn Univ, Dept Comp Sci & Technol, Harbin 150001, Peoples R China
关键词
Quantum key expansion; Quantum key distribution; Quantum cryptography; Unitary operators; CRYPTOGRAPHY; STATES;
D O I
10.1007/s10773-012-1424-z
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A new quantum key expansion scheme is proposed. The protocol of quantum key expansion proposed by Hwang is analyzed and the eavesdropping scheme is presented. We found that the using of the basis sequence shared by communicating parties is the weakness of the protocol. Hence we propose a 'purification attack' for the eavesdropper to steal partial information of the raw key and the new key between communicating parties. In view of this defect, we propose a new protocol of quantum key expansion, where the shared key is encrypted into a sequence of unitary operators which can be used securely against the presented attack.
引用
收藏
页码:2008 / 2016
页数:9
相关论文
共 27 条
[1]   Quantum cryptography with 3-state systems [J].
Bechmann-Pasquinucci, H ;
Peres, A .
PHYSICAL REVIEW LETTERS, 2000, 85 (15) :3313-3316
[2]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[5]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[6]   Continuous operation of high bit rate quantum key distribution [J].
Dixon, A. R. ;
Yuan, Z. L. ;
Dynes, J. F. ;
Sharpe, A. W. ;
Shields, A. J. .
APPLIED PHYSICS LETTERS, 2010, 96 (16)
[7]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[8]   Quantum key distribution over 122 km of standard telecom fiber [J].
Gobby, C ;
Yuan, ZL ;
Shields, AJ .
APPLIED PHYSICS LETTERS, 2004, 84 (19) :3762-3764
[9]   Practical free-space quantum key distribution over 10 km in daylight and at night [J].
Hughes, RJ ;
Nordholt, JE ;
Derkacs, D ;
Peterson, CG .
NEW JOURNAL OF PHYSICS, 2002, 4 :43.1-43.14
[10]   Shor-Preskill-type security proof for quantum key distribution without public announcement of bases [J].
Hwang, WY ;
Wang, XB ;
Matsumoto, K ;
Kim, J ;
Lee, HW .
PHYSICAL REVIEW A, 2003, 67 (01) :5