Authenticated semi-quantum key distributions without classical channel

被引:38
作者
Li, Chuan-Ming [1 ]
Yu, Kun-Fei [2 ]
Kao, Shih-Hung [2 ]
Hwang, Tzonelih [2 ]
机构
[1] Shu Zen Jr Coll Med & Management, Dept Informat Management, 452 Huanqiu Rd, Kaohsiung 821, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, 1 Univ Rd, Tainan 70101, Taiwan
关键词
Authentication; Semi-quantum key distribution; Quantum cryptography; DISTRIBUTION PROTOCOLS; BELL THEOREM; CRYPTOGRAPHY; STATES;
D O I
10.1007/s11128-016-1307-y
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Yu et al. have proposed the first authenticated semi-quantum key distribution (ASQKD) without using an authenticated classical channel. This study further proposes two advanced ASQKD protocols. Compared to Yu et al.'s schemes, the proposed protocols ensure better qubit efficiency and require fewer pre-shared keys. Security analyses show that the proposed ASQKD protocols also can be secure against several well-known outside eavesdropper's attacks.
引用
收藏
页码:2881 / 2893
页数:13
相关论文
共 31 条
[1]  
Bennett C H, 1984, P IEEE INT C COMP SY, V175, P175
[2]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[3]   Semiquantum key distribution [J].
Boyer, Michel ;
Gelles, Ran ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW A, 2009, 79 (03)
[4]   Quantum key distribution with classical Bob [J].
Boyer, Michel ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW LETTERS, 2007, 99 (14)
[5]   Quantum key distribution without alternative measurements [J].
Cabello, A .
PHYSICAL REVIEW A, 2000, 61 (05)
[6]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[7]  
Deng F G, 2005, QUANTUM PHYS
[8]   Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol 72, art no 044302, 2005) [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2006, 73 (04)
[9]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)
[10]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663