Lightweight mediated semi-quantum key distribution protocol

被引:23
作者
Tsai, Chia-Wei [1 ]
Yang, Chun-Wei [2 ,3 ]
Lee, Narn-Yih [4 ]
机构
[1] Natl Taitung Univ, Dept Comp Sci & Informat Engn, Taitung 95092, Taiwan
[2] China Med Univ, Ctr Gen Educ, Taichung 40402, Taiwan
[3] China Med Univ, Coll Humanities & Sci, Taichung 40402, Taiwan
[4] Southern Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Tainan 71005, Taiwan
关键词
Semi-quantum; mediated key distribution protocol; untrusted third party; single photon; Trojan-horse attack; SECURITY; ATTACKS; PROOF;
D O I
10.1142/S021773231950281X
中图分类号
P1 [天文学];
学科分类号
0704 ;
摘要
Classical users can share a secret key with a quantum user by using a semi-quantum key distribution (SQKD) protocol. Allowing two classical users to share a secret key is the objective of the mediated semi-quantum key distribution (MSQKD) protocol. However, the existing MSQKD protocols need a quantum user to assist two classical users in distributing the secret keys, and these protocols require that the classical users be equipped with a Trojan horse photon detector. This reduces the practicability of the MSQKD protocols. Therefore, in this study we propose a lightweight MSQKD, in which the two participants and third party are classical users. Due to the usage of the one-way transmission strategy, the proposed lightweight MSQKD protocol is free from quantum Trojan horse attack. The proposed MSQKD is more practical than the existing MSQKD protocols.
引用
收藏
页数:13
相关论文
共 61 条
[1]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[2]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[3]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[4]   Comment on "Semiquantum-key distribution using less than four quantum states" [J].
Boyer, Michel ;
Mor, Tal .
PHYSICAL REVIEW A, 2011, 83 (04)
[5]   Semiquantum key distribution [J].
Boyer, Michel ;
Gelles, Ran ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW A, 2009, 79 (03)
[6]   Quantum key distribution with classical Bob [J].
Boyer, Michel ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW LETTERS, 2007, 99 (14)
[7]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[8]   Security of quantum key distribution using d-level systems -: art. no. 127902 [J].
Cerf, NJ ;
Bourennane, M ;
Karlsson, A ;
Gisin, N .
PHYSICAL REVIEW LETTERS, 2002, 88 (12) :4-127902
[9]   Cryptanalysis and improvement of the novel semi-quantum secret sharing scheme based on Bell states [J].
Chen, Bingren ;
Yang, Wei ;
Huang, Liusheng .
MODERN PHYSICS LETTERS B, 2018, 32 (25)
[10]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)