An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

被引:0
作者
Wen-Jie Liu
Yong Xu
Ching-Nung Yang
Pei-Pei Gao
Wen-Bin Yu
机构
[1] Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET),Jiangsu Engineering Center of Network Monitoring
[2] Nanjing University of Information Science & Technology,School of Computer and Software
[3] Nanjing University of Information Science & Technology,Department of Computer Science and Information Engineering
[4] National Dong Hwa University,undefined
来源
International Journal of Theoretical Physics | 2018年 / 57卷
关键词
Quantum key agreement; Bell states; Pauli operations; Single photon checking; Post-measurement mechanism;
D O I
暂无
中图分类号
学科分类号
摘要
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391–2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245–4254, 2015). In this study, we will show Zhu et al.’s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations {I, Z, X, Y} to encode two bits instead of the original two operations {I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper’s flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.
引用
收藏
页码:195 / 207
页数:12
相关论文
共 123 条
  • [1] Ekert AK(1991)Quantum cryptography based on Bell’s theorem Phys. Rev. Lett. 67 661-1834
  • [2] Hillery M(1999)Quantum secret sharing Phys. Rev. A 59 1829-4109
  • [3] Bužek V(1999)How to share a quantum secret Phys. Rev. Lett. 83 648-4576
  • [4] Berthiaume A(2009)An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication Chin. Phys. B 18 4105-4686
  • [5] Cleve R(2016)Information leakage problem in high-capacity quantum secure communication with authentication using Einstein-Podolsky-Rosen pairs Chin. Phys. Lett. 33 070305-276
  • [6] Gottesman D(2016)Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad Chin. Phys. B 25 080308-214
  • [7] Lo HK(2016)Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad Int. J. Theor. Phys. 55 4564-1813
  • [8] Liu WJ(2016)Information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom Int. J. Theor. Phys. 55 4681-690
  • [9] Chen HW(2009)An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement J. Phys. A-Math. Theor 42 055305-879
  • [10] Ma TH(2014)Same initial states attack in Yang et al.’s quantum private comparison protocol and the improvement Int. J. Theor. Phys. 53 271-483