A New Secure Quantum Key Expansion Scheme

被引:0
作者
Yun-yan Yang
Lai-zhen Luo
Gui-sheng Yin
机构
[1] Harbin Engineering University,Department of Mathematics
[2] Harbin University of Science and Technology,Department of Mathematics
[3] Harbin Engineering University,Department of Computer Science and Technology
来源
International Journal of Theoretical Physics | 2013年 / 52卷
关键词
Quantum key expansion; Quantum key distribution; Quantum cryptography; Unitary operators;
D O I
暂无
中图分类号
学科分类号
摘要
A new quantum key expansion scheme is proposed. The protocol of quantum key expansion proposed by Hwang is analyzed and the eavesdropping scheme is presented. We found that the using of the basis sequence shared by communicating parties is the weakness of the protocol. Hence we propose a ‘purification attack’ for the eavesdropper to steal partial information of the raw key and the new key between communicating parties. In view of this defect, we propose a new protocol of quantum key expansion, where the shared key is encrypted into a sequence of unitary operators which can be used securely against the presented attack.
引用
收藏
页码:2008 / 2016
页数:8
相关论文
共 66 条
[1]  
Bennett C.H.(1992)Quantum cryptography using any two nonorthogonal states Phys. Rev. Lett. 68 3121-112
[2]  
Ekert A.K.(1991)Quantum cryptography based on Bell’s theorem Phys. Rev. Lett. 67 661-1333
[3]  
Lutkenhaus N.(1996)Security against eavesdropping in quantum cryptography Phys. Rev. A 54 97-undefined
[4]  
Bruss D.(1998)Optimal eavesdropping in quantum cryptography with six states Phys. Rev. Lett. 81 3018-undefined
[5]  
Bechmann-Pasquinucci H.(2000)Quantum cryptography with 3-state systems Phys. Rev. Lett. 85 3313-undefined
[6]  
Peres A.(2005)Decoy state quantum key distribution Phys. Rev. Lett. 94 4171-undefined
[7]  
Lo H.K.(2008)Quantum key distribution with an unknown and untrusted source Phys. Rev. A 77 2533-undefined
[8]  
Ma X.(2009)Quantum key distribution protocols with six-photon states against collective noise Opt. Commun. 282 3762-undefined
[9]  
Chen K.(2009)Decoy state quantum key distribution with finite resources Phys. Lett. A 373 43-undefined
[10]  
Zhao Y.(2010)Finite-key security against coherent attacks in quantum key distribution New J. Phys. 12 2050-undefined