In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica...In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks.展开更多
Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a mu...Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed.The aim of their protocol is to agree on a shared secret key among multiple remote participants.Liu et al.employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key.In addition,Liu et al.’s protocol guarantees that each participant makes an equal contribution to the final key.The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone.However,we show here that Liu et al.protocol is insecure against a collusive attack,where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.Additionally,the corresponding modifications are presented to address these security flaws in Liu et al.’s protocol.展开更多
Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presente...Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described: sitting in the middle, an adversary can play a “man-in-the-middle” attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.展开更多
The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols a...The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols are mostly two-party or three-party,and they do not entirely meet the actual needs.To address this problem,this paper proposes new CQKA protocols based on Bell states and Bell measurements.The new CQKA protocols can be successfully implemented for any N-party,not just two-party.Furthermore,the security and efficiency analyses demonstrate that the new CQKA protocols are not only secure but also more efficient in terms of quantum bit.展开更多
The need to simultaneously balance security and fairness in quantum key agreement(QKA) makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key agreement(MQKA) protocol. When designi...The need to simultaneously balance security and fairness in quantum key agreement(QKA) makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key agreement(MQKA) protocol. When designing an MQKA protocol,two modes can be used to transmit the quantum information carriers: travelling mode and distributed mode. MQKA protocols usually have a higher qubit efficiency in travelling mode than in distributed mode. Thus, several travelling mode MQKA protocols have been proposed. However, almost all of these are vulnerable to collusion attacks from internal betrayers. This paper proposes an improved MQKA protocol that operates in travelling mode with Einstein-Podolsky-Rosen pairs. More importantly, we present a new travelling mode MQKA protocol that uses single photons, which is more feasible than previous methods under current technologies.展开更多
The difficulty of quantum key agreement is to realize its security and fairness at the same time.This paper presents a new three-party quantum key agreement protocol based on continuous variable single-mode squeezed s...The difficulty of quantum key agreement is to realize its security and fairness at the same time.This paper presents a new three-party quantum key agreement protocol based on continuous variable single-mode squeezed state.The three parties participating in the agreement are peer entities,making same contributions to the final key.Any one or two participants of the agreement cannot determine the shared key separately.The security analysis shows that the proposed protocol can resist both external and internal attacks.展开更多
基金the National Science Foundation of Sichuan Province, China (Grant No. 2022NSFSC0534)Major Science, and Techonolgy Application Demonstration Project in Chengdu (Grant No. 2021-YF09-0116-GX)。
文摘In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks.
基金This project was financially supported by the Academy of Scientific Research and Technology(ASRT)in Egypt,under the project of Science Up,Grant no.6626.
文摘Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed.The aim of their protocol is to agree on a shared secret key among multiple remote participants.Liu et al.employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key.In addition,Liu et al.’s protocol guarantees that each participant makes an equal contribution to the final key.The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone.However,we show here that Liu et al.protocol is insecure against a collusive attack,where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.Additionally,the corresponding modifications are presented to address these security flaws in Liu et al.’s protocol.
文摘Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described: sitting in the middle, an adversary can play a “man-in-the-middle” attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.
基金supported by the National Natural Science Foundation of China(61802302)the Basic Research Project of Natural Science of Shaanxi Province(2021JM-462)
文摘The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols are mostly two-party or three-party,and they do not entirely meet the actual needs.To address this problem,this paper proposes new CQKA protocols based on Bell states and Bell measurements.The new CQKA protocols can be successfully implemented for any N-party,not just two-party.Furthermore,the security and efficiency analyses demonstrate that the new CQKA protocols are not only secure but also more efficient in terms of quantum bit.
基金supported by the National Natural Science Foundation of China(Grant Nos.61501414,61602045,61601171,61309029,11504024 and 61502041)
文摘The need to simultaneously balance security and fairness in quantum key agreement(QKA) makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key agreement(MQKA) protocol. When designing an MQKA protocol,two modes can be used to transmit the quantum information carriers: travelling mode and distributed mode. MQKA protocols usually have a higher qubit efficiency in travelling mode than in distributed mode. Thus, several travelling mode MQKA protocols have been proposed. However, almost all of these are vulnerable to collusion attacks from internal betrayers. This paper proposes an improved MQKA protocol that operates in travelling mode with Einstein-Podolsky-Rosen pairs. More importantly, we present a new travelling mode MQKA protocol that uses single photons, which is more feasible than previous methods under current technologies.
基金Supported by Beijing Natural Science Foundation under Grant Nos.4182006,4162005National Natural Science Foundation of China under Grant Nos.61572053,61472048,61671087,U1636106,61602019,61502016
文摘The difficulty of quantum key agreement is to realize its security and fairness at the same time.This paper presents a new three-party quantum key agreement protocol based on continuous variable single-mode squeezed state.The three parties participating in the agreement are peer entities,making same contributions to the final key.Any one or two participants of the agreement cannot determine the shared key separately.The security analysis shows that the proposed protocol can resist both external and internal attacks.