IPsec Multicast Architecture Based on Quantum Key Distribution, Quantum Secret Sharing and Measurement

Author(s):  
Ahmed Farouk ◽  
O. Tarawneh ◽  
Mohamed Elhoseny ◽  
J. Batle ◽  
Mosayeb Naseri ◽  
...  
2018 ◽  
Vol 32 (25) ◽  
pp. 1850294 ◽  
Author(s):  
Bingren Chen ◽  
Wei Yang ◽  
Liusheng Huang

A recent paper proposed a semi-quantum secret sharing (SQSS) scheme based on Bell states [A. Yin et al., Mod. Phys. Lett. B. https://doi.org/10.1142/S0217984917501500 ]. This protocol was presumed that only the sender has the quantum power and all participants perform classical operations. However, we find this protocol is not that secure as it is expected. We can utilize the intercept-resend method to attack this scheme. Then, we give an improvement strategy based on semi-quantum key distribution, which ensures that the new scheme resists the attack we have proposed.


2007 ◽  
Vol 24 (5) ◽  
pp. 1147-1150 ◽  
Author(s):  
Liu Wei-Tao ◽  
Liang Lin-Mei ◽  
Li Cheng-Zu ◽  
Yuan Jian-Min

2009 ◽  
Vol 9 (9&10) ◽  
pp. 879-898
Author(s):  
A. Fahmi

Recently, Zhang, Li and Guo (ZLG) suggested a new approach to quantum key distribution by using a shared Bell state which acts as quantum key in order to encode and decode classical information. Subsequently, others extended ZLG protocol to d-dimensional systems and to quantum secret sharing based on reusable GHZ states. However, Gao et al. have shown that if Eve employs a special strategy to attack, these protocols become insecure. Afterwards, they repair ZLG protocol so that their eavesdropping strategy becomes inefficient. In this paper, we investigate the security of ZLG quantum key distribution protocol and show that it is not secure against Eve's attacks and with probability of one half she gets all of the keys without being detected by the two parties. In this eavesdropping strategy, Eve transforms the previously shared Bell state between Alice and Bob to two Bell states among herself and the parties. Moreover, we briefly show that ZLG's repairing by Gao et al's is not efficient against of our attack and Eve can choose an appropriate rotation angle and measurement bases which help her to do eavesdropping. Afterwards, we discuss generalization of ZLG protocol to d-dimensional systems and show that with probability 1/d, Eve gets all of keys. We show that quantum secret sharing based on reusable GHZ states is also not secure and with probability one half, Eve gets all of keys. We repair them by going to higher dimensional shared EPR or GHZ states. Finally, we compare ZLG protocol with ours and show that the ZLG protocol and its extensions are less robust against the channel noise with respect to ours.


2021 ◽  
pp. 2150156
Author(s):  
Tianqi Dou ◽  
Hongwei Liu ◽  
Jipeng Wang ◽  
Zhenhua Li ◽  
Wenxiu Qu ◽  
...  

Quantum communication plays an important role in quantum information science due to its unconditional security. In practical implementations, the users of each communication vary with the transmitted information, and hence not all users are required to participate in each communication round. Therefore, improving the flexibility and efficiency of the actual communication process is highly demanded. Here, we propose a theoretical quantum communication scheme that realizes secret key distribution for both the two-party quantum key distribution (QKD) and multi-party quantum secret sharing (QSS) modes. The sender, Alice, can freely select one or more users to share keys among all users, and nonactive users will not participate in the process of secret key sharing. Numerical simulations show the superiority of the proposed scheme in transmission distance and secure key rate. Consequently, the proposed scheme is valuable for secure quantum communication network scenarios.


2009 ◽  
Author(s):  
Jan Bogdanski ◽  
Johan Ahrens ◽  
Mohamed Bourennane

2015 ◽  
Vol 23 (6) ◽  
pp. 7300 ◽  
Author(s):  
W. P. Grice ◽  
P. G. Evans ◽  
B. Lawrie ◽  
M. Legré ◽  
P. Lougovski ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document