Quantum Key Agreement Protocol Based on Quantum Search Algorithm

Author(s):  
Xi Huang ◽  
Shi-Bin Zhang ◽  
Yan Chang ◽  
Chi Qiu ◽  
Dong-Mei Liu ◽  
...  
2018 ◽  
Vol 33 (36) ◽  
pp. 1850210
Author(s):  
Aihan Yin ◽  
Zhifei Han

Multiparty quantum key agreement (MQKA) is a significant topic that the shared key must be negotiated equally by all participants. In this paper, we use Bell state as quantum resource and add controlled-not gate to avoid information leakage. There is very little research on the quantum key agreement protocol based on quantum search algorithms. Therefore, we propose a quantum key agreement protocol which is based on Grover’s algorithm as one of the most famous quantum search algorithms. The security analysis appears very promising.


2019 ◽  
Vol 58 (5) ◽  
pp. 1659-1666 ◽  
Author(s):  
Hao-Nan Liu ◽  
Xiang-Qian Liang ◽  
Dong-Huan Jiang ◽  
Yong-Hua Zhang ◽  
Guang-Bao Xu

2019 ◽  
Vol 34 (40) ◽  
pp. 1950332
Author(s):  
Wei-Feng Cao ◽  
Yu-Guang Yang ◽  
Yi-Hua Zhou ◽  
Wei-Min Shi

We propose a new two-party quantum key agreement (QKA) protocol using five-qubit Brown states. One-way quantum transmission can be realized by merging Brown states and decoy photons randomly. The security of this protocol is shown to resist the outsider attack and participant attack over the ideal channel. Some methods are also proposed to ensure its security in noisy and lossy quantum channel. Finally, we generalize it and propose a multi-party QKA protocol based on Brown states.


2016 ◽  
Vol 30 (26) ◽  
pp. 1650332 ◽  
Author(s):  
Yefeng He ◽  
Wenping Ma

Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.


2021 ◽  
Vol 20 (11) ◽  
Author(s):  
Yu-Guang Yang ◽  
Yue-Chao Wang ◽  
Jian Li ◽  
Yi-Hua Zhou ◽  
Wei-Min Shi

Sign in / Sign up

Export Citation Format

Share Document