Cryptanalysis and Improvement in Multi-Party Quantum Key Distribution Protocol with New Bell States Encoding Mode

Author(s):  
Chia-Wei Tsai ◽  
Jason Lin ◽  
Lung Chiu ◽  
Chun-Wei Yang
2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang

AbstractThe mediated semi-quantum key distribution (MSQKD) protocol is an important research issue that lets two classical participants share secret keys securely between each other with the help of a third party (TP). However, in the existing MSQKD protocols, there are two improvable issues, namely (1) the classical participants must be equipped with expensive detectors to avoid Trojan horse attacks and (2) the trustworthiness level of TP must be honest. To the best of our knowledge, none of the existing MSQKD protocols can resolve both these issues. Therefore, this study takes Bell states as the quantum resource to propose a MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest. Furthermore, the proposed protocol is shown to be secure against well-known attacks and the classical participants only need two quantum capabilities. Therefore, in comparison to the existing MSQKD protocols, the proposed protocol is better practical.


2020 ◽  
Vol 34 (31) ◽  
pp. 2050353
Author(s):  
Ling Xu

The semi-quantum key distribution protocol based on the hyperentanglement Bell state of polarization-spatial mode is presented in this paper. This protocol is utilized to share the session keys and construct key hierarchy of security systems in high capacity between the legitimate users securely. Different from the previous protocols, two quantum non-demolition detectors are constructed with cross-Kerr nonlinearities and different phase shifts for distinguishing the Bell states in spatial mode degree of freedom. Meanwhile, this protocol can improve the capacity and efficiency when the legitimate users share the session keys. And the technology of the hyperentanglement purification and hyperentanglement concentration can enhance the robustness and stability of this protocol. At last, this protocol proposed in this paper can withstand several kinds of attacks.


2014 ◽  
Vol 13 (6) ◽  
pp. 1457-1465 ◽  
Author(s):  
Kun-Fei Yu ◽  
Chun-Wei Yang ◽  
Ci-Hong Liao ◽  
Tzonelih Hwang

2005 ◽  
Vol 13 (23) ◽  
pp. 9415 ◽  
Author(s):  
Yun-kun Jiang ◽  
Xiang-Bin Wang ◽  
Bao-Sen Shi ◽  
Akihisa Tomita

Sign in / Sign up

Export Citation Format

Share Document