scholarly journals Cryptanalysis of a multi-party quantum key agreement protocol with single particles

2014 ◽  
Vol 13 (7) ◽  
pp. 1651-1657 ◽  
Author(s):  
Wei Huang ◽  
Qiao-Yan Wen ◽  
Bin Liu ◽  
Qi Su ◽  
Fei Gao
2019 ◽  
Vol 58 (5) ◽  
pp. 1659-1666 ◽  
Author(s):  
Hao-Nan Liu ◽  
Xiang-Qian Liang ◽  
Dong-Huan Jiang ◽  
Yong-Hua Zhang ◽  
Guang-Bao Xu

2020 ◽  
Vol 34 (20) ◽  
pp. 2050199
Author(s):  
R.-H. Tang ◽  
C. Zhang ◽  
D.-Y. Long

An efficient circle-type multiparty quantum key agreement protocol utilizing two non-orthogonal bases single particles is proposed. In our protocol, each participant performs one of two simple unitary operations to encode and additional unitary operations to protect his privacy. Both outside attacks and participant attacks can be perfectly resisted. Moreover, our protocol has a high efficiency up to [Formula: see text], where [Formula: see text] is the number of the participants, and it can be easily implemented with current quantum technologies as it needs only single particle measurements.


2019 ◽  
Vol 34 (40) ◽  
pp. 1950332
Author(s):  
Wei-Feng Cao ◽  
Yu-Guang Yang ◽  
Yi-Hua Zhou ◽  
Wei-Min Shi

We propose a new two-party quantum key agreement (QKA) protocol using five-qubit Brown states. One-way quantum transmission can be realized by merging Brown states and decoy photons randomly. The security of this protocol is shown to resist the outsider attack and participant attack over the ideal channel. Some methods are also proposed to ensure its security in noisy and lossy quantum channel. Finally, we generalize it and propose a multi-party QKA protocol based on Brown states.


2016 ◽  
Vol 30 (26) ◽  
pp. 1650332 ◽  
Author(s):  
Yefeng He ◽  
Wenping Ma

Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.


2021 ◽  
Vol 20 (11) ◽  
Author(s):  
Yu-Guang Yang ◽  
Yue-Chao Wang ◽  
Jian Li ◽  
Yi-Hua Zhou ◽  
Wei-Min Shi

Sign in / Sign up

Export Citation Format

Share Document