Two-party quantum key agreement with five-particle entangled states

2017 ◽  
Vol 15 (03) ◽  
pp. 1750018 ◽  
Author(s):  
Ye-Feng He ◽  
Wen-Ping Ma

A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

2016 ◽  
Vol 30 (26) ◽  
pp. 1650332 ◽  
Author(s):  
Yefeng He ◽  
Wenping Ma

Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.


2017 ◽  
Vol 31 (03) ◽  
pp. 1750015 ◽  
Author(s):  
Yefeng He ◽  
Wenping Ma

Based on logical GHZ states and logical Bell states, two robust quantum key agreement protocols are proposed, which can be immune to the collective-dephasing noise and the collective-rotation noise, respectively. The delayed measurement technique ensures that two participants can fairly negotiate a shared key and any one of them cannot successfully perform the participant attacks. The two protocols are congenitally free from the Trojan horse attacks and they can resist against other outsider attacks with the help of the decoy state technology. Moreover, they have no information leakage problem and achieve high qubit efficiency.


2016 ◽  
Vol 14 (01) ◽  
pp. 1650007 ◽  
Author(s):  
Ye-Feng He ◽  
Wen-Ping Ma

Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hussein Abulkasim ◽  
Atefeh Mashatan ◽  
Shohini Ghose

AbstractQuantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.


2019 ◽  
Vol 58 (5) ◽  
pp. 1659-1666 ◽  
Author(s):  
Hao-Nan Liu ◽  
Xiang-Qian Liang ◽  
Dong-Huan Jiang ◽  
Yong-Hua Zhang ◽  
Guang-Bao Xu

2020 ◽  
Vol 34 (18) ◽  
pp. 2050201
Author(s):  
Jie Tang ◽  
Lei Shi ◽  
Jiahua Wei

In this paper, we propose a two-party and a three-party controlled quantum key agreement (QKA) protocols with three-qubit GHZ states and Bell measurements. Compared with previous protocols, the significant change of our schemes is that a supervisor is introduced for controlling the agreement process to improve the controllability. Moreover, our protocols ensure each communication participant contribute equally to the agreement keys, and all participants can negotiate the shared keys without exchanging classical bits between them. The performance analysis shows that our protocols can be immune to outsider and participant attack.


Sign in / Sign up

Export Citation Format

Share Document