New approach to quantum key distribution via quantum encryption

2009 ◽  
Vol 9 (9&10) ◽  
pp. 879-898
Author(s):  
A. Fahmi

Recently, Zhang, Li and Guo (ZLG) suggested a new approach to quantum key distribution by using a shared Bell state which acts as quantum key in order to encode and decode classical information. Subsequently, others extended ZLG protocol to d-dimensional systems and to quantum secret sharing based on reusable GHZ states. However, Gao et al. have shown that if Eve employs a special strategy to attack, these protocols become insecure. Afterwards, they repair ZLG protocol so that their eavesdropping strategy becomes inefficient. In this paper, we investigate the security of ZLG quantum key distribution protocol and show that it is not secure against Eve's attacks and with probability of one half she gets all of the keys without being detected by the two parties. In this eavesdropping strategy, Eve transforms the previously shared Bell state between Alice and Bob to two Bell states among herself and the parties. Moreover, we briefly show that ZLG's repairing by Gao et al's is not efficient against of our attack and Eve can choose an appropriate rotation angle and measurement bases which help her to do eavesdropping. Afterwards, we discuss generalization of ZLG protocol to d-dimensional systems and show that with probability 1/d, Eve gets all of keys. We show that quantum secret sharing based on reusable GHZ states is also not secure and with probability one half, Eve gets all of keys. We repair them by going to higher dimensional shared EPR or GHZ states. Finally, we compare ZLG protocol with ours and show that the ZLG protocol and its extensions are less robust against the channel noise with respect to ours.

2018 ◽  
Vol 32 (25) ◽  
pp. 1850294 ◽  
Author(s):  
Bingren Chen ◽  
Wei Yang ◽  
Liusheng Huang

A recent paper proposed a semi-quantum secret sharing (SQSS) scheme based on Bell states [A. Yin et al., Mod. Phys. Lett. B. https://doi.org/10.1142/S0217984917501500 ]. This protocol was presumed that only the sender has the quantum power and all participants perform classical operations. However, we find this protocol is not that secure as it is expected. We can utilize the intercept-resend method to attack this scheme. Then, we give an improvement strategy based on semi-quantum key distribution, which ensures that the new scheme resists the attack we have proposed.


2007 ◽  
Vol 24 (5) ◽  
pp. 1147-1150 ◽  
Author(s):  
Liu Wei-Tao ◽  
Liang Lin-Mei ◽  
Li Cheng-Zu ◽  
Yuan Jian-Min

2021 ◽  
pp. 2150195
Author(s):  
Yefeng He ◽  
Wenping Ma

In order to eliminate the influence of the channel noise, two new measurement-device-independent quantum key distribution (MDI-QKD) protocols are proposed with logical quantum states. They can resist collective-dephasing noise and collective-rotation noise, respectively. This paper produces logical quantum states by adding the auxiliary light sources, the CNOT operations and the Hadamard transforms in the system model. The main light sources and auxiliary light sources are flexible and easily implemented, since they can be weak coherent state (WCS) sources, heralded single-photon sources (HSPSs) or heralded pair coherent state (HPCS) sources. To generate one key bit, the new MDI-QKD protocols only need one logical qubit with two particles so that they have high qubit efficiency. Moreover, the new protocols also use partial Bell-state measurement (BSM) which is very easily implemented with existing technologies.


2018 ◽  
Vol 57 (12) ◽  
pp. 3621-3631 ◽  
Author(s):  
Kong-Ni Zhu ◽  
Nan-Run Zhou ◽  
Yun-Qian Wang ◽  
Xiao-Jun Wen

Sign in / Sign up

Export Citation Format

Share Document