Authenticated Quantum Key Distribution with Collective Detection using Single Photons

被引:8
|
作者
Huang, Wei [1 ]
Xu, Bing-Jie [1 ]
Duan, Ji-Tong [2 ]
Liu, Bin [3 ]
Su, Qi [4 ]
He, Yuan-Hang [1 ]
Jia, Heng-Yue [5 ]
机构
[1] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[2] Beijing Univ Posts & Telecommun, Int Sch, Beijing 100876, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
[5] Cent Univ Finance & Econ, Sch Informat, Beijing 100081, Peoples R China
关键词
Quantum cryptography; Quantum key agreement; Authentication; Collective detection; SECURE DIRECT COMMUNICATION; DISTRIBUTION PROTOCOLS; SIGNATURE SCHEME; BELL STATES; EPR-PAIRS; SECRET; CRYPTOGRAPHY; NOISE; ENTANGLEMENT; DECOHERENCE;
D O I
10.1007/s10773-016-3049-0
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.
引用
收藏
页码:4238 / 4256
页数:19
相关论文
共 50 条
  • [31] Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
    Meslouhi, A.
    Hassouni, Y.
    QUANTUM INFORMATION PROCESSING, 2017, 16 (01)
  • [32] Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
    A. Meslouhi
    Y. Hassouni
    Quantum Information Processing, 2017, 16
  • [33] Quantum hacking on quantum key distribution using homodyne detection
    Huang, Jing-Zheng
    Kunz-Jacques, Sebastien
    Jouguet, Paul
    Weedbrook, Christian
    Yin, Zhen-Qiang
    Wang, Shuang
    Chen, Wei
    Guo, Guang-Can
    Han, Zheng-Fu
    PHYSICAL REVIEW A, 2014, 89 (03):
  • [34] Authenticated semi-quantum key distribution without entanglement
    Sofia Zebboudj
    Hizia Djoudi
    Dalila Lalaoui
    Mawloud Omar
    Quantum Information Processing, 2020, 19
  • [35] Authenticated semi-quantum key distribution without entanglement
    Zebboudj, Sofia
    Djoudi, Hizia
    Lalaoui, Dalila
    Omar, Mawloud
    QUANTUM INFORMATION PROCESSING, 2020, 19 (03)
  • [36] A continuous-variable quantum key distribution using correlated photons.
    Donkor, Eric
    Erdmann, Reinhard
    Kumavor, Patrick D.
    QUANTUM INFORMATION AND COMPUTATION XIII, 2015, 9500
  • [37] Performance optimization for quantum key distribution in lossy channel using entangled photons
    杨玉
    许录平
    阎博
    张洪阳
    申洋赫
    Chinese Physics B, 2017, (11) : 108 - 114
  • [38] Mediated authenticated differential phase shift quantum key distribution
    Department of Computer Science and Information Engineering, National Cheng Kung University, No. 1, University Rd., Tainan City
    70101, Taiwan
    Optik,
  • [39] Mutually Authenticated Quantum Key Distribution Based on Entanglement Swapping
    Liu, Zhihao
    Chen, Hanwu
    Liu, Wenjie
    Xue, Xiling
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 380 - 383
  • [40] Performance optimization for quantum key distribution in lossy channel using entangled photons
    Yang, Yu
    Xu, Luping
    Yan, Bo
    Zhang, Hongyang
    Shen, Yanghe
    CHINESE PHYSICS B, 2017, 26 (11)