Security of a single-state semi-quantum key distribution protocol
From MaRDI portal
Publication:1993741
Abstract: Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. But there are few works concerned about their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise can they tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by et al. in [Phys. Rev. A. 79]. We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that all error rates are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. we make an illustration of the protocol under the circumstance of the reverse quantum channel is a depolarizing one with parameter . Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.
Recommendations
Cites work
- A de Finetti representation for finite symmetric quantum states
- Authenticated semi-quantum key distribution protocol using Bell states
- Distillation of secret key and entanglement from quantum states
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Narrow basis angle doubles secret key in the BB84 protocol
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
- Quantum computation and quantum information. 10th anniversary edition
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography: public key distribution and coin tossing
- Quantum key distribution with classical Bob
- Relation between information and disturbance in quantum key distribution protocol with classical alice
- Restricted attacks on semi-quantum key distribution protocols
- Security of a semi-quantum protocol where reflections contribute to the secret key
- Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue
- Semiquantum key distribution
- Semiquantum key distribution without invoking the classical party's measurement capability
- Unconditional security in quantum cryptography
Cited in
(37)- Circular semi-quantum secret sharing using single particles
- Multi-party semi-quantum secure direct communication protocol with cluster states
- Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom
- Semi-quantum key distribution using qudit systems and security proof
- Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons”
- Eavesdropping in semiquantum key distribution protocol
- On the security of semi-device-independent QKD protocols
- Three-party semi-quantum key agreement protocol
- Efficient semiquantum key distribution without entanglement
- Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue
- Measure-resend semi-quantum private comparison without entanglement
- A novel semi-quantum co-signature scheme based on GHZ states and four-particle cluster states
- Semi-quantum digital signature protocol based on Einstein-Podolsky-Rosen steering
- Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack
- Improvement of measure-resend semi-quantum private comparison scheme using GHZ states
- Two semi-quantum key distribution protocols with G-like states
- Security of a semi-quantum protocol where reflections contribute to the secret key
- Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
- Restricted attacks on semi-quantum key distribution protocols
- Qutrit-based semi-quantum key distribution protocol
- One-round semi-quantum-honest key agreement scheme in MSTSA structure without entanglement
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- Security analysis for single-state circular mediated semi-quantum key distribution
- Semi-quantum cryptography
- Circular mediated semi-quantum key distribution
- Mediated Semi‐Quantum Key Distribution Using Single Photons
- Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack
- Multiparty semiquantum key agreement without entanglement
- Self-protected quantum algorithms based on quantum state tomography
- Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States
- Mutually unbiased bases in 3 and 4 dimensions semi-quantum key distribution protocol
- Improved semi-quantum key distribution with two almost-classical users
- Single-state semi-quantum key distribution protocol and its security proof
- Efficient mediated semi-quantum key distribution
- Semi-quantum key distribution protocols with GHZ states
- Semiquantum secure direct communication with authentication based on single-photons
- Side channel passive quantum key distribution with one uninformative state
This page was built for publication: Security of a single-state semi-quantum key distribution protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1993741)