Security of a semi-quantum protocol where reflections contribute to the secret key
From MaRDI portal
Publication:296133
DOI10.1007/S11128-016-1266-3zbMATH Open1338.81166arXiv1510.07181OpenAlexW2234042337MaRDI QIDQ296133FDOQ296133
Publication date: 14 June 2016
Published in: Quantum Information Processing (Search for Journal in Brave)
Abstract: In this paper we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In this work we provide a complete proof of security by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound we are able to find an error threshold value such that for all error rates less than this threshold, it is guaranteed that and may distill a secure secret key; for error rates larger than this threshold, and should abort. We demonstrate that this error threshold compares favorably to several fully quantum protocols. We also comment on some interesting observations about the behavior of this protocol under certain noise scenarios.
Full work available at URL: https://arxiv.org/abs/1510.07181
Recommendations
- Qutrit-based semi-quantum key distribution protocol
- Security of a single-state semi-quantum key distribution protocol
- Single-state semi-quantum key distribution protocol and its security proof
- Semi-quantum key agreement and private comparison protocols using Bell states
- Mutually unbiased bases in 3 and 4 dimensions semi-quantum key distribution protocol
Measures of information, entropy (94A17) Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Authenticated semi-quantum key distribution protocol using Bell states
- Semiquantum key distribution
- Quantum Key Distribution with Classical Bob
- Quantum cryptography using any two nonorthogonal states
- Distillation of secret key and entanglement from quantum states
- Title not available (Why is that?)
- RELATION BETWEEN INFORMATION AND DISTURBANCE IN QUANTUM KEY DISTRIBUTION PROTOCOL WITH CLASSICAL ALICE
- Title not available (Why is that?)
- Restricted attacks on semi-quantum key distribution protocols
- SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATE
- Quantum secret sharing with classical Bobs
- Semiquantum key distribution without invoking the classical party's measurement capability
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
- EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS
Cited In (32)
- On the security of semi-device-independent QKD protocols
- Quantum key distribution with quantum walks
- Three-party semi-quantum key agreement protocol
- Semi-quantum designated verifier signature scheme
- Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue
- Semi-quantum mutual identity authentication using Bell states
- Measure-resend semi-quantum private comparison without entanglement
- Efficient semi-quantum private comparison without using entanglement resource and pre-shared key
- Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states
- Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack
- Two semi-quantum key distribution protocols with G-like states
- Security of a single-state semi-quantum key distribution protocol
- Semi-quantum ring signature protocol based on multi-particle GHZ state
- Semi-quantum identification
- Semi-quantum dialogue based on single photons
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- Security analysis for single-state circular mediated semi-quantum key distribution
- Semi-quantum cryptography
- Quantum Cryptography: Key Distribution and Beyond
- Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack
- Offline arbitrated semi-quantum signature scheme with four-particle cluster state
- Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States
- Single-state semi-quantum key distribution protocol and its security proof
- Efficient mediated semi-quantum key distribution
- Semi-quantum key distribution protocols with GHZ states
- Semi-quantum private comparison based on Bell states
- Efficient semiquantum key distribution based on single photons in both polarization and spatial-mode degrees of freedom
- Semi-quantum key distribution protocol with logical qubits over the collective-rotation noise channel
- Cryptanalysis and improvement of semi-quantum dialogue with Bell entangled states
- Semi-quantum key distribution using qudit systems and security proof
- High-capacity quantum key distribution based on hyperentangled Bell states and hyper-encoding
- Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom
This page was built for publication: Security of a semi-quantum protocol where reflections contribute to the secret key
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q296133)