Skip to main content
Top
Published in: Quantum Information Processing 12/2017

01-12-2017

Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

Authors: Chitra Shukla, Kishore Thapliyal, Anirban Pathak

Published in: Quantum Information Processing | Issue 12/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179 (1984)
2.
go back to reference Pathak, A.: Elements of Quantum Computation and Quantum Communication. CRC Press, Boca Raton (2013)MATH Pathak, A.: Elements of Quantum Computation and Quantum Communication. CRC Press, Boca Raton (2013)MATH
5.
go back to reference Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13, 2391 (2014)MathSciNetCrossRefMATH Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13, 2391 (2014)MathSciNetCrossRefMATH
6.
go back to reference Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)ADSCrossRef Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)ADSCrossRef
7.
go back to reference Banerjee, A., Pathak, A.: Maximally efficient protocols for direct secure quantum communication. Phys. Lett. A 376, 2944 (2012)ADSCrossRef Banerjee, A., Pathak, A.: Maximally efficient protocols for direct secure quantum communication. Phys. Lett. A 376, 2944 (2012)ADSCrossRef
8.
go back to reference Shukla, C., Banerjee, A., Pathak, A.: Improved protocols of secure quantum communication using W states. Int. J. Theor. Phys. 52, 1914 (2013)MathSciNetCrossRef Shukla, C., Banerjee, A., Pathak, A.: Improved protocols of secure quantum communication using W states. Int. J. Theor. Phys. 52, 1914 (2013)MathSciNetCrossRef
9.
go back to reference Long, G., Deng, F., Wang, C., Li, X., Wen, K., Wang, W.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2, 251 (2007)ADSCrossRef Long, G., Deng, F., Wang, C., Li, X., Wen, K., Wang, W.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2, 251 (2007)ADSCrossRef
10.
go back to reference Huang, W., Yang, Y.-H., Jia, H.-Y.: Cryptanalysis and improvement of a quantum communication-based online shopping mechanism. Quantum Inf. Process. 14, 2211–2225 (2015)ADSCrossRefMATH Huang, W., Yang, Y.-H., Jia, H.-Y.: Cryptanalysis and improvement of a quantum communication-based online shopping mechanism. Quantum Inf. Process. 14, 2211–2225 (2015)ADSCrossRefMATH
12.
go back to reference Shukla, C., Kothari, V., Banerjee, A., Pathak, A.: On the qroup-theoretic structure of a class of quantum dialogue protocols. Phys. Lett. A 377, 518 (2013)ADSMathSciNetCrossRef Shukla, C., Kothari, V., Banerjee, A., Pathak, A.: On the qroup-theoretic structure of a class of quantum dialogue protocols. Phys. Lett. A 377, 518 (2013)ADSMathSciNetCrossRef
13.
go back to reference Wang, H., Zhang, Y.Q., Liu, X.F., Hu, Y.P.: Efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Info. Process. 15, 2593–2603 (2016)ADSMathSciNetCrossRefMATH Wang, H., Zhang, Y.Q., Liu, X.F., Hu, Y.P.: Efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Info. Process. 15, 2593–2603 (2016)ADSMathSciNetCrossRefMATH
14.
go back to reference Banerjee, A., Shukla, C., Thapliyal, K., Pathak, A., Panigrahi, P.K.: Asymmetric quantum dialogue in noisy environment. Quantum Inf. Process. 16, 49 (2017)ADSMathSciNetCrossRef Banerjee, A., Shukla, C., Thapliyal, K., Pathak, A., Panigrahi, P.K.: Asymmetric quantum dialogue in noisy environment. Quantum Inf. Process. 16, 49 (2017)ADSMathSciNetCrossRef
17.
go back to reference Shukla, C.: Design and analysis of quantum communication protocols. Ph.D. thesis, Jaypee Institute of Information Technology, Sector-62, Noida, India, pp. 1–166 (2015) Shukla, C.: Design and analysis of quantum communication protocols. Ph.D. thesis, Jaypee Institute of Information Technology, Sector-62, Noida, India, pp. 1–166 (2015)
18.
go back to reference Thapliyal, K., Sharma, R.D., Pathak, A.: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment. arXiv:1608.00101 (2016) Thapliyal, K., Sharma, R.D., Pathak, A.: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment. arXiv:​1608.​00101 (2016)
21.
go back to reference Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009)ADSCrossRef Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009)ADSCrossRef
22.
go back to reference Li, Q., Chan, W.-H., Zhang, S.: Semiquantum key distribution with secure delegated quantum computation. Sci. Rep. 6, 19898 (2016)ADSCrossRef Li, Q., Chan, W.-H., Zhang, S.: Semiquantum key distribution with secure delegated quantum computation. Sci. Rep. 6, 19898 (2016)ADSCrossRef
23.
go back to reference Yu, K.-F., Yang, C.-W., Liao, C.-H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13, 1457–1465 (2014)ADSMathSciNetCrossRefMATH Yu, K.-F., Yang, C.-W., Liao, C.-H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13, 1457–1465 (2014)ADSMathSciNetCrossRefMATH
24.
25.
go back to reference Zhang, X.-Z., Gong, W.-G., Tan, Y.-G., Ren, Z.-Z., Guo, X.-T.: Quantum key distribution series network protocol with m-classical Bobs. Chin. Phys. B 18, 2143–2148 (2009)ADSCrossRef Zhang, X.-Z., Gong, W.-G., Tan, Y.-G., Ren, Z.-Z., Guo, X.-T.: Quantum key distribution series network protocol with m-classical Bobs. Chin. Phys. B 18, 2143–2148 (2009)ADSCrossRef
26.
go back to reference Sun, Z.-W., Du, R.-G., Long, D.-Y.: Quantum key distribution with limited classical Bob. Int. J. Quantum Inf. 11, 1350005 (2013)MathSciNetCrossRef Sun, Z.-W., Du, R.-G., Long, D.-Y.: Quantum key distribution with limited classical Bob. Int. J. Quantum Inf. 11, 1350005 (2013)MathSciNetCrossRef
28.
go back to reference Qin, L., Chan, W.H., Long, D.-Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82, 022303 (2010)ADSCrossRef Qin, L., Chan, W.H., Long, D.-Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82, 022303 (2010)ADSCrossRef
30.
go back to reference Jason, L., Yang, C.-W., Tsai, C.-W., Hwang, T.: Intercept-resend attacks on semi-quantum secret sharing and the improvements. Int. J. Theor. Phys. 52, 156–162 (2013)MathSciNetCrossRefMATH Jason, L., Yang, C.-W., Tsai, C.-W., Hwang, T.: Intercept-resend attacks on semi-quantum secret sharing and the improvements. Int. J. Theor. Phys. 52, 156–162 (2013)MathSciNetCrossRefMATH
31.
32.
go back to reference Zou, X.-F., Qiu, D.-W.: Three-step semiquantum secure direct communication protocol. Phys. Mech. Astron. 57, 1696–1702 (2014)CrossRef Zou, X.-F., Qiu, D.-W.: Three-step semiquantum secure direct communication protocol. Phys. Mech. Astron. 57, 1696–1702 (2014)CrossRef
33.
34.
go back to reference Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: Information Theory (ISIT), IEEE International Symposium, pp. 686–690 (2015) Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: Information Theory (ISIT), IEEE International Symposium, pp. 686–690 (2015)
35.
go back to reference Miyadera, T.: Relation between information and disturbance in quantum key distribution protocol with classical Alice. Int. J. Quantum Inf. 9, 1427–1435 (2011)MathSciNetCrossRefMATH Miyadera, T.: Relation between information and disturbance in quantum key distribution protocol with classical Alice. Int. J. Quantum Inf. 9, 1427–1435 (2011)MathSciNetCrossRefMATH
36.
go back to reference Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: 2015 IEEE International Symposium on Information Theory (ISIT), pp. 686–690 (2015) Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: 2015 IEEE International Symposium on Information Theory (ISIT), pp. 686–690 (2015)
37.
38.
go back to reference Zhang, W., Qiu, D., Zou, X., Mateus, P.: A single-state semi-quantum key distribution protocol and its security proof. arXiv:1612.03087 (2016) Zhang, W., Qiu, D., Zou, X., Mateus, P.: A single-state semi-quantum key distribution protocol and its security proof. arXiv:​1612.​03087 (2016)
40.
go back to reference Chou, Y.-H., Lin, F.-J., Zeng, G.-J.: An efficient novel online shopping mechanism based on quantum communication. Electron. Commer. Res. 14, 349–367 (2014)CrossRef Chou, Y.-H., Lin, F.-J., Zeng, G.-J.: An efficient novel online shopping mechanism based on quantum communication. Electron. Commer. Res. 14, 349–367 (2014)CrossRef
41.
go back to reference Sharma, R.D., Thapliyal, K., Pathak, A.: Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement. Quantum Inf. Process. 16, 169 (2017) Sharma, R.D., Thapliyal, K., Pathak, A.: Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement. Quantum Inf. Process. 16, 169 (2017)
42.
go back to reference Thapliyal, K., Sharma, R.D., Pathak, A.: Protocols for quantum binary voting. Int. J. Quantum Inf. 15, 1750007 (2017)CrossRefMATH Thapliyal, K., Sharma, R.D., Pathak, A.: Protocols for quantum binary voting. Int. J. Quantum Inf. 15, 1750007 (2017)CrossRefMATH
43.
go back to reference Sharma, R.D., De, A.: Quantum voting using single qubits. Indian J. Sci. Technol. 9, 98637 (2016) Sharma, R.D., De, A.: Quantum voting using single qubits. Indian J. Sci. Technol. 9, 98637 (2016)
44.
go back to reference Fung, C.-H.F., Qi, B., Tamaki, K., Lo, H.-K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75, 032314 (2007)ADSCrossRef Fung, C.-H.F., Qi, B., Tamaki, K., Lo, H.-K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75, 032314 (2007)ADSCrossRef
45.
go back to reference Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.-K.: Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008)ADSCrossRef Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.-K.: Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008)ADSCrossRef
46.
go back to reference Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4, 686 (2010)ADSCrossRef Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4, 686 (2010)ADSCrossRef
47.
go back to reference Boyer, M., Dan, K., Tal, M.: Quantum key distribution with classical Bob. In: Quantum, Nano, and Micro Tech., ICQNM’07. First International Conference, IEEE, p. 10 (2007) Boyer, M., Dan, K., Tal, M.: Quantum key distribution with classical Bob. In: Quantum, Nano, and Micro Tech., ICQNM’07. First International Conference, IEEE, p. 10 (2007)
49.
50.
go back to reference Bennett, C.H., et al.: Experimental quantum cryptography. J. Cryp. 5, 3–28 (1992)MATH Bennett, C.H., et al.: Experimental quantum cryptography. J. Cryp. 5, 3–28 (1992)MATH
51.
52.
go back to reference Tomamichel, M., et al.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012)CrossRef Tomamichel, M., et al.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012)CrossRef
53.
go back to reference Sharma, R.D., Thapliyal, K., Pathak, A., Pan, A.K., De, A.: Which verification qubits perform best for secure communication in noisy channel? Quantum Inf. Process. 15, 1703–1718 (2016)ADSMathSciNetCrossRefMATH Sharma, R.D., Thapliyal, K., Pathak, A., Pan, A.K., De, A.: Which verification qubits perform best for secure communication in noisy channel? Quantum Inf. Process. 15, 1703–1718 (2016)ADSMathSciNetCrossRefMATH
54.
go back to reference Srinatha, N., Omkar, S., Srikanth, R., Banerjee, S., Pathak, A.: The quantum cryptographic switch. Quantum Inf. Process. 13, 59 (2014)ADSCrossRef Srinatha, N., Omkar, S., Srikanth, R., Banerjee, S., Pathak, A.: The quantum cryptographic switch. Quantum Inf. Process. 13, 59 (2014)ADSCrossRef
55.
go back to reference Thapliyal, K., Pathak, A.: Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particles. Quantum Inf. Process. 14, 2599 (2015)ADSMathSciNetCrossRefMATH Thapliyal, K., Pathak, A.: Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particles. Quantum Inf. Process. 14, 2599 (2015)ADSMathSciNetCrossRefMATH
56.
go back to reference Pathak, A.: Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: different alternative approaches. Quantum Inf. Process. 14, 2195 (2015)ADSMathSciNetCrossRefMATH Pathak, A.: Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: different alternative approaches. Quantum Inf. Process. 14, 2195 (2015)ADSMathSciNetCrossRefMATH
57.
go back to reference Yu, Z.B., Gong, L.H., Wen, R.H.: Novel multiparty controlled bidirectional quantum secure direct communication based on continuous-variable states. Int. J. Theor. Phys. 55, 1447 (2016)CrossRefMATH Yu, Z.B., Gong, L.H., Wen, R.H.: Novel multiparty controlled bidirectional quantum secure direct communication based on continuous-variable states. Int. J. Theor. Phys. 55, 1447 (2016)CrossRefMATH
58.
go back to reference Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)ADSCrossRef Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)ADSCrossRef
59.
go back to reference Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Informatiom. Cambridge University Press, New Delhi (2008) Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Informatiom. Cambridge University Press, New Delhi (2008)
Metadata
Title
Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue
Authors
Chitra Shukla
Kishore Thapliyal
Anirban Pathak
Publication date
01-12-2017
Publisher
Springer US
Published in
Quantum Information Processing / Issue 12/2017
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-017-1736-2

Other articles of this Issue 12/2017

Quantum Information Processing 12/2017 Go to the issue